From efec1108e0501ef86f23b10fe55426c32d47a631 Mon Sep 17 00:00:00 2001 From: Ryan Dwyer Date: Wed, 15 Apr 2020 17:07:00 +1000 Subject: [PATCH] Create separate lang files for each version --- Makefile | 7 +- src/files/lang/{ => jap-final}/ameE.c | 0 src/files/lang/jap-final/ameJ.c | 116 ++++ src/files/lang/jap-final/ameP.c | 116 ++++ src/files/lang/jap-final/ame_str_f.c | 116 ++++ src/files/lang/jap-final/ame_str_g.c | 116 ++++ src/files/lang/jap-final/ame_str_i.c | 116 ++++ src/files/lang/jap-final/ame_str_s.c | 116 ++++ src/files/lang/{ => jap-final}/archE.c | 0 src/files/lang/{ => jap-final}/archJ.c | 0 src/files/lang/{ => jap-final}/archP.c | 0 src/files/lang/{ => jap-final}/arch_str_f.c | 0 src/files/lang/{ => jap-final}/arch_str_g.c | 0 src/files/lang/{ => jap-final}/arch_str_i.c | 0 src/files/lang/{ => jap-final}/arch_str_s.c | 0 src/files/lang/{ => jap-final}/arecE.c | 0 src/files/lang/{ => jap-final}/arecJ.c | 0 src/files/lang/{ => jap-final}/arecP.c | 0 src/files/lang/{ => jap-final}/arec_str_f.c | 0 src/files/lang/{ => jap-final}/arec_str_g.c | 0 src/files/lang/{ => jap-final}/arec_str_i.c | 0 src/files/lang/{ => jap-final}/arec_str_s.c | 0 src/files/lang/{ => jap-final}/arkE.c | 0 src/files/lang/jap-final/arkJ.c | 80 +++ src/files/lang/jap-final/arkP.c | 80 +++ src/files/lang/jap-final/ark_str_f.c | 80 +++ src/files/lang/jap-final/ark_str_g.c | 80 +++ src/files/lang/jap-final/ark_str_i.c | 80 +++ src/files/lang/jap-final/ark_str_s.c | 80 +++ src/files/lang/{ => jap-final}/ashE.c | 0 src/files/lang/{ => jap-final}/ashJ.c | 0 src/files/lang/{ => jap-final}/ashP.c | 0 src/files/lang/{ => jap-final}/ash_str_f.c | 0 src/files/lang/{ => jap-final}/ash_str_g.c | 0 src/files/lang/{ => jap-final}/ash_str_i.c | 0 src/files/lang/{ => jap-final}/ash_str_s.c | 0 src/files/lang/{ => jap-final}/ateE.c | 0 src/files/lang/jap-final/ateJ.c | 20 + src/files/lang/{ => jap-final}/ateP.c | 0 src/files/lang/jap-final/ate_str_f.c | 20 + src/files/lang/jap-final/ate_str_g.c | 20 + src/files/lang/jap-final/ate_str_i.c | 20 + src/files/lang/jap-final/ate_str_s.c | 20 + src/files/lang/{ => jap-final}/aztE.c | 0 src/files/lang/jap-final/aztJ.c | 52 ++ src/files/lang/jap-final/aztP.c | 52 ++ src/files/lang/jap-final/azt_str_f.c | 52 ++ src/files/lang/jap-final/azt_str_g.c | 52 ++ src/files/lang/jap-final/azt_str_i.c | 52 ++ src/files/lang/jap-final/azt_str_s.c | 52 ++ src/files/lang/{ => jap-final}/catE.c | 0 src/files/lang/{ => jap-final}/catJ.c | 0 src/files/lang/{ => jap-final}/catP.c | 0 src/files/lang/{ => jap-final}/cat_str_f.c | 0 src/files/lang/{ => jap-final}/cat_str_g.c | 0 src/files/lang/{ => jap-final}/cat_str_i.c | 0 src/files/lang/{ => jap-final}/cat_str_s.c | 0 src/files/lang/{ => jap-final}/caveE.c | 0 src/files/lang/jap-final/caveJ.c | 72 +++ src/files/lang/jap-final/caveP.c | 72 +++ src/files/lang/jap-final/cave_str_f.c | 72 +++ src/files/lang/jap-final/cave_str_g.c | 72 +++ src/files/lang/jap-final/cave_str_i.c | 72 +++ src/files/lang/jap-final/cave_str_s.c | 72 +++ src/files/lang/{ => jap-final}/cradE.c | 0 src/files/lang/{ => jap-final}/cradJ.c | 0 src/files/lang/{ => jap-final}/cradP.c | 0 src/files/lang/{ => jap-final}/crad_str_f.c | 0 src/files/lang/{ => jap-final}/crad_str_g.c | 0 src/files/lang/{ => jap-final}/crad_str_i.c | 0 src/files/lang/{ => jap-final}/crad_str_s.c | 0 src/files/lang/{ => jap-final}/crypE.c | 0 src/files/lang/{ => jap-final}/crypJ.c | 0 src/files/lang/{ => jap-final}/crypP.c | 0 src/files/lang/{ => jap-final}/cryp_str_f.c | 0 src/files/lang/{ => jap-final}/cryp_str_g.c | 0 src/files/lang/{ => jap-final}/cryp_str_i.c | 0 src/files/lang/{ => jap-final}/cryp_str_s.c | 0 src/files/lang/{ => jap-final}/damE.c | 0 src/files/lang/jap-final/damJ.c | 52 ++ src/files/lang/jap-final/damP.c | 52 ++ src/files/lang/jap-final/dam_str_f.c | 52 ++ src/files/lang/jap-final/dam_str_g.c | 52 ++ src/files/lang/jap-final/dam_str_i.c | 52 ++ src/files/lang/jap-final/dam_str_s.c | 52 ++ src/files/lang/{ => jap-final}/depoE.c | 0 src/files/lang/jap-final/depoJ.c | 88 +++ src/files/lang/jap-final/depoP.c | 88 +++ src/files/lang/jap-final/depo_str_f.c | 88 +++ src/files/lang/jap-final/depo_str_g.c | 88 +++ src/files/lang/jap-final/depo_str_i.c | 88 +++ src/files/lang/jap-final/depo_str_s.c | 88 +++ src/files/lang/{ => jap-final}/destE.c | 0 src/files/lang/{ => jap-final}/destJ.c | 0 src/files/lang/{ => jap-final}/destP.c | 0 src/files/lang/{ => jap-final}/dest_str_f.c | 0 src/files/lang/{ => jap-final}/dest_str_g.c | 0 src/files/lang/{ => jap-final}/dest_str_i.c | 0 src/files/lang/{ => jap-final}/dest_str_s.c | 0 src/files/lang/jap-final/dishE.c | 328 ++++++++++++ src/files/lang/jap-final/dishJ.c | 328 ++++++++++++ src/files/lang/jap-final/dishP.c | 328 ++++++++++++ src/files/lang/jap-final/dish_str_f.c | 328 ++++++++++++ src/files/lang/jap-final/dish_str_g.c | 328 ++++++++++++ src/files/lang/jap-final/dish_str_i.c | 328 ++++++++++++ src/files/lang/jap-final/dish_str_s.c | 328 ++++++++++++ src/files/lang/{ => jap-final}/earE.c | 0 src/files/lang/jap-final/earJ.c | 112 ++++ src/files/lang/jap-final/earP.c | 112 ++++ src/files/lang/jap-final/ear_str_f.c | 112 ++++ src/files/lang/jap-final/ear_str_g.c | 112 ++++ src/files/lang/jap-final/ear_str_i.c | 112 ++++ src/files/lang/jap-final/ear_str_s.c | 112 ++++ src/files/lang/jap-final/eldE.c | 56 ++ src/files/lang/jap-final/eldJ.c | 56 ++ src/files/lang/jap-final/eldP.c | 56 ++ src/files/lang/jap-final/eld_str_f.c | 56 ++ src/files/lang/jap-final/eld_str_g.c | 56 ++ src/files/lang/jap-final/eld_str_i.c | 56 ++ src/files/lang/jap-final/eld_str_s.c | 56 ++ src/files/lang/jap-final/gunE.c | 268 ++++++++++ src/files/lang/jap-final/gunJ.c | 268 ++++++++++ src/files/lang/jap-final/gunP.c | 268 ++++++++++ src/files/lang/jap-final/gun_str_f.c | 268 ++++++++++ src/files/lang/jap-final/gun_str_g.c | 268 ++++++++++ src/files/lang/jap-final/gun_str_i.c | 268 ++++++++++ src/files/lang/jap-final/gun_str_s.c | 268 ++++++++++ src/files/lang/{ => jap-final}/impE.c | 0 src/files/lang/jap-final/impJ.c | 68 +++ src/files/lang/jap-final/impP.c | 68 +++ src/files/lang/jap-final/imp_str_f.c | 68 +++ src/files/lang/jap-final/imp_str_g.c | 68 +++ src/files/lang/jap-final/imp_str_i.c | 68 +++ src/files/lang/jap-final/imp_str_s.c | 68 +++ src/files/lang/{ => jap-final}/junE.c | 0 src/files/lang/{ => jap-final}/junJ.c | 0 src/files/lang/{ => jap-final}/junP.c | 0 src/files/lang/{ => jap-final}/jun_str_f.c | 0 src/files/lang/{ => jap-final}/jun_str_g.c | 0 src/files/lang/{ => jap-final}/jun_str_i.c | 0 src/files/lang/{ => jap-final}/jun_str_s.c | 0 src/files/lang/{ => jap-final}/lamE.c | 0 src/files/lang/{ => jap-final}/lamJ.c | 0 src/files/lang/{ => jap-final}/lamP.c | 0 src/files/lang/{ => jap-final}/lam_str_f.c | 0 src/files/lang/{ => jap-final}/lam_str_g.c | 0 src/files/lang/{ => jap-final}/lam_str_i.c | 0 src/files/lang/{ => jap-final}/lam_str_s.c | 0 src/files/lang/{ => jap-final}/leeE.c | 0 src/files/lang/jap-final/leeJ.c | 60 +++ src/files/lang/jap-final/leeP.c | 60 +++ src/files/lang/jap-final/lee_str_f.c | 60 +++ src/files/lang/jap-final/lee_str_g.c | 60 +++ src/files/lang/jap-final/lee_str_i.c | 60 +++ src/files/lang/jap-final/lee_str_s.c | 60 +++ src/files/lang/{ => jap-final}/lenE.c | 0 src/files/lang/{ => jap-final}/lenJ.c | 0 src/files/lang/{ => jap-final}/lenP.c | 0 src/files/lang/{ => jap-final}/len_str_f.c | 0 src/files/lang/{ => jap-final}/len_str_g.c | 0 src/files/lang/{ => jap-final}/len_str_i.c | 0 src/files/lang/{ => jap-final}/len_str_s.c | 0 src/files/lang/{ => jap-final}/lipE.c | 0 src/files/lang/jap-final/lipJ.c | 112 ++++ src/files/lang/jap-final/lipP.c | 112 ++++ src/files/lang/jap-final/lip_str_f.c | 112 ++++ src/files/lang/jap-final/lip_str_g.c | 112 ++++ src/files/lang/jap-final/lip_str_i.c | 112 ++++ src/files/lang/jap-final/lip_str_s.c | 112 ++++ src/files/lang/{ => jap-final}/lueE.c | 0 src/files/lang/jap-final/lueJ.c | 80 +++ src/files/lang/jap-final/lueP.c | 80 +++ src/files/lang/jap-final/lue_str_f.c | 80 +++ src/files/lang/jap-final/lue_str_g.c | 80 +++ src/files/lang/jap-final/lue_str_i.c | 80 +++ src/files/lang/jap-final/lue_str_s.c | 80 +++ src/files/lang/jap-final/miscE.c | 224 ++++++++ src/files/lang/jap-final/miscJ.c | 224 ++++++++ src/files/lang/jap-final/miscP.c | 224 ++++++++ src/files/lang/jap-final/misc_str_f.c | 224 ++++++++ src/files/lang/jap-final/misc_str_g.c | 224 ++++++++ src/files/lang/jap-final/misc_str_i.c | 224 ++++++++ src/files/lang/jap-final/misc_str_s.c | 224 ++++++++ src/files/lang/{ => jap-final}/mp10E.c | 0 src/files/lang/{ => jap-final}/mp10J.c | 0 src/files/lang/{ => jap-final}/mp10P.c | 0 src/files/lang/{ => jap-final}/mp10_str_f.c | 0 src/files/lang/{ => jap-final}/mp10_str_g.c | 0 src/files/lang/{ => jap-final}/mp10_str_i.c | 0 src/files/lang/{ => jap-final}/mp10_str_s.c | 0 src/files/lang/{ => jap-final}/mp11E.c | 0 src/files/lang/{ => jap-final}/mp11J.c | 0 src/files/lang/{ => jap-final}/mp11P.c | 0 src/files/lang/{ => jap-final}/mp11_str_f.c | 0 src/files/lang/{ => jap-final}/mp11_str_g.c | 0 src/files/lang/{ => jap-final}/mp11_str_i.c | 0 src/files/lang/{ => jap-final}/mp11_str_s.c | 0 src/files/lang/{ => jap-final}/mp12E.c | 0 src/files/lang/{ => jap-final}/mp12J.c | 0 src/files/lang/{ => jap-final}/mp12P.c | 0 src/files/lang/{ => jap-final}/mp12_str_f.c | 0 src/files/lang/{ => jap-final}/mp12_str_g.c | 0 src/files/lang/{ => jap-final}/mp12_str_i.c | 0 src/files/lang/{ => jap-final}/mp12_str_s.c | 0 src/files/lang/{ => jap-final}/mp13E.c | 0 src/files/lang/{ => jap-final}/mp13J.c | 0 src/files/lang/{ => jap-final}/mp13P.c | 0 src/files/lang/{ => jap-final}/mp13_str_f.c | 0 src/files/lang/{ => jap-final}/mp13_str_g.c | 0 src/files/lang/{ => jap-final}/mp13_str_i.c | 0 src/files/lang/{ => jap-final}/mp13_str_s.c | 0 src/files/lang/{ => jap-final}/mp14E.c | 0 src/files/lang/{ => jap-final}/mp14J.c | 0 src/files/lang/{ => jap-final}/mp14P.c | 0 src/files/lang/{ => jap-final}/mp14_str_f.c | 0 src/files/lang/{ => jap-final}/mp14_str_g.c | 0 src/files/lang/{ => jap-final}/mp14_str_i.c | 0 src/files/lang/{ => jap-final}/mp14_str_s.c | 0 src/files/lang/{ => jap-final}/mp15E.c | 0 src/files/lang/{ => jap-final}/mp15J.c | 0 src/files/lang/{ => jap-final}/mp15P.c | 0 src/files/lang/{ => jap-final}/mp15_str_f.c | 0 src/files/lang/{ => jap-final}/mp15_str_g.c | 0 src/files/lang/{ => jap-final}/mp15_str_i.c | 0 src/files/lang/{ => jap-final}/mp15_str_s.c | 0 src/files/lang/{ => jap-final}/mp16E.c | 0 src/files/lang/{ => jap-final}/mp16J.c | 0 src/files/lang/{ => jap-final}/mp16P.c | 0 src/files/lang/{ => jap-final}/mp16_str_f.c | 0 src/files/lang/{ => jap-final}/mp16_str_g.c | 0 src/files/lang/{ => jap-final}/mp16_str_i.c | 0 src/files/lang/{ => jap-final}/mp16_str_s.c | 0 src/files/lang/{ => jap-final}/mp17E.c | 0 src/files/lang/{ => jap-final}/mp17J.c | 0 src/files/lang/{ => jap-final}/mp17P.c | 0 src/files/lang/{ => jap-final}/mp17_str_f.c | 0 src/files/lang/{ => jap-final}/mp17_str_g.c | 0 src/files/lang/{ => jap-final}/mp17_str_i.c | 0 src/files/lang/{ => jap-final}/mp17_str_s.c | 0 src/files/lang/{ => jap-final}/mp18E.c | 0 src/files/lang/{ => jap-final}/mp18J.c | 0 src/files/lang/{ => jap-final}/mp18P.c | 0 src/files/lang/{ => jap-final}/mp18_str_f.c | 0 src/files/lang/{ => jap-final}/mp18_str_g.c | 0 src/files/lang/{ => jap-final}/mp18_str_i.c | 0 src/files/lang/{ => jap-final}/mp18_str_s.c | 0 src/files/lang/{ => jap-final}/mp19E.c | 0 src/files/lang/{ => jap-final}/mp19J.c | 0 src/files/lang/{ => jap-final}/mp19P.c | 0 src/files/lang/{ => jap-final}/mp19_str_f.c | 0 src/files/lang/{ => jap-final}/mp19_str_g.c | 0 src/files/lang/{ => jap-final}/mp19_str_i.c | 0 src/files/lang/{ => jap-final}/mp19_str_s.c | 0 src/files/lang/{ => jap-final}/mp1E.c | 0 src/files/lang/{ => jap-final}/mp1J.c | 0 src/files/lang/{ => jap-final}/mp1P.c | 0 src/files/lang/{ => jap-final}/mp1_str_f.c | 0 src/files/lang/{ => jap-final}/mp1_str_g.c | 0 src/files/lang/{ => jap-final}/mp1_str_i.c | 0 src/files/lang/{ => jap-final}/mp1_str_s.c | 0 src/files/lang/{ => jap-final}/mp20E.c | 0 src/files/lang/{ => jap-final}/mp20J.c | 0 src/files/lang/{ => jap-final}/mp20P.c | 0 src/files/lang/{ => jap-final}/mp20_str_f.c | 0 src/files/lang/{ => jap-final}/mp20_str_g.c | 0 src/files/lang/{ => jap-final}/mp20_str_i.c | 0 src/files/lang/{ => jap-final}/mp20_str_s.c | 0 src/files/lang/{ => jap-final}/mp2E.c | 0 src/files/lang/{ => jap-final}/mp2J.c | 0 src/files/lang/{ => jap-final}/mp2P.c | 0 src/files/lang/{ => jap-final}/mp2_str_f.c | 0 src/files/lang/{ => jap-final}/mp2_str_g.c | 0 src/files/lang/{ => jap-final}/mp2_str_i.c | 0 src/files/lang/{ => jap-final}/mp2_str_s.c | 0 src/files/lang/{ => jap-final}/mp3E.c | 0 src/files/lang/{ => jap-final}/mp3J.c | 0 src/files/lang/{ => jap-final}/mp3P.c | 0 src/files/lang/{ => jap-final}/mp3_str_f.c | 0 src/files/lang/{ => jap-final}/mp3_str_g.c | 0 src/files/lang/{ => jap-final}/mp3_str_i.c | 0 src/files/lang/{ => jap-final}/mp3_str_s.c | 0 src/files/lang/{ => jap-final}/mp4E.c | 0 src/files/lang/{ => jap-final}/mp4J.c | 0 src/files/lang/{ => jap-final}/mp4P.c | 0 src/files/lang/{ => jap-final}/mp4_str_f.c | 0 src/files/lang/{ => jap-final}/mp4_str_g.c | 0 src/files/lang/{ => jap-final}/mp4_str_i.c | 0 src/files/lang/{ => jap-final}/mp4_str_s.c | 0 src/files/lang/{ => jap-final}/mp5E.c | 0 src/files/lang/{ => jap-final}/mp5J.c | 0 src/files/lang/{ => jap-final}/mp5P.c | 0 src/files/lang/{ => jap-final}/mp5_str_f.c | 0 src/files/lang/{ => jap-final}/mp5_str_g.c | 0 src/files/lang/{ => jap-final}/mp5_str_i.c | 0 src/files/lang/{ => jap-final}/mp5_str_s.c | 0 src/files/lang/{ => jap-final}/mp6E.c | 0 src/files/lang/{ => jap-final}/mp6J.c | 0 src/files/lang/{ => jap-final}/mp6P.c | 0 src/files/lang/{ => jap-final}/mp6_str_f.c | 0 src/files/lang/{ => jap-final}/mp6_str_g.c | 0 src/files/lang/{ => jap-final}/mp6_str_i.c | 0 src/files/lang/{ => jap-final}/mp6_str_s.c | 0 src/files/lang/{ => jap-final}/mp7E.c | 0 src/files/lang/{ => jap-final}/mp7J.c | 0 src/files/lang/{ => jap-final}/mp7P.c | 0 src/files/lang/{ => jap-final}/mp7_str_f.c | 0 src/files/lang/{ => jap-final}/mp7_str_g.c | 0 src/files/lang/{ => jap-final}/mp7_str_i.c | 0 src/files/lang/{ => jap-final}/mp7_str_s.c | 0 src/files/lang/{ => jap-final}/mp8E.c | 0 src/files/lang/{ => jap-final}/mp8J.c | 0 src/files/lang/{ => jap-final}/mp8P.c | 0 src/files/lang/{ => jap-final}/mp8_str_f.c | 0 src/files/lang/{ => jap-final}/mp8_str_g.c | 0 src/files/lang/{ => jap-final}/mp8_str_i.c | 0 src/files/lang/{ => jap-final}/mp8_str_s.c | 0 src/files/lang/{ => jap-final}/mp9E.c | 0 src/files/lang/{ => jap-final}/mp9J.c | 0 src/files/lang/{ => jap-final}/mp9P.c | 0 src/files/lang/{ => jap-final}/mp9_str_f.c | 0 src/files/lang/{ => jap-final}/mp9_str_g.c | 0 src/files/lang/{ => jap-final}/mp9_str_i.c | 0 src/files/lang/{ => jap-final}/mp9_str_s.c | 0 src/files/lang/{ => jap-final}/mpmenuE.c | 0 src/files/lang/jap-final/mpmenuJ.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpmenuP.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpmenu_str_f.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpmenu_str_g.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpmenu_str_i.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpmenu_str_s.c | 500 +++++++++++++++++ src/files/lang/jap-final/mpweaponsE.c | 296 ++++++++++ src/files/lang/jap-final/mpweaponsJ.c | 296 ++++++++++ src/files/lang/jap-final/mpweaponsP.c | 296 ++++++++++ src/files/lang/jap-final/mpweapons_str_f.c | 288 ++++++++++ src/files/lang/jap-final/mpweapons_str_g.c | 288 ++++++++++ src/files/lang/jap-final/mpweapons_str_i.c | 288 ++++++++++ src/files/lang/jap-final/mpweapons_str_s.c | 288 ++++++++++ src/files/lang/{ => jap-final}/oatE.c | 0 src/files/lang/{ => jap-final}/oatJ.c | 0 src/files/lang/{ => jap-final}/oatP.c | 0 src/files/lang/{ => jap-final}/oat_str_f.c | 0 src/files/lang/{ => jap-final}/oat_str_g.c | 0 src/files/lang/{ => jap-final}/oat_str_i.c | 0 src/files/lang/{ => jap-final}/oat_str_s.c | 0 src/files/lang/{ => jap-final}/oldE.c | 0 src/files/lang/{ => jap-final}/oldJ.c | 0 src/files/lang/{ => jap-final}/oldP.c | 0 src/files/lang/{ => jap-final}/old_str_f.c | 0 src/files/lang/{ => jap-final}/old_str_g.c | 0 src/files/lang/{ => jap-final}/old_str_i.c | 0 src/files/lang/{ => jap-final}/old_str_s.c | 0 src/files/lang/jap-final/optionsE.c | 500 +++++++++++++++++ src/files/lang/jap-final/optionsJ.c | 500 +++++++++++++++++ src/files/lang/jap-final/optionsP.c | 500 +++++++++++++++++ src/files/lang/jap-final/options_str_f.c | 500 +++++++++++++++++ src/files/lang/jap-final/options_str_g.c | 500 +++++++++++++++++ src/files/lang/jap-final/options_str_i.c | 500 +++++++++++++++++ src/files/lang/jap-final/options_str_s.c | 500 +++++++++++++++++ src/files/lang/{ => jap-final}/pamE.c | 0 src/files/lang/jap-final/pamJ.c | 52 ++ src/files/lang/jap-final/pamP.c | 52 ++ src/files/lang/jap-final/pam_str_f.c | 52 ++ src/files/lang/jap-final/pam_str_g.c | 52 ++ src/files/lang/jap-final/pam_str_i.c | 52 ++ src/files/lang/jap-final/pam_str_s.c | 52 ++ src/files/lang/{ => jap-final}/peteE.c | 0 src/files/lang/jap-final/peteJ.c | 80 +++ src/files/lang/jap-final/peteP.c | 80 +++ src/files/lang/jap-final/pete_str_f.c | 80 +++ src/files/lang/jap-final/pete_str_g.c | 80 +++ src/files/lang/jap-final/pete_str_i.c | 80 +++ src/files/lang/jap-final/pete_str_s.c | 80 +++ src/files/lang/jap-final/propobjE.c | 92 ++++ src/files/lang/jap-final/propobjJ.c | 92 ++++ src/files/lang/jap-final/propobjP.c | 92 ++++ src/files/lang/jap-final/propobj_str_f.c | 92 ++++ src/files/lang/jap-final/propobj_str_g.c | 92 ++++ src/files/lang/jap-final/propobj_str_i.c | 92 ++++ src/files/lang/jap-final/propobj_str_s.c | 92 ++++ src/files/lang/{ => jap-final}/refE.c | 0 src/files/lang/{ => jap-final}/refJ.c | 0 src/files/lang/{ => jap-final}/refP.c | 0 src/files/lang/{ => jap-final}/ref_str_f.c | 0 src/files/lang/{ => jap-final}/ref_str_g.c | 0 src/files/lang/{ => jap-final}/ref_str_i.c | 0 src/files/lang/{ => jap-final}/ref_str_s.c | 0 src/files/lang/{ => jap-final}/ritE.c | 0 src/files/lang/jap-final/ritJ.c | 92 ++++ src/files/lang/jap-final/ritP.c | 92 ++++ src/files/lang/jap-final/rit_str_f.c | 92 ++++ src/files/lang/jap-final/rit_str_g.c | 92 ++++ src/files/lang/jap-final/rit_str_i.c | 92 ++++ src/files/lang/jap-final/rit_str_s.c | 92 ++++ src/files/lang/{ => jap-final}/runE.c | 0 src/files/lang/{ => jap-final}/runJ.c | 0 src/files/lang/{ => jap-final}/runP.c | 0 src/files/lang/{ => jap-final}/run_str_f.c | 0 src/files/lang/{ => jap-final}/run_str_g.c | 0 src/files/lang/{ => jap-final}/run_str_i.c | 0 src/files/lang/{ => jap-final}/run_str_s.c | 0 src/files/lang/{ => jap-final}/sevE.c | 0 src/files/lang/jap-final/sevJ.c | 20 + src/files/lang/jap-final/sevP.c | 20 + src/files/lang/jap-final/sev_str_f.c | 20 + src/files/lang/jap-final/sev_str_g.c | 20 + src/files/lang/jap-final/sev_str_i.c | 20 + src/files/lang/jap-final/sev_str_s.c | 20 + src/files/lang/{ => jap-final}/sevbE.c | 0 src/files/lang/{ => jap-final}/sevbJ.c | 0 src/files/lang/{ => jap-final}/sevbP.c | 0 src/files/lang/{ => jap-final}/sevb_str_f.c | 0 src/files/lang/{ => jap-final}/sevb_str_g.c | 0 src/files/lang/{ => jap-final}/sevb_str_i.c | 0 src/files/lang/{ => jap-final}/sevb_str_s.c | 0 src/files/lang/{ => jap-final}/sevxE.c | 0 src/files/lang/{ => jap-final}/sevxJ.c | 0 src/files/lang/{ => jap-final}/sevxP.c | 0 src/files/lang/{ => jap-final}/sevx_str_f.c | 0 src/files/lang/{ => jap-final}/sevx_str_g.c | 0 src/files/lang/{ => jap-final}/sevx_str_i.c | 0 src/files/lang/{ => jap-final}/sevx_str_s.c | 0 src/files/lang/{ => jap-final}/sevxbE.c | 0 src/files/lang/{ => jap-final}/sevxbJ.c | 0 src/files/lang/{ => jap-final}/sevxbP.c | 0 src/files/lang/{ => jap-final}/sevxb_str_f.c | 0 src/files/lang/{ => jap-final}/sevxb_str_g.c | 0 src/files/lang/{ => jap-final}/sevxb_str_i.c | 0 src/files/lang/{ => jap-final}/sevxb_str_s.c | 0 src/files/lang/{ => jap-final}/shoE.c | 0 src/files/lang/jap-final/shoJ.c | 60 +++ src/files/lang/jap-final/shoP.c | 60 +++ src/files/lang/jap-final/sho_str_f.c | 60 +++ src/files/lang/jap-final/sho_str_g.c | 60 +++ src/files/lang/jap-final/sho_str_i.c | 60 +++ src/files/lang/jap-final/sho_str_s.c | 60 +++ src/files/lang/{ => jap-final}/siloE.c | 0 src/files/lang/{ => jap-final}/siloJ.c | 0 src/files/lang/{ => jap-final}/siloP.c | 0 src/files/lang/{ => jap-final}/silo_str_f.c | 0 src/files/lang/{ => jap-final}/silo_str_g.c | 0 src/files/lang/{ => jap-final}/silo_str_i.c | 0 src/files/lang/{ => jap-final}/silo_str_s.c | 0 src/files/lang/{ => jap-final}/statE.c | 0 src/files/lang/jap-final/statJ.c | 16 + src/files/lang/{ => jap-final}/statP.c | 0 src/files/lang/jap-final/stat_str_f.c | 16 + src/files/lang/jap-final/stat_str_g.c | 16 + src/files/lang/jap-final/stat_str_i.c | 16 + src/files/lang/jap-final/stat_str_s.c | 16 + src/files/lang/jap-final/titleE.c | 200 +++++++ src/files/lang/jap-final/titleJ.c | 200 +++++++ src/files/lang/jap-final/titleP.c | 200 +++++++ src/files/lang/jap-final/title_str_f.c | 188 +++++++ src/files/lang/jap-final/title_str_g.c | 188 +++++++ src/files/lang/jap-final/title_str_i.c | 188 +++++++ src/files/lang/jap-final/title_str_s.c | 188 +++++++ src/files/lang/{ => jap-final}/traE.c | 0 src/files/lang/jap-final/traJ.c | 92 ++++ src/files/lang/jap-final/traP.c | 92 ++++ src/files/lang/jap-final/tra_str_f.c | 92 ++++ src/files/lang/jap-final/tra_str_g.c | 92 ++++ src/files/lang/jap-final/tra_str_i.c | 92 ++++ src/files/lang/jap-final/tra_str_s.c | 92 ++++ src/files/lang/{ => jap-final}/uffE.c | 0 src/files/lang/{ => jap-final}/uffJ.c | 0 src/files/lang/{ => jap-final}/uffP.c | 0 src/files/lang/{ => jap-final}/uff_str_f.c | 0 src/files/lang/{ => jap-final}/uff_str_g.c | 0 src/files/lang/{ => jap-final}/uff_str_i.c | 0 src/files/lang/{ => jap-final}/uff_str_s.c | 0 src/files/lang/{ => jap-final}/waxE.c | 0 src/files/lang/jap-final/waxJ.c | 32 ++ src/files/lang/jap-final/waxP.c | 32 ++ src/files/lang/jap-final/wax_str_f.c | 32 ++ src/files/lang/jap-final/wax_str_g.c | 32 ++ src/files/lang/jap-final/wax_str_i.c | 32 ++ src/files/lang/jap-final/wax_str_s.c | 32 ++ src/files/lang/ntsc-1.0/ameE.c | 116 ++++ src/files/lang/{ => ntsc-1.0}/ameJ.c | 0 src/files/lang/{ => ntsc-1.0}/ameP.c | 0 src/files/lang/{ => ntsc-1.0}/ame_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/ame_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/ame_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/ame_str_s.c | 0 src/files/lang/ntsc-1.0/archE.c | 3 + src/files/lang/ntsc-1.0/archJ.c | 3 + src/files/lang/ntsc-1.0/archP.c | 3 + src/files/lang/ntsc-1.0/arch_str_f.c | 3 + src/files/lang/ntsc-1.0/arch_str_g.c | 3 + src/files/lang/ntsc-1.0/arch_str_i.c | 3 + src/files/lang/ntsc-1.0/arch_str_s.c | 3 + src/files/lang/ntsc-1.0/arecE.c | 3 + src/files/lang/ntsc-1.0/arecJ.c | 3 + src/files/lang/ntsc-1.0/arecP.c | 3 + src/files/lang/ntsc-1.0/arec_str_f.c | 3 + src/files/lang/ntsc-1.0/arec_str_g.c | 3 + src/files/lang/ntsc-1.0/arec_str_i.c | 3 + src/files/lang/ntsc-1.0/arec_str_s.c | 3 + src/files/lang/ntsc-1.0/arkE.c | 80 +++ src/files/lang/{ => ntsc-1.0}/arkJ.c | 0 src/files/lang/{ => ntsc-1.0}/arkP.c | 0 src/files/lang/{ => ntsc-1.0}/ark_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/ark_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/ark_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/ark_str_s.c | 0 src/files/lang/ntsc-1.0/ashE.c | 3 + src/files/lang/ntsc-1.0/ashJ.c | 3 + src/files/lang/ntsc-1.0/ashP.c | 3 + src/files/lang/ntsc-1.0/ash_str_f.c | 3 + src/files/lang/ntsc-1.0/ash_str_g.c | 3 + src/files/lang/ntsc-1.0/ash_str_i.c | 3 + src/files/lang/ntsc-1.0/ash_str_s.c | 3 + .../lang/{ate_str_f.c => ntsc-1.0/ateE.c} | 0 src/files/lang/{ => ntsc-1.0}/ateJ.c | 0 .../lang/{ate_str_g.c => ntsc-1.0/ateP.c} | 0 .../{ate_str_i.c => ntsc-1.0/ate_str_f.c} | 0 .../{ate_str_s.c => ntsc-1.0/ate_str_g.c} | 0 src/files/lang/ntsc-1.0/ate_str_i.c | 20 + src/files/lang/ntsc-1.0/ate_str_s.c | 20 + src/files/lang/ntsc-1.0/aztE.c | 52 ++ src/files/lang/{ => ntsc-1.0}/aztJ.c | 0 src/files/lang/{ => ntsc-1.0}/aztP.c | 0 src/files/lang/{ => ntsc-1.0}/azt_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/azt_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/azt_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/azt_str_s.c | 0 src/files/lang/ntsc-1.0/catE.c | 3 + src/files/lang/ntsc-1.0/catJ.c | 3 + src/files/lang/ntsc-1.0/catP.c | 3 + src/files/lang/ntsc-1.0/cat_str_f.c | 3 + src/files/lang/ntsc-1.0/cat_str_g.c | 3 + src/files/lang/ntsc-1.0/cat_str_i.c | 3 + src/files/lang/ntsc-1.0/cat_str_s.c | 3 + src/files/lang/ntsc-1.0/caveE.c | 72 +++ src/files/lang/{ => ntsc-1.0}/caveJ.c | 0 src/files/lang/{ => ntsc-1.0}/caveP.c | 0 src/files/lang/{ => ntsc-1.0}/cave_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/cave_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/cave_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/cave_str_s.c | 0 src/files/lang/ntsc-1.0/cradE.c | 3 + src/files/lang/ntsc-1.0/cradJ.c | 3 + src/files/lang/ntsc-1.0/cradP.c | 3 + src/files/lang/ntsc-1.0/crad_str_f.c | 3 + src/files/lang/ntsc-1.0/crad_str_g.c | 3 + src/files/lang/ntsc-1.0/crad_str_i.c | 3 + src/files/lang/ntsc-1.0/crad_str_s.c | 3 + src/files/lang/ntsc-1.0/crypE.c | 3 + src/files/lang/ntsc-1.0/crypJ.c | 3 + src/files/lang/ntsc-1.0/crypP.c | 3 + src/files/lang/ntsc-1.0/cryp_str_f.c | 3 + src/files/lang/ntsc-1.0/cryp_str_g.c | 3 + src/files/lang/ntsc-1.0/cryp_str_i.c | 3 + src/files/lang/ntsc-1.0/cryp_str_s.c | 3 + src/files/lang/ntsc-1.0/damE.c | 52 ++ src/files/lang/{ => ntsc-1.0}/damJ.c | 0 src/files/lang/{ => ntsc-1.0}/damP.c | 0 src/files/lang/{ => ntsc-1.0}/dam_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/dam_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/dam_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/dam_str_s.c | 0 src/files/lang/ntsc-1.0/depoE.c | 88 +++ src/files/lang/{ => ntsc-1.0}/depoJ.c | 0 src/files/lang/{ => ntsc-1.0}/depoP.c | 0 src/files/lang/{ => ntsc-1.0}/depo_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/depo_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/depo_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/depo_str_s.c | 0 src/files/lang/ntsc-1.0/destE.c | 3 + src/files/lang/ntsc-1.0/destJ.c | 3 + src/files/lang/ntsc-1.0/destP.c | 3 + src/files/lang/ntsc-1.0/dest_str_f.c | 3 + src/files/lang/ntsc-1.0/dest_str_g.c | 3 + src/files/lang/ntsc-1.0/dest_str_i.c | 3 + src/files/lang/ntsc-1.0/dest_str_s.c | 3 + src/files/lang/{ => ntsc-1.0}/dishE.c | 0 src/files/lang/{ => ntsc-1.0}/dishJ.c | 0 src/files/lang/{ => ntsc-1.0}/dishP.c | 0 src/files/lang/{ => ntsc-1.0}/dish_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/dish_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/dish_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/dish_str_s.c | 0 src/files/lang/ntsc-1.0/earE.c | 112 ++++ src/files/lang/{ => ntsc-1.0}/earJ.c | 0 src/files/lang/{ => ntsc-1.0}/earP.c | 0 src/files/lang/{ => ntsc-1.0}/ear_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/ear_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/ear_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/ear_str_s.c | 0 src/files/lang/{ => ntsc-1.0}/eldE.c | 0 src/files/lang/{ => ntsc-1.0}/eldJ.c | 0 src/files/lang/{ => ntsc-1.0}/eldP.c | 0 src/files/lang/{ => ntsc-1.0}/eld_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/eld_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/eld_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/eld_str_s.c | 0 src/files/lang/{ => ntsc-1.0}/gunE.c | 0 src/files/lang/{ => ntsc-1.0}/gunJ.c | 0 src/files/lang/{ => ntsc-1.0}/gunP.c | 0 src/files/lang/{ => ntsc-1.0}/gun_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/gun_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/gun_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/gun_str_s.c | 0 src/files/lang/ntsc-1.0/impE.c | 68 +++ src/files/lang/{ => ntsc-1.0}/impJ.c | 0 src/files/lang/{ => ntsc-1.0}/impP.c | 0 src/files/lang/{ => ntsc-1.0}/imp_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/imp_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/imp_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/imp_str_s.c | 0 src/files/lang/ntsc-1.0/junE.c | 3 + src/files/lang/ntsc-1.0/junJ.c | 3 + src/files/lang/ntsc-1.0/junP.c | 3 + src/files/lang/ntsc-1.0/jun_str_f.c | 3 + src/files/lang/ntsc-1.0/jun_str_g.c | 3 + src/files/lang/ntsc-1.0/jun_str_i.c | 3 + src/files/lang/ntsc-1.0/jun_str_s.c | 3 + src/files/lang/ntsc-1.0/lamE.c | 3 + src/files/lang/ntsc-1.0/lamJ.c | 3 + src/files/lang/ntsc-1.0/lamP.c | 3 + src/files/lang/ntsc-1.0/lam_str_f.c | 3 + src/files/lang/ntsc-1.0/lam_str_g.c | 3 + src/files/lang/ntsc-1.0/lam_str_i.c | 3 + src/files/lang/ntsc-1.0/lam_str_s.c | 3 + src/files/lang/ntsc-1.0/leeE.c | 60 +++ src/files/lang/{ => ntsc-1.0}/leeJ.c | 0 src/files/lang/{ => ntsc-1.0}/leeP.c | 0 src/files/lang/{ => ntsc-1.0}/lee_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/lee_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/lee_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/lee_str_s.c | 0 src/files/lang/ntsc-1.0/lenE.c | 3 + src/files/lang/ntsc-1.0/lenJ.c | 3 + src/files/lang/ntsc-1.0/lenP.c | 3 + src/files/lang/ntsc-1.0/len_str_f.c | 3 + src/files/lang/ntsc-1.0/len_str_g.c | 3 + src/files/lang/ntsc-1.0/len_str_i.c | 3 + src/files/lang/ntsc-1.0/len_str_s.c | 3 + src/files/lang/ntsc-1.0/lipE.c | 112 ++++ src/files/lang/{ => ntsc-1.0}/lipJ.c | 0 src/files/lang/{ => ntsc-1.0}/lipP.c | 0 src/files/lang/{ => ntsc-1.0}/lip_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/lip_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/lip_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/lip_str_s.c | 0 src/files/lang/ntsc-1.0/lueE.c | 80 +++ src/files/lang/{ => ntsc-1.0}/lueJ.c | 0 src/files/lang/{ => ntsc-1.0}/lueP.c | 0 src/files/lang/{ => ntsc-1.0}/lue_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/lue_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/lue_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/lue_str_s.c | 0 src/files/lang/{ => ntsc-1.0}/miscE.c | 0 src/files/lang/{ => ntsc-1.0}/miscJ.c | 0 src/files/lang/{ => ntsc-1.0}/miscP.c | 0 src/files/lang/{ => ntsc-1.0}/misc_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/misc_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/misc_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/misc_str_s.c | 0 src/files/lang/ntsc-1.0/mp10E.c | 3 + src/files/lang/ntsc-1.0/mp10J.c | 3 + src/files/lang/ntsc-1.0/mp10P.c | 3 + src/files/lang/ntsc-1.0/mp10_str_f.c | 3 + src/files/lang/ntsc-1.0/mp10_str_g.c | 3 + src/files/lang/ntsc-1.0/mp10_str_i.c | 3 + src/files/lang/ntsc-1.0/mp10_str_s.c | 3 + src/files/lang/ntsc-1.0/mp11E.c | 3 + src/files/lang/ntsc-1.0/mp11J.c | 3 + src/files/lang/ntsc-1.0/mp11P.c | 3 + src/files/lang/ntsc-1.0/mp11_str_f.c | 3 + src/files/lang/ntsc-1.0/mp11_str_g.c | 3 + src/files/lang/ntsc-1.0/mp11_str_i.c | 3 + src/files/lang/ntsc-1.0/mp11_str_s.c | 3 + src/files/lang/ntsc-1.0/mp12E.c | 3 + src/files/lang/ntsc-1.0/mp12J.c | 3 + src/files/lang/ntsc-1.0/mp12P.c | 3 + src/files/lang/ntsc-1.0/mp12_str_f.c | 3 + src/files/lang/ntsc-1.0/mp12_str_g.c | 3 + src/files/lang/ntsc-1.0/mp12_str_i.c | 3 + src/files/lang/ntsc-1.0/mp12_str_s.c | 3 + src/files/lang/ntsc-1.0/mp13E.c | 3 + src/files/lang/ntsc-1.0/mp13J.c | 3 + src/files/lang/ntsc-1.0/mp13P.c | 3 + src/files/lang/ntsc-1.0/mp13_str_f.c | 3 + src/files/lang/ntsc-1.0/mp13_str_g.c | 3 + src/files/lang/ntsc-1.0/mp13_str_i.c | 3 + src/files/lang/ntsc-1.0/mp13_str_s.c | 3 + src/files/lang/ntsc-1.0/mp14E.c | 3 + src/files/lang/ntsc-1.0/mp14J.c | 3 + src/files/lang/ntsc-1.0/mp14P.c | 3 + src/files/lang/ntsc-1.0/mp14_str_f.c | 3 + src/files/lang/ntsc-1.0/mp14_str_g.c | 3 + src/files/lang/ntsc-1.0/mp14_str_i.c | 3 + src/files/lang/ntsc-1.0/mp14_str_s.c | 3 + src/files/lang/ntsc-1.0/mp15E.c | 3 + src/files/lang/ntsc-1.0/mp15J.c | 3 + src/files/lang/ntsc-1.0/mp15P.c | 3 + src/files/lang/ntsc-1.0/mp15_str_f.c | 3 + src/files/lang/ntsc-1.0/mp15_str_g.c | 3 + src/files/lang/ntsc-1.0/mp15_str_i.c | 3 + src/files/lang/ntsc-1.0/mp15_str_s.c | 3 + src/files/lang/ntsc-1.0/mp16E.c | 3 + src/files/lang/ntsc-1.0/mp16J.c | 3 + src/files/lang/ntsc-1.0/mp16P.c | 3 + src/files/lang/ntsc-1.0/mp16_str_f.c | 3 + src/files/lang/ntsc-1.0/mp16_str_g.c | 3 + src/files/lang/ntsc-1.0/mp16_str_i.c | 3 + src/files/lang/ntsc-1.0/mp16_str_s.c | 3 + src/files/lang/ntsc-1.0/mp17E.c | 3 + src/files/lang/ntsc-1.0/mp17J.c | 3 + src/files/lang/ntsc-1.0/mp17P.c | 3 + src/files/lang/ntsc-1.0/mp17_str_f.c | 3 + src/files/lang/ntsc-1.0/mp17_str_g.c | 3 + src/files/lang/ntsc-1.0/mp17_str_i.c | 3 + src/files/lang/ntsc-1.0/mp17_str_s.c | 3 + src/files/lang/ntsc-1.0/mp18E.c | 3 + src/files/lang/ntsc-1.0/mp18J.c | 3 + src/files/lang/ntsc-1.0/mp18P.c | 3 + src/files/lang/ntsc-1.0/mp18_str_f.c | 3 + src/files/lang/ntsc-1.0/mp18_str_g.c | 3 + src/files/lang/ntsc-1.0/mp18_str_i.c | 3 + src/files/lang/ntsc-1.0/mp18_str_s.c | 3 + src/files/lang/ntsc-1.0/mp19E.c | 3 + src/files/lang/ntsc-1.0/mp19J.c | 3 + src/files/lang/ntsc-1.0/mp19P.c | 3 + src/files/lang/ntsc-1.0/mp19_str_f.c | 3 + src/files/lang/ntsc-1.0/mp19_str_g.c | 3 + src/files/lang/ntsc-1.0/mp19_str_i.c | 3 + src/files/lang/ntsc-1.0/mp19_str_s.c | 3 + src/files/lang/ntsc-1.0/mp1E.c | 3 + src/files/lang/ntsc-1.0/mp1J.c | 3 + src/files/lang/ntsc-1.0/mp1P.c | 3 + src/files/lang/ntsc-1.0/mp1_str_f.c | 3 + src/files/lang/ntsc-1.0/mp1_str_g.c | 3 + src/files/lang/ntsc-1.0/mp1_str_i.c | 3 + src/files/lang/ntsc-1.0/mp1_str_s.c | 3 + src/files/lang/ntsc-1.0/mp20E.c | 3 + src/files/lang/ntsc-1.0/mp20J.c | 3 + src/files/lang/ntsc-1.0/mp20P.c | 3 + src/files/lang/ntsc-1.0/mp20_str_f.c | 3 + src/files/lang/ntsc-1.0/mp20_str_g.c | 3 + src/files/lang/ntsc-1.0/mp20_str_i.c | 3 + src/files/lang/ntsc-1.0/mp20_str_s.c | 3 + src/files/lang/ntsc-1.0/mp2E.c | 3 + src/files/lang/ntsc-1.0/mp2J.c | 3 + src/files/lang/ntsc-1.0/mp2P.c | 3 + src/files/lang/ntsc-1.0/mp2_str_f.c | 3 + src/files/lang/ntsc-1.0/mp2_str_g.c | 3 + src/files/lang/ntsc-1.0/mp2_str_i.c | 3 + src/files/lang/ntsc-1.0/mp2_str_s.c | 3 + src/files/lang/ntsc-1.0/mp3E.c | 3 + src/files/lang/ntsc-1.0/mp3J.c | 3 + src/files/lang/ntsc-1.0/mp3P.c | 3 + src/files/lang/ntsc-1.0/mp3_str_f.c | 3 + src/files/lang/ntsc-1.0/mp3_str_g.c | 3 + src/files/lang/ntsc-1.0/mp3_str_i.c | 3 + src/files/lang/ntsc-1.0/mp3_str_s.c | 3 + src/files/lang/ntsc-1.0/mp4E.c | 3 + src/files/lang/ntsc-1.0/mp4J.c | 3 + src/files/lang/ntsc-1.0/mp4P.c | 3 + src/files/lang/ntsc-1.0/mp4_str_f.c | 3 + src/files/lang/ntsc-1.0/mp4_str_g.c | 3 + src/files/lang/ntsc-1.0/mp4_str_i.c | 3 + src/files/lang/ntsc-1.0/mp4_str_s.c | 3 + src/files/lang/ntsc-1.0/mp5E.c | 3 + src/files/lang/ntsc-1.0/mp5J.c | 3 + src/files/lang/ntsc-1.0/mp5P.c | 3 + src/files/lang/ntsc-1.0/mp5_str_f.c | 3 + src/files/lang/ntsc-1.0/mp5_str_g.c | 3 + src/files/lang/ntsc-1.0/mp5_str_i.c | 3 + src/files/lang/ntsc-1.0/mp5_str_s.c | 3 + src/files/lang/ntsc-1.0/mp6E.c | 3 + src/files/lang/ntsc-1.0/mp6J.c | 3 + src/files/lang/ntsc-1.0/mp6P.c | 3 + src/files/lang/ntsc-1.0/mp6_str_f.c | 3 + src/files/lang/ntsc-1.0/mp6_str_g.c | 3 + src/files/lang/ntsc-1.0/mp6_str_i.c | 3 + src/files/lang/ntsc-1.0/mp6_str_s.c | 3 + src/files/lang/ntsc-1.0/mp7E.c | 3 + src/files/lang/ntsc-1.0/mp7J.c | 3 + src/files/lang/ntsc-1.0/mp7P.c | 3 + src/files/lang/ntsc-1.0/mp7_str_f.c | 3 + src/files/lang/ntsc-1.0/mp7_str_g.c | 3 + src/files/lang/ntsc-1.0/mp7_str_i.c | 3 + src/files/lang/ntsc-1.0/mp7_str_s.c | 3 + src/files/lang/ntsc-1.0/mp8E.c | 3 + src/files/lang/ntsc-1.0/mp8J.c | 3 + src/files/lang/ntsc-1.0/mp8P.c | 3 + src/files/lang/ntsc-1.0/mp8_str_f.c | 3 + src/files/lang/ntsc-1.0/mp8_str_g.c | 3 + src/files/lang/ntsc-1.0/mp8_str_i.c | 3 + src/files/lang/ntsc-1.0/mp8_str_s.c | 3 + src/files/lang/ntsc-1.0/mp9E.c | 3 + src/files/lang/ntsc-1.0/mp9J.c | 3 + src/files/lang/ntsc-1.0/mp9P.c | 3 + src/files/lang/ntsc-1.0/mp9_str_f.c | 3 + src/files/lang/ntsc-1.0/mp9_str_g.c | 3 + src/files/lang/ntsc-1.0/mp9_str_i.c | 3 + src/files/lang/ntsc-1.0/mp9_str_s.c | 3 + src/files/lang/ntsc-1.0/mpmenuE.c | 500 +++++++++++++++++ src/files/lang/{ => ntsc-1.0}/mpmenuJ.c | 0 src/files/lang/{ => ntsc-1.0}/mpmenuP.c | 0 src/files/lang/{ => ntsc-1.0}/mpmenu_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/mpmenu_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/mpmenu_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/mpmenu_str_s.c | 0 src/files/lang/{ => ntsc-1.0}/mpweaponsE.c | 0 src/files/lang/{ => ntsc-1.0}/mpweaponsJ.c | 0 src/files/lang/{ => ntsc-1.0}/mpweaponsP.c | 0 .../lang/{ => ntsc-1.0}/mpweapons_str_f.c | 0 .../lang/{ => ntsc-1.0}/mpweapons_str_g.c | 0 .../lang/{ => ntsc-1.0}/mpweapons_str_i.c | 0 .../lang/{ => ntsc-1.0}/mpweapons_str_s.c | 0 src/files/lang/ntsc-1.0/oatE.c | 3 + src/files/lang/ntsc-1.0/oatJ.c | 3 + src/files/lang/ntsc-1.0/oatP.c | 3 + src/files/lang/ntsc-1.0/oat_str_f.c | 3 + src/files/lang/ntsc-1.0/oat_str_g.c | 3 + src/files/lang/ntsc-1.0/oat_str_i.c | 3 + src/files/lang/ntsc-1.0/oat_str_s.c | 3 + src/files/lang/ntsc-1.0/oldE.c | 3 + src/files/lang/ntsc-1.0/oldJ.c | 3 + src/files/lang/ntsc-1.0/oldP.c | 3 + src/files/lang/ntsc-1.0/old_str_f.c | 3 + src/files/lang/ntsc-1.0/old_str_g.c | 3 + src/files/lang/ntsc-1.0/old_str_i.c | 3 + src/files/lang/ntsc-1.0/old_str_s.c | 3 + src/files/lang/{ => ntsc-1.0}/optionsE.c | 0 src/files/lang/{ => ntsc-1.0}/optionsJ.c | 0 src/files/lang/{ => ntsc-1.0}/optionsP.c | 0 src/files/lang/{ => ntsc-1.0}/options_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/options_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/options_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/options_str_s.c | 0 src/files/lang/ntsc-1.0/pamE.c | 52 ++ src/files/lang/{ => ntsc-1.0}/pamJ.c | 0 src/files/lang/{ => ntsc-1.0}/pamP.c | 0 src/files/lang/{ => ntsc-1.0}/pam_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/pam_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/pam_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/pam_str_s.c | 0 src/files/lang/ntsc-1.0/peteE.c | 80 +++ src/files/lang/{ => ntsc-1.0}/peteJ.c | 0 src/files/lang/{ => ntsc-1.0}/peteP.c | 0 src/files/lang/{ => ntsc-1.0}/pete_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/pete_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/pete_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/pete_str_s.c | 0 src/files/lang/{ => ntsc-1.0}/propobjE.c | 0 src/files/lang/{ => ntsc-1.0}/propobjJ.c | 0 src/files/lang/{ => ntsc-1.0}/propobjP.c | 0 src/files/lang/{ => ntsc-1.0}/propobj_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/propobj_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/propobj_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/propobj_str_s.c | 0 src/files/lang/ntsc-1.0/refE.c | 3 + src/files/lang/ntsc-1.0/refJ.c | 3 + src/files/lang/ntsc-1.0/refP.c | 3 + src/files/lang/ntsc-1.0/ref_str_f.c | 3 + src/files/lang/ntsc-1.0/ref_str_g.c | 3 + src/files/lang/ntsc-1.0/ref_str_i.c | 3 + src/files/lang/ntsc-1.0/ref_str_s.c | 3 + src/files/lang/ntsc-1.0/ritE.c | 92 ++++ src/files/lang/{ => ntsc-1.0}/ritJ.c | 0 src/files/lang/{ => ntsc-1.0}/ritP.c | 0 src/files/lang/{ => ntsc-1.0}/rit_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/rit_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/rit_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/rit_str_s.c | 0 src/files/lang/ntsc-1.0/runE.c | 3 + src/files/lang/ntsc-1.0/runJ.c | 3 + src/files/lang/ntsc-1.0/runP.c | 3 + src/files/lang/ntsc-1.0/run_str_f.c | 3 + src/files/lang/ntsc-1.0/run_str_g.c | 3 + src/files/lang/ntsc-1.0/run_str_i.c | 3 + src/files/lang/ntsc-1.0/run_str_s.c | 3 + src/files/lang/ntsc-1.0/sevE.c | 20 + src/files/lang/{ => ntsc-1.0}/sevJ.c | 0 src/files/lang/{ => ntsc-1.0}/sevP.c | 0 src/files/lang/{ => ntsc-1.0}/sev_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/sev_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/sev_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/sev_str_s.c | 0 src/files/lang/ntsc-1.0/sevbE.c | 12 + src/files/lang/ntsc-1.0/sevbJ.c | 12 + src/files/lang/ntsc-1.0/sevbP.c | 12 + src/files/lang/ntsc-1.0/sevb_str_f.c | 12 + src/files/lang/ntsc-1.0/sevb_str_g.c | 12 + src/files/lang/ntsc-1.0/sevb_str_i.c | 12 + src/files/lang/ntsc-1.0/sevb_str_s.c | 12 + src/files/lang/ntsc-1.0/sevxE.c | 3 + src/files/lang/ntsc-1.0/sevxJ.c | 3 + src/files/lang/ntsc-1.0/sevxP.c | 3 + src/files/lang/ntsc-1.0/sevx_str_f.c | 3 + src/files/lang/ntsc-1.0/sevx_str_g.c | 3 + src/files/lang/ntsc-1.0/sevx_str_i.c | 3 + src/files/lang/ntsc-1.0/sevx_str_s.c | 3 + src/files/lang/ntsc-1.0/sevxbE.c | 3 + src/files/lang/ntsc-1.0/sevxbJ.c | 3 + src/files/lang/ntsc-1.0/sevxbP.c | 3 + src/files/lang/ntsc-1.0/sevxb_str_f.c | 3 + src/files/lang/ntsc-1.0/sevxb_str_g.c | 3 + src/files/lang/ntsc-1.0/sevxb_str_i.c | 3 + src/files/lang/ntsc-1.0/sevxb_str_s.c | 3 + src/files/lang/ntsc-1.0/shoE.c | 60 +++ src/files/lang/{ => ntsc-1.0}/shoJ.c | 0 src/files/lang/{ => ntsc-1.0}/shoP.c | 0 src/files/lang/{ => ntsc-1.0}/sho_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/sho_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/sho_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/sho_str_s.c | 0 src/files/lang/ntsc-1.0/siloE.c | 3 + src/files/lang/ntsc-1.0/siloJ.c | 3 + src/files/lang/ntsc-1.0/siloP.c | 3 + src/files/lang/ntsc-1.0/silo_str_f.c | 3 + src/files/lang/ntsc-1.0/silo_str_g.c | 3 + src/files/lang/ntsc-1.0/silo_str_i.c | 3 + src/files/lang/ntsc-1.0/silo_str_s.c | 3 + .../lang/{stat_str_f.c => ntsc-1.0/statE.c} | 0 src/files/lang/{ => ntsc-1.0}/statJ.c | 0 .../lang/{stat_str_g.c => ntsc-1.0/statP.c} | 0 .../{stat_str_i.c => ntsc-1.0/stat_str_f.c} | 0 .../{stat_str_s.c => ntsc-1.0/stat_str_g.c} | 0 src/files/lang/ntsc-1.0/stat_str_i.c | 16 + src/files/lang/ntsc-1.0/stat_str_s.c | 16 + src/files/lang/{ => ntsc-1.0}/titleE.c | 0 src/files/lang/{ => ntsc-1.0}/titleJ.c | 0 src/files/lang/{ => ntsc-1.0}/titleP.c | 0 src/files/lang/{ => ntsc-1.0}/title_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/title_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/title_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/title_str_s.c | 0 src/files/lang/ntsc-1.0/traE.c | 92 ++++ src/files/lang/{ => ntsc-1.0}/traJ.c | 0 src/files/lang/{ => ntsc-1.0}/traP.c | 0 src/files/lang/{ => ntsc-1.0}/tra_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/tra_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/tra_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/tra_str_s.c | 0 src/files/lang/ntsc-1.0/uffE.c | 3 + src/files/lang/ntsc-1.0/uffJ.c | 3 + src/files/lang/ntsc-1.0/uffP.c | 3 + src/files/lang/ntsc-1.0/uff_str_f.c | 3 + src/files/lang/ntsc-1.0/uff_str_g.c | 3 + src/files/lang/ntsc-1.0/uff_str_i.c | 3 + src/files/lang/ntsc-1.0/uff_str_s.c | 3 + src/files/lang/ntsc-1.0/waxE.c | 32 ++ src/files/lang/{ => ntsc-1.0}/waxJ.c | 0 src/files/lang/{ => ntsc-1.0}/waxP.c | 0 src/files/lang/{ => ntsc-1.0}/wax_str_f.c | 0 src/files/lang/{ => ntsc-1.0}/wax_str_g.c | 0 src/files/lang/{ => ntsc-1.0}/wax_str_i.c | 0 src/files/lang/{ => ntsc-1.0}/wax_str_s.c | 0 src/files/lang/ntsc-beta/ameE.c | 116 ++++ src/files/lang/ntsc-beta/ameJ.c | 116 ++++ src/files/lang/ntsc-beta/ameP.c | 116 ++++ src/files/lang/ntsc-beta/ame_str_f.c | 116 ++++ src/files/lang/ntsc-beta/ame_str_g.c | 116 ++++ src/files/lang/ntsc-beta/ame_str_i.c | 116 ++++ src/files/lang/ntsc-beta/ame_str_s.c | 116 ++++ src/files/lang/ntsc-beta/archE.c | 3 + src/files/lang/ntsc-beta/archJ.c | 3 + src/files/lang/ntsc-beta/archP.c | 3 + src/files/lang/ntsc-beta/arch_str_f.c | 3 + src/files/lang/ntsc-beta/arch_str_g.c | 3 + src/files/lang/ntsc-beta/arch_str_i.c | 3 + src/files/lang/ntsc-beta/arch_str_s.c | 3 + src/files/lang/ntsc-beta/arecE.c | 3 + src/files/lang/ntsc-beta/arecJ.c | 3 + src/files/lang/ntsc-beta/arecP.c | 3 + src/files/lang/ntsc-beta/arec_str_f.c | 3 + src/files/lang/ntsc-beta/arec_str_g.c | 3 + src/files/lang/ntsc-beta/arec_str_i.c | 3 + src/files/lang/ntsc-beta/arec_str_s.c | 3 + src/files/lang/ntsc-beta/arkE.c | 80 +++ src/files/lang/ntsc-beta/arkJ.c | 80 +++ src/files/lang/ntsc-beta/arkP.c | 80 +++ src/files/lang/ntsc-beta/ark_str_f.c | 80 +++ src/files/lang/ntsc-beta/ark_str_g.c | 80 +++ src/files/lang/ntsc-beta/ark_str_i.c | 80 +++ src/files/lang/ntsc-beta/ark_str_s.c | 80 +++ src/files/lang/ntsc-beta/ashE.c | 3 + src/files/lang/ntsc-beta/ashJ.c | 3 + src/files/lang/ntsc-beta/ashP.c | 3 + src/files/lang/ntsc-beta/ash_str_f.c | 3 + src/files/lang/ntsc-beta/ash_str_g.c | 3 + src/files/lang/ntsc-beta/ash_str_i.c | 3 + src/files/lang/ntsc-beta/ash_str_s.c | 3 + src/files/lang/ntsc-beta/ateE.c | 20 + src/files/lang/ntsc-beta/ateJ.c | 20 + src/files/lang/ntsc-beta/ateP.c | 20 + src/files/lang/ntsc-beta/ate_str_f.c | 20 + src/files/lang/ntsc-beta/ate_str_g.c | 20 + src/files/lang/ntsc-beta/ate_str_i.c | 20 + src/files/lang/ntsc-beta/ate_str_s.c | 20 + src/files/lang/ntsc-beta/aztE.c | 52 ++ src/files/lang/ntsc-beta/aztJ.c | 52 ++ src/files/lang/ntsc-beta/aztP.c | 52 ++ src/files/lang/ntsc-beta/azt_str_f.c | 52 ++ src/files/lang/ntsc-beta/azt_str_g.c | 52 ++ src/files/lang/ntsc-beta/azt_str_i.c | 52 ++ src/files/lang/ntsc-beta/azt_str_s.c | 52 ++ src/files/lang/ntsc-beta/catE.c | 3 + src/files/lang/ntsc-beta/catJ.c | 3 + src/files/lang/ntsc-beta/catP.c | 3 + src/files/lang/ntsc-beta/cat_str_f.c | 3 + src/files/lang/ntsc-beta/cat_str_g.c | 3 + src/files/lang/ntsc-beta/cat_str_i.c | 3 + src/files/lang/ntsc-beta/cat_str_s.c | 3 + src/files/lang/ntsc-beta/caveE.c | 72 +++ src/files/lang/ntsc-beta/caveJ.c | 72 +++ src/files/lang/ntsc-beta/caveP.c | 72 +++ src/files/lang/ntsc-beta/cave_str_f.c | 72 +++ src/files/lang/ntsc-beta/cave_str_g.c | 72 +++ src/files/lang/ntsc-beta/cave_str_i.c | 72 +++ src/files/lang/ntsc-beta/cave_str_s.c | 72 +++ src/files/lang/ntsc-beta/cradE.c | 3 + src/files/lang/ntsc-beta/cradJ.c | 3 + src/files/lang/ntsc-beta/cradP.c | 3 + src/files/lang/ntsc-beta/crad_str_f.c | 3 + src/files/lang/ntsc-beta/crad_str_g.c | 3 + src/files/lang/ntsc-beta/crad_str_i.c | 3 + src/files/lang/ntsc-beta/crad_str_s.c | 3 + src/files/lang/ntsc-beta/crypE.c | 3 + src/files/lang/ntsc-beta/crypJ.c | 3 + src/files/lang/ntsc-beta/crypP.c | 3 + src/files/lang/ntsc-beta/cryp_str_f.c | 3 + src/files/lang/ntsc-beta/cryp_str_g.c | 3 + src/files/lang/ntsc-beta/cryp_str_i.c | 3 + src/files/lang/ntsc-beta/cryp_str_s.c | 3 + src/files/lang/ntsc-beta/damE.c | 52 ++ src/files/lang/ntsc-beta/damJ.c | 52 ++ src/files/lang/ntsc-beta/damP.c | 52 ++ src/files/lang/ntsc-beta/dam_str_f.c | 52 ++ src/files/lang/ntsc-beta/dam_str_g.c | 52 ++ src/files/lang/ntsc-beta/dam_str_i.c | 52 ++ src/files/lang/ntsc-beta/dam_str_s.c | 52 ++ src/files/lang/ntsc-beta/depoE.c | 88 +++ src/files/lang/ntsc-beta/depoJ.c | 88 +++ src/files/lang/ntsc-beta/depoP.c | 88 +++ src/files/lang/ntsc-beta/depo_str_f.c | 88 +++ src/files/lang/ntsc-beta/depo_str_g.c | 88 +++ src/files/lang/ntsc-beta/depo_str_i.c | 88 +++ src/files/lang/ntsc-beta/depo_str_s.c | 88 +++ src/files/lang/ntsc-beta/destE.c | 3 + src/files/lang/ntsc-beta/destJ.c | 3 + src/files/lang/ntsc-beta/destP.c | 3 + src/files/lang/ntsc-beta/dest_str_f.c | 3 + src/files/lang/ntsc-beta/dest_str_g.c | 3 + src/files/lang/ntsc-beta/dest_str_i.c | 3 + src/files/lang/ntsc-beta/dest_str_s.c | 3 + src/files/lang/ntsc-beta/dishE.c | 132 +++++ src/files/lang/ntsc-beta/dishJ.c | 132 +++++ src/files/lang/ntsc-beta/dishP.c | 132 +++++ src/files/lang/ntsc-beta/dish_str_f.c | 132 +++++ src/files/lang/ntsc-beta/dish_str_g.c | 132 +++++ src/files/lang/ntsc-beta/dish_str_i.c | 132 +++++ src/files/lang/ntsc-beta/dish_str_s.c | 132 +++++ src/files/lang/ntsc-beta/earE.c | 112 ++++ src/files/lang/ntsc-beta/earJ.c | 112 ++++ src/files/lang/ntsc-beta/earP.c | 112 ++++ src/files/lang/ntsc-beta/ear_str_f.c | 112 ++++ src/files/lang/ntsc-beta/ear_str_g.c | 112 ++++ src/files/lang/ntsc-beta/ear_str_i.c | 112 ++++ src/files/lang/ntsc-beta/ear_str_s.c | 112 ++++ src/files/lang/ntsc-beta/eldE.c | 56 ++ src/files/lang/ntsc-beta/eldJ.c | 56 ++ src/files/lang/ntsc-beta/eldP.c | 56 ++ src/files/lang/ntsc-beta/eld_str_f.c | 56 ++ src/files/lang/ntsc-beta/eld_str_g.c | 56 ++ src/files/lang/ntsc-beta/eld_str_i.c | 56 ++ src/files/lang/ntsc-beta/eld_str_s.c | 56 ++ src/files/lang/ntsc-beta/gunE.c | 244 +++++++++ src/files/lang/ntsc-beta/gunJ.c | 244 +++++++++ src/files/lang/ntsc-beta/gunP.c | 244 +++++++++ src/files/lang/ntsc-beta/gun_str_f.c | 244 +++++++++ src/files/lang/ntsc-beta/gun_str_g.c | 244 +++++++++ src/files/lang/ntsc-beta/gun_str_i.c | 244 +++++++++ src/files/lang/ntsc-beta/gun_str_s.c | 244 +++++++++ src/files/lang/ntsc-beta/impE.c | 68 +++ src/files/lang/ntsc-beta/impJ.c | 68 +++ src/files/lang/ntsc-beta/impP.c | 68 +++ src/files/lang/ntsc-beta/imp_str_f.c | 68 +++ src/files/lang/ntsc-beta/imp_str_g.c | 68 +++ src/files/lang/ntsc-beta/imp_str_i.c | 68 +++ src/files/lang/ntsc-beta/imp_str_s.c | 68 +++ src/files/lang/ntsc-beta/junE.c | 3 + src/files/lang/ntsc-beta/junJ.c | 3 + src/files/lang/ntsc-beta/junP.c | 3 + src/files/lang/ntsc-beta/jun_str_f.c | 3 + src/files/lang/ntsc-beta/jun_str_g.c | 3 + src/files/lang/ntsc-beta/jun_str_i.c | 3 + src/files/lang/ntsc-beta/jun_str_s.c | 3 + src/files/lang/ntsc-beta/lamE.c | 3 + src/files/lang/ntsc-beta/lamJ.c | 3 + src/files/lang/ntsc-beta/lamP.c | 3 + src/files/lang/ntsc-beta/lam_str_f.c | 3 + src/files/lang/ntsc-beta/lam_str_g.c | 3 + src/files/lang/ntsc-beta/lam_str_i.c | 3 + src/files/lang/ntsc-beta/lam_str_s.c | 3 + src/files/lang/ntsc-beta/leeE.c | 60 +++ src/files/lang/ntsc-beta/leeJ.c | 60 +++ src/files/lang/ntsc-beta/leeP.c | 60 +++ src/files/lang/ntsc-beta/lee_str_f.c | 60 +++ src/files/lang/ntsc-beta/lee_str_g.c | 60 +++ src/files/lang/ntsc-beta/lee_str_i.c | 60 +++ src/files/lang/ntsc-beta/lee_str_s.c | 60 +++ src/files/lang/ntsc-beta/lenE.c | 3 + src/files/lang/ntsc-beta/lenJ.c | 3 + src/files/lang/ntsc-beta/lenP.c | 3 + src/files/lang/ntsc-beta/len_str_f.c | 3 + src/files/lang/ntsc-beta/len_str_g.c | 3 + src/files/lang/ntsc-beta/len_str_i.c | 3 + src/files/lang/ntsc-beta/len_str_s.c | 3 + src/files/lang/ntsc-beta/lipE.c | 112 ++++ src/files/lang/ntsc-beta/lipJ.c | 112 ++++ src/files/lang/ntsc-beta/lipP.c | 112 ++++ src/files/lang/ntsc-beta/lip_str_f.c | 112 ++++ src/files/lang/ntsc-beta/lip_str_g.c | 112 ++++ src/files/lang/ntsc-beta/lip_str_i.c | 112 ++++ src/files/lang/ntsc-beta/lip_str_s.c | 112 ++++ src/files/lang/ntsc-beta/lueE.c | 80 +++ src/files/lang/ntsc-beta/lueJ.c | 80 +++ src/files/lang/ntsc-beta/lueP.c | 80 +++ src/files/lang/ntsc-beta/lue_str_f.c | 80 +++ src/files/lang/ntsc-beta/lue_str_g.c | 80 +++ src/files/lang/ntsc-beta/lue_str_i.c | 80 +++ src/files/lang/ntsc-beta/lue_str_s.c | 80 +++ src/files/lang/ntsc-beta/miscE.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/miscJ.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/miscP.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/misc_str_f.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/misc_str_g.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/misc_str_i.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/misc_str_s.c | 480 +++++++++++++++++ src/files/lang/ntsc-beta/mp10E.c | 3 + src/files/lang/ntsc-beta/mp10J.c | 3 + src/files/lang/ntsc-beta/mp10P.c | 3 + src/files/lang/ntsc-beta/mp10_str_f.c | 3 + src/files/lang/ntsc-beta/mp10_str_g.c | 3 + src/files/lang/ntsc-beta/mp10_str_i.c | 3 + src/files/lang/ntsc-beta/mp10_str_s.c | 3 + src/files/lang/ntsc-beta/mp11E.c | 3 + src/files/lang/ntsc-beta/mp11J.c | 3 + src/files/lang/ntsc-beta/mp11P.c | 3 + src/files/lang/ntsc-beta/mp11_str_f.c | 3 + src/files/lang/ntsc-beta/mp11_str_g.c | 3 + src/files/lang/ntsc-beta/mp11_str_i.c | 3 + src/files/lang/ntsc-beta/mp11_str_s.c | 3 + src/files/lang/ntsc-beta/mp12E.c | 3 + src/files/lang/ntsc-beta/mp12J.c | 3 + src/files/lang/ntsc-beta/mp12P.c | 3 + src/files/lang/ntsc-beta/mp12_str_f.c | 3 + src/files/lang/ntsc-beta/mp12_str_g.c | 3 + src/files/lang/ntsc-beta/mp12_str_i.c | 3 + src/files/lang/ntsc-beta/mp12_str_s.c | 3 + src/files/lang/ntsc-beta/mp13E.c | 3 + src/files/lang/ntsc-beta/mp13J.c | 3 + src/files/lang/ntsc-beta/mp13P.c | 3 + src/files/lang/ntsc-beta/mp13_str_f.c | 3 + src/files/lang/ntsc-beta/mp13_str_g.c | 3 + src/files/lang/ntsc-beta/mp13_str_i.c | 3 + src/files/lang/ntsc-beta/mp13_str_s.c | 3 + src/files/lang/ntsc-beta/mp14E.c | 3 + src/files/lang/ntsc-beta/mp14J.c | 3 + src/files/lang/ntsc-beta/mp14P.c | 3 + src/files/lang/ntsc-beta/mp14_str_f.c | 3 + src/files/lang/ntsc-beta/mp14_str_g.c | 3 + src/files/lang/ntsc-beta/mp14_str_i.c | 3 + src/files/lang/ntsc-beta/mp14_str_s.c | 3 + src/files/lang/ntsc-beta/mp15E.c | 3 + src/files/lang/ntsc-beta/mp15J.c | 3 + src/files/lang/ntsc-beta/mp15P.c | 3 + src/files/lang/ntsc-beta/mp15_str_f.c | 3 + src/files/lang/ntsc-beta/mp15_str_g.c | 3 + src/files/lang/ntsc-beta/mp15_str_i.c | 3 + src/files/lang/ntsc-beta/mp15_str_s.c | 3 + src/files/lang/ntsc-beta/mp16E.c | 3 + src/files/lang/ntsc-beta/mp16J.c | 3 + src/files/lang/ntsc-beta/mp16P.c | 3 + src/files/lang/ntsc-beta/mp16_str_f.c | 3 + src/files/lang/ntsc-beta/mp16_str_g.c | 3 + src/files/lang/ntsc-beta/mp16_str_i.c | 3 + src/files/lang/ntsc-beta/mp16_str_s.c | 3 + src/files/lang/ntsc-beta/mp17E.c | 3 + src/files/lang/ntsc-beta/mp17J.c | 3 + src/files/lang/ntsc-beta/mp17P.c | 3 + src/files/lang/ntsc-beta/mp17_str_f.c | 3 + src/files/lang/ntsc-beta/mp17_str_g.c | 3 + src/files/lang/ntsc-beta/mp17_str_i.c | 3 + src/files/lang/ntsc-beta/mp17_str_s.c | 3 + src/files/lang/ntsc-beta/mp18E.c | 3 + src/files/lang/ntsc-beta/mp18J.c | 3 + src/files/lang/ntsc-beta/mp18P.c | 3 + src/files/lang/ntsc-beta/mp18_str_f.c | 3 + src/files/lang/ntsc-beta/mp18_str_g.c | 3 + src/files/lang/ntsc-beta/mp18_str_i.c | 3 + src/files/lang/ntsc-beta/mp18_str_s.c | 3 + src/files/lang/ntsc-beta/mp19E.c | 3 + src/files/lang/ntsc-beta/mp19J.c | 3 + src/files/lang/ntsc-beta/mp19P.c | 3 + src/files/lang/ntsc-beta/mp19_str_f.c | 3 + src/files/lang/ntsc-beta/mp19_str_g.c | 3 + src/files/lang/ntsc-beta/mp19_str_i.c | 3 + src/files/lang/ntsc-beta/mp19_str_s.c | 3 + src/files/lang/ntsc-beta/mp1E.c | 3 + src/files/lang/ntsc-beta/mp1J.c | 3 + src/files/lang/ntsc-beta/mp1P.c | 3 + src/files/lang/ntsc-beta/mp1_str_f.c | 3 + src/files/lang/ntsc-beta/mp1_str_g.c | 3 + src/files/lang/ntsc-beta/mp1_str_i.c | 3 + src/files/lang/ntsc-beta/mp1_str_s.c | 3 + src/files/lang/ntsc-beta/mp20E.c | 3 + src/files/lang/ntsc-beta/mp20J.c | 3 + src/files/lang/ntsc-beta/mp20P.c | 3 + src/files/lang/ntsc-beta/mp20_str_f.c | 3 + src/files/lang/ntsc-beta/mp20_str_g.c | 3 + src/files/lang/ntsc-beta/mp20_str_i.c | 3 + src/files/lang/ntsc-beta/mp20_str_s.c | 3 + src/files/lang/ntsc-beta/mp2E.c | 3 + src/files/lang/ntsc-beta/mp2J.c | 3 + src/files/lang/ntsc-beta/mp2P.c | 3 + src/files/lang/ntsc-beta/mp2_str_f.c | 3 + src/files/lang/ntsc-beta/mp2_str_g.c | 3 + src/files/lang/ntsc-beta/mp2_str_i.c | 3 + src/files/lang/ntsc-beta/mp2_str_s.c | 3 + src/files/lang/ntsc-beta/mp3E.c | 3 + src/files/lang/ntsc-beta/mp3J.c | 3 + src/files/lang/ntsc-beta/mp3P.c | 3 + src/files/lang/ntsc-beta/mp3_str_f.c | 3 + src/files/lang/ntsc-beta/mp3_str_g.c | 3 + src/files/lang/ntsc-beta/mp3_str_i.c | 3 + src/files/lang/ntsc-beta/mp3_str_s.c | 3 + src/files/lang/ntsc-beta/mp4E.c | 3 + src/files/lang/ntsc-beta/mp4J.c | 3 + src/files/lang/ntsc-beta/mp4P.c | 3 + src/files/lang/ntsc-beta/mp4_str_f.c | 3 + src/files/lang/ntsc-beta/mp4_str_g.c | 3 + src/files/lang/ntsc-beta/mp4_str_i.c | 3 + src/files/lang/ntsc-beta/mp4_str_s.c | 3 + src/files/lang/ntsc-beta/mp5E.c | 3 + src/files/lang/ntsc-beta/mp5J.c | 3 + src/files/lang/ntsc-beta/mp5P.c | 3 + src/files/lang/ntsc-beta/mp5_str_f.c | 3 + src/files/lang/ntsc-beta/mp5_str_g.c | 3 + src/files/lang/ntsc-beta/mp5_str_i.c | 3 + src/files/lang/ntsc-beta/mp5_str_s.c | 3 + src/files/lang/ntsc-beta/mp6E.c | 3 + src/files/lang/ntsc-beta/mp6J.c | 3 + src/files/lang/ntsc-beta/mp6P.c | 3 + src/files/lang/ntsc-beta/mp6_str_f.c | 3 + src/files/lang/ntsc-beta/mp6_str_g.c | 3 + src/files/lang/ntsc-beta/mp6_str_i.c | 3 + src/files/lang/ntsc-beta/mp6_str_s.c | 3 + src/files/lang/ntsc-beta/mp7E.c | 3 + src/files/lang/ntsc-beta/mp7J.c | 3 + src/files/lang/ntsc-beta/mp7P.c | 3 + src/files/lang/ntsc-beta/mp7_str_f.c | 3 + src/files/lang/ntsc-beta/mp7_str_g.c | 3 + src/files/lang/ntsc-beta/mp7_str_i.c | 3 + src/files/lang/ntsc-beta/mp7_str_s.c | 3 + src/files/lang/ntsc-beta/mp8E.c | 3 + src/files/lang/ntsc-beta/mp8J.c | 3 + src/files/lang/ntsc-beta/mp8P.c | 3 + src/files/lang/ntsc-beta/mp8_str_f.c | 3 + src/files/lang/ntsc-beta/mp8_str_g.c | 3 + src/files/lang/ntsc-beta/mp8_str_i.c | 3 + src/files/lang/ntsc-beta/mp8_str_s.c | 3 + src/files/lang/ntsc-beta/mp9E.c | 3 + src/files/lang/ntsc-beta/mp9J.c | 3 + src/files/lang/ntsc-beta/mp9P.c | 3 + src/files/lang/ntsc-beta/mp9_str_f.c | 3 + src/files/lang/ntsc-beta/mp9_str_g.c | 3 + src/files/lang/ntsc-beta/mp9_str_i.c | 3 + src/files/lang/ntsc-beta/mp9_str_s.c | 3 + src/files/lang/ntsc-beta/mpmenuE.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenuJ.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenuP.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenu_str_f.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenu_str_g.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenu_str_i.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpmenu_str_s.c | 504 ++++++++++++++++++ src/files/lang/ntsc-beta/mpweaponsE.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweaponsJ.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweaponsP.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweapons_str_f.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweapons_str_g.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweapons_str_i.c | 236 ++++++++ src/files/lang/ntsc-beta/mpweapons_str_s.c | 236 ++++++++ src/files/lang/ntsc-beta/oatE.c | 3 + src/files/lang/ntsc-beta/oatJ.c | 3 + src/files/lang/ntsc-beta/oatP.c | 3 + src/files/lang/ntsc-beta/oat_str_f.c | 3 + src/files/lang/ntsc-beta/oat_str_g.c | 3 + src/files/lang/ntsc-beta/oat_str_i.c | 3 + src/files/lang/ntsc-beta/oat_str_s.c | 3 + src/files/lang/ntsc-beta/oldE.c | 3 + src/files/lang/ntsc-beta/oldJ.c | 3 + src/files/lang/ntsc-beta/oldP.c | 3 + src/files/lang/ntsc-beta/old_str_f.c | 3 + src/files/lang/ntsc-beta/old_str_g.c | 3 + src/files/lang/ntsc-beta/old_str_i.c | 3 + src/files/lang/ntsc-beta/old_str_s.c | 3 + src/files/lang/ntsc-beta/optionsE.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/optionsJ.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/optionsP.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/options_str_f.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/options_str_g.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/options_str_i.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/options_str_s.c | 500 +++++++++++++++++ src/files/lang/ntsc-beta/pamE.c | 52 ++ src/files/lang/ntsc-beta/pamJ.c | 52 ++ src/files/lang/ntsc-beta/pamP.c | 52 ++ src/files/lang/ntsc-beta/pam_str_f.c | 52 ++ src/files/lang/ntsc-beta/pam_str_g.c | 52 ++ src/files/lang/ntsc-beta/pam_str_i.c | 52 ++ src/files/lang/ntsc-beta/pam_str_s.c | 52 ++ src/files/lang/ntsc-beta/peteE.c | 80 +++ src/files/lang/ntsc-beta/peteJ.c | 80 +++ src/files/lang/ntsc-beta/peteP.c | 80 +++ src/files/lang/ntsc-beta/pete_str_f.c | 80 +++ src/files/lang/ntsc-beta/pete_str_g.c | 80 +++ src/files/lang/ntsc-beta/pete_str_i.c | 80 +++ src/files/lang/ntsc-beta/pete_str_s.c | 80 +++ src/files/lang/ntsc-beta/propobjE.c | 56 ++ src/files/lang/ntsc-beta/propobjJ.c | 56 ++ src/files/lang/ntsc-beta/propobjP.c | 56 ++ src/files/lang/ntsc-beta/propobj_str_f.c | 56 ++ src/files/lang/ntsc-beta/propobj_str_g.c | 56 ++ src/files/lang/ntsc-beta/propobj_str_i.c | 56 ++ src/files/lang/ntsc-beta/propobj_str_s.c | 56 ++ src/files/lang/ntsc-beta/refE.c | 3 + src/files/lang/ntsc-beta/refJ.c | 3 + src/files/lang/ntsc-beta/refP.c | 3 + src/files/lang/ntsc-beta/ref_str_f.c | 3 + src/files/lang/ntsc-beta/ref_str_g.c | 3 + src/files/lang/ntsc-beta/ref_str_i.c | 3 + src/files/lang/ntsc-beta/ref_str_s.c | 3 + src/files/lang/ntsc-beta/ritE.c | 92 ++++ src/files/lang/ntsc-beta/ritJ.c | 92 ++++ src/files/lang/ntsc-beta/ritP.c | 92 ++++ src/files/lang/ntsc-beta/rit_str_f.c | 92 ++++ src/files/lang/ntsc-beta/rit_str_g.c | 92 ++++ src/files/lang/ntsc-beta/rit_str_i.c | 92 ++++ src/files/lang/ntsc-beta/rit_str_s.c | 92 ++++ src/files/lang/ntsc-beta/runE.c | 3 + src/files/lang/ntsc-beta/runJ.c | 3 + src/files/lang/ntsc-beta/runP.c | 3 + src/files/lang/ntsc-beta/run_str_f.c | 3 + src/files/lang/ntsc-beta/run_str_g.c | 3 + src/files/lang/ntsc-beta/run_str_i.c | 3 + src/files/lang/ntsc-beta/run_str_s.c | 3 + src/files/lang/ntsc-beta/sevE.c | 20 + src/files/lang/ntsc-beta/sevJ.c | 20 + src/files/lang/ntsc-beta/sevP.c | 20 + src/files/lang/ntsc-beta/sev_str_f.c | 20 + src/files/lang/ntsc-beta/sev_str_g.c | 20 + src/files/lang/ntsc-beta/sev_str_i.c | 20 + src/files/lang/ntsc-beta/sev_str_s.c | 20 + src/files/lang/ntsc-beta/sevbE.c | 12 + src/files/lang/ntsc-beta/sevbJ.c | 12 + src/files/lang/ntsc-beta/sevbP.c | 12 + src/files/lang/ntsc-beta/sevb_str_f.c | 12 + src/files/lang/ntsc-beta/sevb_str_g.c | 12 + src/files/lang/ntsc-beta/sevb_str_i.c | 12 + src/files/lang/ntsc-beta/sevb_str_s.c | 12 + src/files/lang/ntsc-beta/sevxE.c | 3 + src/files/lang/ntsc-beta/sevxJ.c | 3 + src/files/lang/ntsc-beta/sevxP.c | 3 + src/files/lang/ntsc-beta/sevx_str_f.c | 3 + src/files/lang/ntsc-beta/sevx_str_g.c | 3 + src/files/lang/ntsc-beta/sevx_str_i.c | 3 + src/files/lang/ntsc-beta/sevx_str_s.c | 3 + src/files/lang/ntsc-beta/sevxbE.c | 3 + src/files/lang/ntsc-beta/sevxbJ.c | 3 + src/files/lang/ntsc-beta/sevxbP.c | 3 + src/files/lang/ntsc-beta/sevxb_str_f.c | 3 + src/files/lang/ntsc-beta/sevxb_str_g.c | 3 + src/files/lang/ntsc-beta/sevxb_str_i.c | 3 + src/files/lang/ntsc-beta/sevxb_str_s.c | 3 + src/files/lang/ntsc-beta/shoE.c | 60 +++ src/files/lang/ntsc-beta/shoJ.c | 60 +++ src/files/lang/ntsc-beta/shoP.c | 60 +++ src/files/lang/ntsc-beta/sho_str_f.c | 60 +++ src/files/lang/ntsc-beta/sho_str_g.c | 60 +++ src/files/lang/ntsc-beta/sho_str_i.c | 60 +++ src/files/lang/ntsc-beta/sho_str_s.c | 60 +++ src/files/lang/ntsc-beta/siloE.c | 3 + src/files/lang/ntsc-beta/siloJ.c | 3 + src/files/lang/ntsc-beta/siloP.c | 3 + src/files/lang/ntsc-beta/silo_str_f.c | 3 + src/files/lang/ntsc-beta/silo_str_g.c | 3 + src/files/lang/ntsc-beta/silo_str_i.c | 3 + src/files/lang/ntsc-beta/silo_str_s.c | 3 + src/files/lang/ntsc-beta/statE.c | 16 + src/files/lang/ntsc-beta/statJ.c | 16 + src/files/lang/ntsc-beta/statP.c | 16 + src/files/lang/ntsc-beta/stat_str_f.c | 16 + src/files/lang/ntsc-beta/stat_str_g.c | 16 + src/files/lang/ntsc-beta/stat_str_i.c | 16 + src/files/lang/ntsc-beta/stat_str_s.c | 16 + src/files/lang/ntsc-beta/titleE.c | 156 ++++++ src/files/lang/ntsc-beta/titleJ.c | 156 ++++++ src/files/lang/ntsc-beta/titleP.c | 156 ++++++ src/files/lang/ntsc-beta/title_str_f.c | 156 ++++++ src/files/lang/ntsc-beta/title_str_g.c | 156 ++++++ src/files/lang/ntsc-beta/title_str_i.c | 156 ++++++ src/files/lang/ntsc-beta/title_str_s.c | 156 ++++++ src/files/lang/ntsc-beta/traE.c | 92 ++++ src/files/lang/ntsc-beta/traJ.c | 92 ++++ src/files/lang/ntsc-beta/traP.c | 92 ++++ src/files/lang/ntsc-beta/tra_str_f.c | 92 ++++ src/files/lang/ntsc-beta/tra_str_g.c | 92 ++++ src/files/lang/ntsc-beta/tra_str_i.c | 92 ++++ src/files/lang/ntsc-beta/tra_str_s.c | 92 ++++ src/files/lang/ntsc-beta/uffE.c | 3 + src/files/lang/ntsc-beta/uffJ.c | 3 + src/files/lang/ntsc-beta/uffP.c | 3 + src/files/lang/ntsc-beta/uff_str_f.c | 3 + src/files/lang/ntsc-beta/uff_str_g.c | 3 + src/files/lang/ntsc-beta/uff_str_i.c | 3 + src/files/lang/ntsc-beta/uff_str_s.c | 3 + src/files/lang/ntsc-beta/waxE.c | 32 ++ src/files/lang/ntsc-beta/waxJ.c | 32 ++ src/files/lang/ntsc-beta/waxP.c | 32 ++ src/files/lang/ntsc-beta/wax_str_f.c | 32 ++ src/files/lang/ntsc-beta/wax_str_g.c | 32 ++ src/files/lang/ntsc-beta/wax_str_i.c | 32 ++ src/files/lang/ntsc-beta/wax_str_s.c | 32 ++ src/files/lang/ntsc-final/ameE.c | 116 ++++ src/files/lang/ntsc-final/ameJ.c | 116 ++++ src/files/lang/ntsc-final/ameP.c | 116 ++++ src/files/lang/ntsc-final/ame_str_f.c | 116 ++++ src/files/lang/ntsc-final/ame_str_g.c | 116 ++++ src/files/lang/ntsc-final/ame_str_i.c | 116 ++++ src/files/lang/ntsc-final/ame_str_s.c | 116 ++++ src/files/lang/ntsc-final/archE.c | 3 + src/files/lang/ntsc-final/archJ.c | 3 + src/files/lang/ntsc-final/archP.c | 3 + src/files/lang/ntsc-final/arch_str_f.c | 3 + src/files/lang/ntsc-final/arch_str_g.c | 3 + src/files/lang/ntsc-final/arch_str_i.c | 3 + src/files/lang/ntsc-final/arch_str_s.c | 3 + src/files/lang/ntsc-final/arecE.c | 3 + src/files/lang/ntsc-final/arecJ.c | 3 + src/files/lang/ntsc-final/arecP.c | 3 + src/files/lang/ntsc-final/arec_str_f.c | 3 + src/files/lang/ntsc-final/arec_str_g.c | 3 + src/files/lang/ntsc-final/arec_str_i.c | 3 + src/files/lang/ntsc-final/arec_str_s.c | 3 + src/files/lang/ntsc-final/arkE.c | 80 +++ src/files/lang/ntsc-final/arkJ.c | 80 +++ src/files/lang/ntsc-final/arkP.c | 80 +++ src/files/lang/ntsc-final/ark_str_f.c | 80 +++ src/files/lang/ntsc-final/ark_str_g.c | 80 +++ src/files/lang/ntsc-final/ark_str_i.c | 80 +++ src/files/lang/ntsc-final/ark_str_s.c | 80 +++ src/files/lang/ntsc-final/ashE.c | 3 + src/files/lang/ntsc-final/ashJ.c | 3 + src/files/lang/ntsc-final/ashP.c | 3 + src/files/lang/ntsc-final/ash_str_f.c | 3 + src/files/lang/ntsc-final/ash_str_g.c | 3 + src/files/lang/ntsc-final/ash_str_i.c | 3 + src/files/lang/ntsc-final/ash_str_s.c | 3 + src/files/lang/ntsc-final/ateE.c | 20 + src/files/lang/ntsc-final/ateJ.c | 20 + src/files/lang/ntsc-final/ateP.c | 20 + src/files/lang/ntsc-final/ate_str_f.c | 20 + src/files/lang/ntsc-final/ate_str_g.c | 20 + src/files/lang/ntsc-final/ate_str_i.c | 20 + src/files/lang/ntsc-final/ate_str_s.c | 20 + src/files/lang/ntsc-final/aztE.c | 52 ++ src/files/lang/ntsc-final/aztJ.c | 52 ++ src/files/lang/ntsc-final/aztP.c | 52 ++ src/files/lang/ntsc-final/azt_str_f.c | 52 ++ src/files/lang/ntsc-final/azt_str_g.c | 52 ++ src/files/lang/ntsc-final/azt_str_i.c | 52 ++ src/files/lang/ntsc-final/azt_str_s.c | 52 ++ src/files/lang/ntsc-final/catE.c | 3 + src/files/lang/ntsc-final/catJ.c | 3 + src/files/lang/ntsc-final/catP.c | 3 + src/files/lang/ntsc-final/cat_str_f.c | 3 + src/files/lang/ntsc-final/cat_str_g.c | 3 + src/files/lang/ntsc-final/cat_str_i.c | 3 + src/files/lang/ntsc-final/cat_str_s.c | 3 + src/files/lang/ntsc-final/caveE.c | 72 +++ src/files/lang/ntsc-final/caveJ.c | 72 +++ src/files/lang/ntsc-final/caveP.c | 72 +++ src/files/lang/ntsc-final/cave_str_f.c | 72 +++ src/files/lang/ntsc-final/cave_str_g.c | 72 +++ src/files/lang/ntsc-final/cave_str_i.c | 72 +++ src/files/lang/ntsc-final/cave_str_s.c | 72 +++ src/files/lang/ntsc-final/cradE.c | 3 + src/files/lang/ntsc-final/cradJ.c | 3 + src/files/lang/ntsc-final/cradP.c | 3 + src/files/lang/ntsc-final/crad_str_f.c | 3 + src/files/lang/ntsc-final/crad_str_g.c | 3 + src/files/lang/ntsc-final/crad_str_i.c | 3 + src/files/lang/ntsc-final/crad_str_s.c | 3 + src/files/lang/ntsc-final/crypE.c | 3 + src/files/lang/ntsc-final/crypJ.c | 3 + src/files/lang/ntsc-final/crypP.c | 3 + src/files/lang/ntsc-final/cryp_str_f.c | 3 + src/files/lang/ntsc-final/cryp_str_g.c | 3 + src/files/lang/ntsc-final/cryp_str_i.c | 3 + src/files/lang/ntsc-final/cryp_str_s.c | 3 + src/files/lang/ntsc-final/damE.c | 52 ++ src/files/lang/ntsc-final/damJ.c | 52 ++ src/files/lang/ntsc-final/damP.c | 52 ++ src/files/lang/ntsc-final/dam_str_f.c | 52 ++ src/files/lang/ntsc-final/dam_str_g.c | 52 ++ src/files/lang/ntsc-final/dam_str_i.c | 52 ++ src/files/lang/ntsc-final/dam_str_s.c | 52 ++ src/files/lang/ntsc-final/depoE.c | 88 +++ src/files/lang/ntsc-final/depoJ.c | 88 +++ src/files/lang/ntsc-final/depoP.c | 88 +++ src/files/lang/ntsc-final/depo_str_f.c | 88 +++ src/files/lang/ntsc-final/depo_str_g.c | 88 +++ src/files/lang/ntsc-final/depo_str_i.c | 88 +++ src/files/lang/ntsc-final/depo_str_s.c | 88 +++ src/files/lang/ntsc-final/destE.c | 3 + src/files/lang/ntsc-final/destJ.c | 3 + src/files/lang/ntsc-final/destP.c | 3 + src/files/lang/ntsc-final/dest_str_f.c | 3 + src/files/lang/ntsc-final/dest_str_g.c | 3 + src/files/lang/ntsc-final/dest_str_i.c | 3 + src/files/lang/ntsc-final/dest_str_s.c | 3 + src/files/lang/ntsc-final/dishE.c | 132 +++++ src/files/lang/ntsc-final/dishJ.c | 132 +++++ src/files/lang/ntsc-final/dishP.c | 132 +++++ src/files/lang/ntsc-final/dish_str_f.c | 132 +++++ src/files/lang/ntsc-final/dish_str_g.c | 132 +++++ src/files/lang/ntsc-final/dish_str_i.c | 132 +++++ src/files/lang/ntsc-final/dish_str_s.c | 132 +++++ src/files/lang/ntsc-final/earE.c | 112 ++++ src/files/lang/ntsc-final/earJ.c | 112 ++++ src/files/lang/ntsc-final/earP.c | 112 ++++ src/files/lang/ntsc-final/ear_str_f.c | 112 ++++ src/files/lang/ntsc-final/ear_str_g.c | 112 ++++ src/files/lang/ntsc-final/ear_str_i.c | 112 ++++ src/files/lang/ntsc-final/ear_str_s.c | 112 ++++ src/files/lang/ntsc-final/eldE.c | 56 ++ src/files/lang/ntsc-final/eldJ.c | 56 ++ src/files/lang/ntsc-final/eldP.c | 56 ++ src/files/lang/ntsc-final/eld_str_f.c | 56 ++ src/files/lang/ntsc-final/eld_str_g.c | 56 ++ src/files/lang/ntsc-final/eld_str_i.c | 56 ++ src/files/lang/ntsc-final/eld_str_s.c | 56 ++ src/files/lang/ntsc-final/gunE.c | 248 +++++++++ src/files/lang/ntsc-final/gunJ.c | 248 +++++++++ src/files/lang/ntsc-final/gunP.c | 248 +++++++++ src/files/lang/ntsc-final/gun_str_f.c | 248 +++++++++ src/files/lang/ntsc-final/gun_str_g.c | 248 +++++++++ src/files/lang/ntsc-final/gun_str_i.c | 248 +++++++++ src/files/lang/ntsc-final/gun_str_s.c | 248 +++++++++ src/files/lang/ntsc-final/impE.c | 68 +++ src/files/lang/ntsc-final/impJ.c | 68 +++ src/files/lang/ntsc-final/impP.c | 68 +++ src/files/lang/ntsc-final/imp_str_f.c | 68 +++ src/files/lang/ntsc-final/imp_str_g.c | 68 +++ src/files/lang/ntsc-final/imp_str_i.c | 68 +++ src/files/lang/ntsc-final/imp_str_s.c | 68 +++ src/files/lang/ntsc-final/junE.c | 3 + src/files/lang/ntsc-final/junJ.c | 3 + src/files/lang/ntsc-final/junP.c | 3 + src/files/lang/ntsc-final/jun_str_f.c | 3 + src/files/lang/ntsc-final/jun_str_g.c | 3 + src/files/lang/ntsc-final/jun_str_i.c | 3 + src/files/lang/ntsc-final/jun_str_s.c | 3 + src/files/lang/ntsc-final/lamE.c | 3 + src/files/lang/ntsc-final/lamJ.c | 3 + src/files/lang/ntsc-final/lamP.c | 3 + src/files/lang/ntsc-final/lam_str_f.c | 3 + src/files/lang/ntsc-final/lam_str_g.c | 3 + src/files/lang/ntsc-final/lam_str_i.c | 3 + src/files/lang/ntsc-final/lam_str_s.c | 3 + src/files/lang/ntsc-final/leeE.c | 60 +++ src/files/lang/ntsc-final/leeJ.c | 60 +++ src/files/lang/ntsc-final/leeP.c | 60 +++ src/files/lang/ntsc-final/lee_str_f.c | 60 +++ src/files/lang/ntsc-final/lee_str_g.c | 60 +++ src/files/lang/ntsc-final/lee_str_i.c | 60 +++ src/files/lang/ntsc-final/lee_str_s.c | 60 +++ src/files/lang/ntsc-final/lenE.c | 3 + src/files/lang/ntsc-final/lenJ.c | 3 + src/files/lang/ntsc-final/lenP.c | 3 + src/files/lang/ntsc-final/len_str_f.c | 3 + src/files/lang/ntsc-final/len_str_g.c | 3 + src/files/lang/ntsc-final/len_str_i.c | 3 + src/files/lang/ntsc-final/len_str_s.c | 3 + src/files/lang/ntsc-final/lipE.c | 112 ++++ src/files/lang/ntsc-final/lipJ.c | 112 ++++ src/files/lang/ntsc-final/lipP.c | 112 ++++ src/files/lang/ntsc-final/lip_str_f.c | 112 ++++ src/files/lang/ntsc-final/lip_str_g.c | 112 ++++ src/files/lang/ntsc-final/lip_str_i.c | 112 ++++ src/files/lang/ntsc-final/lip_str_s.c | 112 ++++ src/files/lang/ntsc-final/lueE.c | 80 +++ src/files/lang/ntsc-final/lueJ.c | 80 +++ src/files/lang/ntsc-final/lueP.c | 80 +++ src/files/lang/ntsc-final/lue_str_f.c | 80 +++ src/files/lang/ntsc-final/lue_str_g.c | 80 +++ src/files/lang/ntsc-final/lue_str_i.c | 80 +++ src/files/lang/ntsc-final/lue_str_s.c | 80 +++ src/files/lang/ntsc-final/miscE.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/miscJ.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/miscP.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/misc_str_f.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/misc_str_g.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/misc_str_i.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/misc_str_s.c | 480 +++++++++++++++++ src/files/lang/ntsc-final/mp10E.c | 3 + src/files/lang/ntsc-final/mp10J.c | 3 + src/files/lang/ntsc-final/mp10P.c | 3 + src/files/lang/ntsc-final/mp10_str_f.c | 3 + src/files/lang/ntsc-final/mp10_str_g.c | 3 + src/files/lang/ntsc-final/mp10_str_i.c | 3 + src/files/lang/ntsc-final/mp10_str_s.c | 3 + src/files/lang/ntsc-final/mp11E.c | 3 + src/files/lang/ntsc-final/mp11J.c | 3 + src/files/lang/ntsc-final/mp11P.c | 3 + src/files/lang/ntsc-final/mp11_str_f.c | 3 + src/files/lang/ntsc-final/mp11_str_g.c | 3 + src/files/lang/ntsc-final/mp11_str_i.c | 3 + src/files/lang/ntsc-final/mp11_str_s.c | 3 + src/files/lang/ntsc-final/mp12E.c | 3 + src/files/lang/ntsc-final/mp12J.c | 3 + src/files/lang/ntsc-final/mp12P.c | 3 + src/files/lang/ntsc-final/mp12_str_f.c | 3 + src/files/lang/ntsc-final/mp12_str_g.c | 3 + src/files/lang/ntsc-final/mp12_str_i.c | 3 + src/files/lang/ntsc-final/mp12_str_s.c | 3 + src/files/lang/ntsc-final/mp13E.c | 3 + src/files/lang/ntsc-final/mp13J.c | 3 + src/files/lang/ntsc-final/mp13P.c | 3 + src/files/lang/ntsc-final/mp13_str_f.c | 3 + src/files/lang/ntsc-final/mp13_str_g.c | 3 + src/files/lang/ntsc-final/mp13_str_i.c | 3 + src/files/lang/ntsc-final/mp13_str_s.c | 3 + src/files/lang/ntsc-final/mp14E.c | 3 + src/files/lang/ntsc-final/mp14J.c | 3 + src/files/lang/ntsc-final/mp14P.c | 3 + src/files/lang/ntsc-final/mp14_str_f.c | 3 + src/files/lang/ntsc-final/mp14_str_g.c | 3 + src/files/lang/ntsc-final/mp14_str_i.c | 3 + src/files/lang/ntsc-final/mp14_str_s.c | 3 + src/files/lang/ntsc-final/mp15E.c | 3 + src/files/lang/ntsc-final/mp15J.c | 3 + src/files/lang/ntsc-final/mp15P.c | 3 + src/files/lang/ntsc-final/mp15_str_f.c | 3 + src/files/lang/ntsc-final/mp15_str_g.c | 3 + src/files/lang/ntsc-final/mp15_str_i.c | 3 + src/files/lang/ntsc-final/mp15_str_s.c | 3 + src/files/lang/ntsc-final/mp16E.c | 3 + src/files/lang/ntsc-final/mp16J.c | 3 + src/files/lang/ntsc-final/mp16P.c | 3 + src/files/lang/ntsc-final/mp16_str_f.c | 3 + src/files/lang/ntsc-final/mp16_str_g.c | 3 + src/files/lang/ntsc-final/mp16_str_i.c | 3 + src/files/lang/ntsc-final/mp16_str_s.c | 3 + src/files/lang/ntsc-final/mp17E.c | 3 + src/files/lang/ntsc-final/mp17J.c | 3 + src/files/lang/ntsc-final/mp17P.c | 3 + src/files/lang/ntsc-final/mp17_str_f.c | 3 + src/files/lang/ntsc-final/mp17_str_g.c | 3 + src/files/lang/ntsc-final/mp17_str_i.c | 3 + src/files/lang/ntsc-final/mp17_str_s.c | 3 + src/files/lang/ntsc-final/mp18E.c | 3 + src/files/lang/ntsc-final/mp18J.c | 3 + src/files/lang/ntsc-final/mp18P.c | 3 + src/files/lang/ntsc-final/mp18_str_f.c | 3 + src/files/lang/ntsc-final/mp18_str_g.c | 3 + src/files/lang/ntsc-final/mp18_str_i.c | 3 + src/files/lang/ntsc-final/mp18_str_s.c | 3 + src/files/lang/ntsc-final/mp19E.c | 3 + src/files/lang/ntsc-final/mp19J.c | 3 + src/files/lang/ntsc-final/mp19P.c | 3 + src/files/lang/ntsc-final/mp19_str_f.c | 3 + src/files/lang/ntsc-final/mp19_str_g.c | 3 + src/files/lang/ntsc-final/mp19_str_i.c | 3 + src/files/lang/ntsc-final/mp19_str_s.c | 3 + src/files/lang/ntsc-final/mp1E.c | 3 + src/files/lang/ntsc-final/mp1J.c | 3 + src/files/lang/ntsc-final/mp1P.c | 3 + src/files/lang/ntsc-final/mp1_str_f.c | 3 + src/files/lang/ntsc-final/mp1_str_g.c | 3 + src/files/lang/ntsc-final/mp1_str_i.c | 3 + src/files/lang/ntsc-final/mp1_str_s.c | 3 + src/files/lang/ntsc-final/mp20E.c | 3 + src/files/lang/ntsc-final/mp20J.c | 3 + src/files/lang/ntsc-final/mp20P.c | 3 + src/files/lang/ntsc-final/mp20_str_f.c | 3 + src/files/lang/ntsc-final/mp20_str_g.c | 3 + src/files/lang/ntsc-final/mp20_str_i.c | 3 + src/files/lang/ntsc-final/mp20_str_s.c | 3 + src/files/lang/ntsc-final/mp2E.c | 3 + src/files/lang/ntsc-final/mp2J.c | 3 + src/files/lang/ntsc-final/mp2P.c | 3 + src/files/lang/ntsc-final/mp2_str_f.c | 3 + src/files/lang/ntsc-final/mp2_str_g.c | 3 + src/files/lang/ntsc-final/mp2_str_i.c | 3 + src/files/lang/ntsc-final/mp2_str_s.c | 3 + src/files/lang/ntsc-final/mp3E.c | 3 + src/files/lang/ntsc-final/mp3J.c | 3 + src/files/lang/ntsc-final/mp3P.c | 3 + src/files/lang/ntsc-final/mp3_str_f.c | 3 + src/files/lang/ntsc-final/mp3_str_g.c | 3 + src/files/lang/ntsc-final/mp3_str_i.c | 3 + src/files/lang/ntsc-final/mp3_str_s.c | 3 + src/files/lang/ntsc-final/mp4E.c | 3 + src/files/lang/ntsc-final/mp4J.c | 3 + src/files/lang/ntsc-final/mp4P.c | 3 + src/files/lang/ntsc-final/mp4_str_f.c | 3 + src/files/lang/ntsc-final/mp4_str_g.c | 3 + src/files/lang/ntsc-final/mp4_str_i.c | 3 + src/files/lang/ntsc-final/mp4_str_s.c | 3 + src/files/lang/ntsc-final/mp5E.c | 3 + src/files/lang/ntsc-final/mp5J.c | 3 + src/files/lang/ntsc-final/mp5P.c | 3 + src/files/lang/ntsc-final/mp5_str_f.c | 3 + src/files/lang/ntsc-final/mp5_str_g.c | 3 + src/files/lang/ntsc-final/mp5_str_i.c | 3 + src/files/lang/ntsc-final/mp5_str_s.c | 3 + src/files/lang/ntsc-final/mp6E.c | 3 + src/files/lang/ntsc-final/mp6J.c | 3 + src/files/lang/ntsc-final/mp6P.c | 3 + src/files/lang/ntsc-final/mp6_str_f.c | 3 + src/files/lang/ntsc-final/mp6_str_g.c | 3 + src/files/lang/ntsc-final/mp6_str_i.c | 3 + src/files/lang/ntsc-final/mp6_str_s.c | 3 + src/files/lang/ntsc-final/mp7E.c | 3 + src/files/lang/ntsc-final/mp7J.c | 3 + src/files/lang/ntsc-final/mp7P.c | 3 + src/files/lang/ntsc-final/mp7_str_f.c | 3 + src/files/lang/ntsc-final/mp7_str_g.c | 3 + src/files/lang/ntsc-final/mp7_str_i.c | 3 + src/files/lang/ntsc-final/mp7_str_s.c | 3 + src/files/lang/ntsc-final/mp8E.c | 3 + src/files/lang/ntsc-final/mp8J.c | 3 + src/files/lang/ntsc-final/mp8P.c | 3 + src/files/lang/ntsc-final/mp8_str_f.c | 3 + src/files/lang/ntsc-final/mp8_str_g.c | 3 + src/files/lang/ntsc-final/mp8_str_i.c | 3 + src/files/lang/ntsc-final/mp8_str_s.c | 3 + src/files/lang/ntsc-final/mp9E.c | 3 + src/files/lang/ntsc-final/mp9J.c | 3 + src/files/lang/ntsc-final/mp9P.c | 3 + src/files/lang/ntsc-final/mp9_str_f.c | 3 + src/files/lang/ntsc-final/mp9_str_g.c | 3 + src/files/lang/ntsc-final/mp9_str_i.c | 3 + src/files/lang/ntsc-final/mp9_str_s.c | 3 + src/files/lang/ntsc-final/mpmenuE.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenuJ.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenuP.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenu_str_f.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenu_str_g.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenu_str_i.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpmenu_str_s.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/mpweaponsE.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweaponsJ.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweaponsP.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweapons_str_f.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweapons_str_g.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweapons_str_i.c | 268 ++++++++++ src/files/lang/ntsc-final/mpweapons_str_s.c | 268 ++++++++++ src/files/lang/ntsc-final/oatE.c | 3 + src/files/lang/ntsc-final/oatJ.c | 3 + src/files/lang/ntsc-final/oatP.c | 3 + src/files/lang/ntsc-final/oat_str_f.c | 3 + src/files/lang/ntsc-final/oat_str_g.c | 3 + src/files/lang/ntsc-final/oat_str_i.c | 3 + src/files/lang/ntsc-final/oat_str_s.c | 3 + src/files/lang/ntsc-final/oldE.c | 3 + src/files/lang/ntsc-final/oldJ.c | 3 + src/files/lang/ntsc-final/oldP.c | 3 + src/files/lang/ntsc-final/old_str_f.c | 3 + src/files/lang/ntsc-final/old_str_g.c | 3 + src/files/lang/ntsc-final/old_str_i.c | 3 + src/files/lang/ntsc-final/old_str_s.c | 3 + src/files/lang/ntsc-final/optionsE.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/optionsJ.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/optionsP.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/options_str_f.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/options_str_g.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/options_str_i.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/options_str_s.c | 500 +++++++++++++++++ src/files/lang/ntsc-final/pamE.c | 52 ++ src/files/lang/ntsc-final/pamJ.c | 52 ++ src/files/lang/ntsc-final/pamP.c | 52 ++ src/files/lang/ntsc-final/pam_str_f.c | 52 ++ src/files/lang/ntsc-final/pam_str_g.c | 52 ++ src/files/lang/ntsc-final/pam_str_i.c | 52 ++ src/files/lang/ntsc-final/pam_str_s.c | 52 ++ src/files/lang/ntsc-final/peteE.c | 80 +++ src/files/lang/ntsc-final/peteJ.c | 80 +++ src/files/lang/ntsc-final/peteP.c | 80 +++ src/files/lang/ntsc-final/pete_str_f.c | 80 +++ src/files/lang/ntsc-final/pete_str_g.c | 80 +++ src/files/lang/ntsc-final/pete_str_i.c | 80 +++ src/files/lang/ntsc-final/pete_str_s.c | 80 +++ src/files/lang/ntsc-final/propobjE.c | 56 ++ src/files/lang/ntsc-final/propobjJ.c | 56 ++ src/files/lang/ntsc-final/propobjP.c | 56 ++ src/files/lang/ntsc-final/propobj_str_f.c | 56 ++ src/files/lang/ntsc-final/propobj_str_g.c | 56 ++ src/files/lang/ntsc-final/propobj_str_i.c | 56 ++ src/files/lang/ntsc-final/propobj_str_s.c | 56 ++ src/files/lang/ntsc-final/refE.c | 3 + src/files/lang/ntsc-final/refJ.c | 3 + src/files/lang/ntsc-final/refP.c | 3 + src/files/lang/ntsc-final/ref_str_f.c | 3 + src/files/lang/ntsc-final/ref_str_g.c | 3 + src/files/lang/ntsc-final/ref_str_i.c | 3 + src/files/lang/ntsc-final/ref_str_s.c | 3 + src/files/lang/ntsc-final/ritE.c | 92 ++++ src/files/lang/ntsc-final/ritJ.c | 92 ++++ src/files/lang/ntsc-final/ritP.c | 92 ++++ src/files/lang/ntsc-final/rit_str_f.c | 92 ++++ src/files/lang/ntsc-final/rit_str_g.c | 92 ++++ src/files/lang/ntsc-final/rit_str_i.c | 92 ++++ src/files/lang/ntsc-final/rit_str_s.c | 92 ++++ src/files/lang/ntsc-final/runE.c | 3 + src/files/lang/ntsc-final/runJ.c | 3 + src/files/lang/ntsc-final/runP.c | 3 + src/files/lang/ntsc-final/run_str_f.c | 3 + src/files/lang/ntsc-final/run_str_g.c | 3 + src/files/lang/ntsc-final/run_str_i.c | 3 + src/files/lang/ntsc-final/run_str_s.c | 3 + src/files/lang/ntsc-final/sevE.c | 20 + src/files/lang/ntsc-final/sevJ.c | 20 + src/files/lang/ntsc-final/sevP.c | 20 + src/files/lang/ntsc-final/sev_str_f.c | 20 + src/files/lang/ntsc-final/sev_str_g.c | 20 + src/files/lang/ntsc-final/sev_str_i.c | 20 + src/files/lang/ntsc-final/sev_str_s.c | 20 + src/files/lang/ntsc-final/sevbE.c | 12 + src/files/lang/ntsc-final/sevbJ.c | 12 + src/files/lang/ntsc-final/sevbP.c | 12 + src/files/lang/ntsc-final/sevb_str_f.c | 12 + src/files/lang/ntsc-final/sevb_str_g.c | 12 + src/files/lang/ntsc-final/sevb_str_i.c | 12 + src/files/lang/ntsc-final/sevb_str_s.c | 12 + src/files/lang/ntsc-final/sevxE.c | 3 + src/files/lang/ntsc-final/sevxJ.c | 3 + src/files/lang/ntsc-final/sevxP.c | 3 + src/files/lang/ntsc-final/sevx_str_f.c | 3 + src/files/lang/ntsc-final/sevx_str_g.c | 3 + src/files/lang/ntsc-final/sevx_str_i.c | 3 + src/files/lang/ntsc-final/sevx_str_s.c | 3 + src/files/lang/ntsc-final/sevxbE.c | 3 + src/files/lang/ntsc-final/sevxbJ.c | 3 + src/files/lang/ntsc-final/sevxbP.c | 3 + src/files/lang/ntsc-final/sevxb_str_f.c | 3 + src/files/lang/ntsc-final/sevxb_str_g.c | 3 + src/files/lang/ntsc-final/sevxb_str_i.c | 3 + src/files/lang/ntsc-final/sevxb_str_s.c | 3 + src/files/lang/ntsc-final/shoE.c | 60 +++ src/files/lang/ntsc-final/shoJ.c | 60 +++ src/files/lang/ntsc-final/shoP.c | 60 +++ src/files/lang/ntsc-final/sho_str_f.c | 60 +++ src/files/lang/ntsc-final/sho_str_g.c | 60 +++ src/files/lang/ntsc-final/sho_str_i.c | 60 +++ src/files/lang/ntsc-final/sho_str_s.c | 60 +++ src/files/lang/ntsc-final/siloE.c | 3 + src/files/lang/ntsc-final/siloJ.c | 3 + src/files/lang/ntsc-final/siloP.c | 3 + src/files/lang/ntsc-final/silo_str_f.c | 3 + src/files/lang/ntsc-final/silo_str_g.c | 3 + src/files/lang/ntsc-final/silo_str_i.c | 3 + src/files/lang/ntsc-final/silo_str_s.c | 3 + src/files/lang/ntsc-final/statE.c | 16 + src/files/lang/ntsc-final/statJ.c | 16 + src/files/lang/ntsc-final/statP.c | 16 + src/files/lang/ntsc-final/stat_str_f.c | 16 + src/files/lang/ntsc-final/stat_str_g.c | 16 + src/files/lang/ntsc-final/stat_str_i.c | 16 + src/files/lang/ntsc-final/stat_str_s.c | 16 + src/files/lang/ntsc-final/titleE.c | 156 ++++++ src/files/lang/ntsc-final/titleJ.c | 156 ++++++ src/files/lang/ntsc-final/titleP.c | 156 ++++++ src/files/lang/ntsc-final/title_str_f.c | 156 ++++++ src/files/lang/ntsc-final/title_str_g.c | 156 ++++++ src/files/lang/ntsc-final/title_str_i.c | 156 ++++++ src/files/lang/ntsc-final/title_str_s.c | 156 ++++++ src/files/lang/ntsc-final/traE.c | 92 ++++ src/files/lang/ntsc-final/traJ.c | 92 ++++ src/files/lang/ntsc-final/traP.c | 92 ++++ src/files/lang/ntsc-final/tra_str_f.c | 92 ++++ src/files/lang/ntsc-final/tra_str_g.c | 92 ++++ src/files/lang/ntsc-final/tra_str_i.c | 92 ++++ src/files/lang/ntsc-final/tra_str_s.c | 92 ++++ src/files/lang/ntsc-final/uffE.c | 3 + src/files/lang/ntsc-final/uffJ.c | 3 + src/files/lang/ntsc-final/uffP.c | 3 + src/files/lang/ntsc-final/uff_str_f.c | 3 + src/files/lang/ntsc-final/uff_str_g.c | 3 + src/files/lang/ntsc-final/uff_str_i.c | 3 + src/files/lang/ntsc-final/uff_str_s.c | 3 + src/files/lang/ntsc-final/waxE.c | 32 ++ src/files/lang/ntsc-final/waxJ.c | 32 ++ src/files/lang/ntsc-final/waxP.c | 32 ++ src/files/lang/ntsc-final/wax_str_f.c | 32 ++ src/files/lang/ntsc-final/wax_str_g.c | 32 ++ src/files/lang/ntsc-final/wax_str_i.c | 32 ++ src/files/lang/ntsc-final/wax_str_s.c | 32 ++ src/files/lang/pal-beta/ameE.c | 116 ++++ src/files/lang/pal-beta/ameJ.c | 116 ++++ src/files/lang/pal-beta/ameP.c | 116 ++++ src/files/lang/pal-beta/ame_str_f.c | 116 ++++ src/files/lang/pal-beta/ame_str_g.c | 116 ++++ src/files/lang/pal-beta/ame_str_i.c | 116 ++++ src/files/lang/pal-beta/ame_str_s.c | 116 ++++ src/files/lang/pal-beta/archE.c | 3 + src/files/lang/pal-beta/archJ.c | 3 + src/files/lang/pal-beta/archP.c | 3 + src/files/lang/pal-beta/arch_str_f.c | 3 + src/files/lang/pal-beta/arch_str_g.c | 3 + src/files/lang/pal-beta/arch_str_i.c | 3 + src/files/lang/pal-beta/arch_str_s.c | 3 + src/files/lang/pal-beta/arecE.c | 3 + src/files/lang/pal-beta/arecJ.c | 3 + src/files/lang/pal-beta/arecP.c | 3 + src/files/lang/pal-beta/arec_str_f.c | 3 + src/files/lang/pal-beta/arec_str_g.c | 3 + src/files/lang/pal-beta/arec_str_i.c | 3 + src/files/lang/pal-beta/arec_str_s.c | 3 + src/files/lang/pal-beta/arkE.c | 80 +++ src/files/lang/pal-beta/arkJ.c | 80 +++ src/files/lang/pal-beta/arkP.c | 80 +++ src/files/lang/pal-beta/ark_str_f.c | 80 +++ src/files/lang/pal-beta/ark_str_g.c | 80 +++ src/files/lang/pal-beta/ark_str_i.c | 80 +++ src/files/lang/pal-beta/ark_str_s.c | 80 +++ src/files/lang/pal-beta/ashE.c | 3 + src/files/lang/pal-beta/ashJ.c | 3 + src/files/lang/pal-beta/ashP.c | 3 + src/files/lang/pal-beta/ash_str_f.c | 3 + src/files/lang/pal-beta/ash_str_g.c | 3 + src/files/lang/pal-beta/ash_str_i.c | 3 + src/files/lang/pal-beta/ash_str_s.c | 3 + src/files/lang/pal-beta/ateE.c | 20 + src/files/lang/pal-beta/ateJ.c | 20 + src/files/lang/pal-beta/ateP.c | 20 + src/files/lang/pal-beta/ate_str_f.c | 20 + src/files/lang/pal-beta/ate_str_g.c | 20 + src/files/lang/pal-beta/ate_str_i.c | 20 + src/files/lang/pal-beta/ate_str_s.c | 20 + src/files/lang/pal-beta/aztE.c | 52 ++ src/files/lang/pal-beta/aztJ.c | 52 ++ src/files/lang/pal-beta/aztP.c | 52 ++ src/files/lang/pal-beta/azt_str_f.c | 52 ++ src/files/lang/pal-beta/azt_str_g.c | 52 ++ src/files/lang/pal-beta/azt_str_i.c | 52 ++ src/files/lang/pal-beta/azt_str_s.c | 52 ++ src/files/lang/pal-beta/catE.c | 3 + src/files/lang/pal-beta/catJ.c | 3 + src/files/lang/pal-beta/catP.c | 3 + src/files/lang/pal-beta/cat_str_f.c | 3 + src/files/lang/pal-beta/cat_str_g.c | 3 + src/files/lang/pal-beta/cat_str_i.c | 3 + src/files/lang/pal-beta/cat_str_s.c | 3 + src/files/lang/pal-beta/caveE.c | 72 +++ src/files/lang/pal-beta/caveJ.c | 72 +++ src/files/lang/pal-beta/caveP.c | 72 +++ src/files/lang/pal-beta/cave_str_f.c | 72 +++ src/files/lang/pal-beta/cave_str_g.c | 72 +++ src/files/lang/pal-beta/cave_str_i.c | 72 +++ src/files/lang/pal-beta/cave_str_s.c | 72 +++ src/files/lang/pal-beta/cradE.c | 3 + src/files/lang/pal-beta/cradJ.c | 3 + src/files/lang/pal-beta/cradP.c | 3 + src/files/lang/pal-beta/crad_str_f.c | 3 + src/files/lang/pal-beta/crad_str_g.c | 3 + src/files/lang/pal-beta/crad_str_i.c | 3 + src/files/lang/pal-beta/crad_str_s.c | 3 + src/files/lang/pal-beta/crypE.c | 3 + src/files/lang/pal-beta/crypJ.c | 3 + src/files/lang/pal-beta/crypP.c | 3 + src/files/lang/pal-beta/cryp_str_f.c | 3 + src/files/lang/pal-beta/cryp_str_g.c | 3 + src/files/lang/pal-beta/cryp_str_i.c | 3 + src/files/lang/pal-beta/cryp_str_s.c | 3 + src/files/lang/pal-beta/damE.c | 52 ++ src/files/lang/pal-beta/damJ.c | 52 ++ src/files/lang/pal-beta/damP.c | 52 ++ src/files/lang/pal-beta/dam_str_f.c | 52 ++ src/files/lang/pal-beta/dam_str_g.c | 52 ++ src/files/lang/pal-beta/dam_str_i.c | 52 ++ src/files/lang/pal-beta/dam_str_s.c | 52 ++ src/files/lang/pal-beta/depoE.c | 88 +++ src/files/lang/pal-beta/depoJ.c | 88 +++ src/files/lang/pal-beta/depoP.c | 88 +++ src/files/lang/pal-beta/depo_str_f.c | 88 +++ src/files/lang/pal-beta/depo_str_g.c | 88 +++ src/files/lang/pal-beta/depo_str_i.c | 88 +++ src/files/lang/pal-beta/depo_str_s.c | 88 +++ src/files/lang/pal-beta/destE.c | 3 + src/files/lang/pal-beta/destJ.c | 3 + src/files/lang/pal-beta/destP.c | 3 + src/files/lang/pal-beta/dest_str_f.c | 3 + src/files/lang/pal-beta/dest_str_g.c | 3 + src/files/lang/pal-beta/dest_str_i.c | 3 + src/files/lang/pal-beta/dest_str_s.c | 3 + src/files/lang/pal-beta/dishE.c | 328 ++++++++++++ src/files/lang/pal-beta/dishJ.c | 328 ++++++++++++ src/files/lang/pal-beta/dishP.c | 328 ++++++++++++ src/files/lang/pal-beta/dish_str_f.c | 328 ++++++++++++ src/files/lang/pal-beta/dish_str_g.c | 328 ++++++++++++ src/files/lang/pal-beta/dish_str_i.c | 328 ++++++++++++ src/files/lang/pal-beta/dish_str_s.c | 328 ++++++++++++ src/files/lang/pal-beta/earE.c | 112 ++++ src/files/lang/pal-beta/earJ.c | 112 ++++ src/files/lang/pal-beta/earP.c | 112 ++++ src/files/lang/pal-beta/ear_str_f.c | 112 ++++ src/files/lang/pal-beta/ear_str_g.c | 112 ++++ src/files/lang/pal-beta/ear_str_i.c | 112 ++++ src/files/lang/pal-beta/ear_str_s.c | 112 ++++ src/files/lang/pal-beta/eldE.c | 56 ++ src/files/lang/pal-beta/eldJ.c | 56 ++ src/files/lang/pal-beta/eldP.c | 56 ++ src/files/lang/pal-beta/eld_str_f.c | 56 ++ src/files/lang/pal-beta/eld_str_g.c | 56 ++ src/files/lang/pal-beta/eld_str_i.c | 56 ++ src/files/lang/pal-beta/eld_str_s.c | 56 ++ src/files/lang/pal-beta/gunE.c | 248 +++++++++ src/files/lang/pal-beta/gunJ.c | 248 +++++++++ src/files/lang/pal-beta/gunP.c | 248 +++++++++ src/files/lang/pal-beta/gun_str_f.c | 248 +++++++++ src/files/lang/pal-beta/gun_str_g.c | 248 +++++++++ src/files/lang/pal-beta/gun_str_i.c | 248 +++++++++ src/files/lang/pal-beta/gun_str_s.c | 248 +++++++++ src/files/lang/pal-beta/impE.c | 68 +++ src/files/lang/pal-beta/impJ.c | 68 +++ src/files/lang/pal-beta/impP.c | 68 +++ src/files/lang/pal-beta/imp_str_f.c | 68 +++ src/files/lang/pal-beta/imp_str_g.c | 68 +++ src/files/lang/pal-beta/imp_str_i.c | 68 +++ src/files/lang/pal-beta/imp_str_s.c | 68 +++ src/files/lang/pal-beta/junE.c | 3 + src/files/lang/pal-beta/junJ.c | 3 + src/files/lang/pal-beta/junP.c | 3 + src/files/lang/pal-beta/jun_str_f.c | 3 + src/files/lang/pal-beta/jun_str_g.c | 3 + src/files/lang/pal-beta/jun_str_i.c | 3 + src/files/lang/pal-beta/jun_str_s.c | 3 + src/files/lang/pal-beta/lamE.c | 3 + src/files/lang/pal-beta/lamJ.c | 3 + src/files/lang/pal-beta/lamP.c | 3 + src/files/lang/pal-beta/lam_str_f.c | 3 + src/files/lang/pal-beta/lam_str_g.c | 3 + src/files/lang/pal-beta/lam_str_i.c | 3 + src/files/lang/pal-beta/lam_str_s.c | 3 + src/files/lang/pal-beta/leeE.c | 60 +++ src/files/lang/pal-beta/leeJ.c | 60 +++ src/files/lang/pal-beta/leeP.c | 60 +++ src/files/lang/pal-beta/lee_str_f.c | 60 +++ src/files/lang/pal-beta/lee_str_g.c | 60 +++ src/files/lang/pal-beta/lee_str_i.c | 60 +++ src/files/lang/pal-beta/lee_str_s.c | 60 +++ src/files/lang/pal-beta/lenE.c | 3 + src/files/lang/pal-beta/lenJ.c | 3 + src/files/lang/pal-beta/lenP.c | 3 + src/files/lang/pal-beta/len_str_f.c | 3 + src/files/lang/pal-beta/len_str_g.c | 3 + src/files/lang/pal-beta/len_str_i.c | 3 + src/files/lang/pal-beta/len_str_s.c | 3 + src/files/lang/pal-beta/lipE.c | 112 ++++ src/files/lang/pal-beta/lipJ.c | 112 ++++ src/files/lang/pal-beta/lipP.c | 112 ++++ src/files/lang/pal-beta/lip_str_f.c | 112 ++++ src/files/lang/pal-beta/lip_str_g.c | 112 ++++ src/files/lang/pal-beta/lip_str_i.c | 112 ++++ src/files/lang/pal-beta/lip_str_s.c | 112 ++++ src/files/lang/pal-beta/lueE.c | 80 +++ src/files/lang/pal-beta/lueJ.c | 80 +++ src/files/lang/pal-beta/lueP.c | 80 +++ src/files/lang/pal-beta/lue_str_f.c | 80 +++ src/files/lang/pal-beta/lue_str_g.c | 80 +++ src/files/lang/pal-beta/lue_str_i.c | 80 +++ src/files/lang/pal-beta/lue_str_s.c | 80 +++ src/files/lang/pal-beta/miscE.c | 224 ++++++++ src/files/lang/pal-beta/miscJ.c | 224 ++++++++ src/files/lang/pal-beta/miscP.c | 224 ++++++++ src/files/lang/pal-beta/misc_str_f.c | 224 ++++++++ src/files/lang/pal-beta/misc_str_g.c | 224 ++++++++ src/files/lang/pal-beta/misc_str_i.c | 224 ++++++++ src/files/lang/pal-beta/misc_str_s.c | 224 ++++++++ src/files/lang/pal-beta/mp10E.c | 3 + src/files/lang/pal-beta/mp10J.c | 3 + src/files/lang/pal-beta/mp10P.c | 3 + src/files/lang/pal-beta/mp10_str_f.c | 3 + src/files/lang/pal-beta/mp10_str_g.c | 3 + src/files/lang/pal-beta/mp10_str_i.c | 3 + src/files/lang/pal-beta/mp10_str_s.c | 3 + src/files/lang/pal-beta/mp11E.c | 3 + src/files/lang/pal-beta/mp11J.c | 3 + src/files/lang/pal-beta/mp11P.c | 3 + src/files/lang/pal-beta/mp11_str_f.c | 3 + src/files/lang/pal-beta/mp11_str_g.c | 3 + src/files/lang/pal-beta/mp11_str_i.c | 3 + src/files/lang/pal-beta/mp11_str_s.c | 3 + src/files/lang/pal-beta/mp12E.c | 3 + src/files/lang/pal-beta/mp12J.c | 3 + src/files/lang/pal-beta/mp12P.c | 3 + src/files/lang/pal-beta/mp12_str_f.c | 3 + src/files/lang/pal-beta/mp12_str_g.c | 3 + src/files/lang/pal-beta/mp12_str_i.c | 3 + src/files/lang/pal-beta/mp12_str_s.c | 3 + src/files/lang/pal-beta/mp13E.c | 3 + src/files/lang/pal-beta/mp13J.c | 3 + src/files/lang/pal-beta/mp13P.c | 3 + src/files/lang/pal-beta/mp13_str_f.c | 3 + src/files/lang/pal-beta/mp13_str_g.c | 3 + src/files/lang/pal-beta/mp13_str_i.c | 3 + src/files/lang/pal-beta/mp13_str_s.c | 3 + src/files/lang/pal-beta/mp14E.c | 3 + src/files/lang/pal-beta/mp14J.c | 3 + src/files/lang/pal-beta/mp14P.c | 3 + src/files/lang/pal-beta/mp14_str_f.c | 3 + src/files/lang/pal-beta/mp14_str_g.c | 3 + src/files/lang/pal-beta/mp14_str_i.c | 3 + src/files/lang/pal-beta/mp14_str_s.c | 3 + src/files/lang/pal-beta/mp15E.c | 3 + src/files/lang/pal-beta/mp15J.c | 3 + src/files/lang/pal-beta/mp15P.c | 3 + src/files/lang/pal-beta/mp15_str_f.c | 3 + src/files/lang/pal-beta/mp15_str_g.c | 3 + src/files/lang/pal-beta/mp15_str_i.c | 3 + src/files/lang/pal-beta/mp15_str_s.c | 3 + src/files/lang/pal-beta/mp16E.c | 3 + src/files/lang/pal-beta/mp16J.c | 3 + src/files/lang/pal-beta/mp16P.c | 3 + src/files/lang/pal-beta/mp16_str_f.c | 3 + src/files/lang/pal-beta/mp16_str_g.c | 3 + src/files/lang/pal-beta/mp16_str_i.c | 3 + src/files/lang/pal-beta/mp16_str_s.c | 3 + src/files/lang/pal-beta/mp17E.c | 3 + src/files/lang/pal-beta/mp17J.c | 3 + src/files/lang/pal-beta/mp17P.c | 3 + src/files/lang/pal-beta/mp17_str_f.c | 3 + src/files/lang/pal-beta/mp17_str_g.c | 3 + src/files/lang/pal-beta/mp17_str_i.c | 3 + src/files/lang/pal-beta/mp17_str_s.c | 3 + src/files/lang/pal-beta/mp18E.c | 3 + src/files/lang/pal-beta/mp18J.c | 3 + src/files/lang/pal-beta/mp18P.c | 3 + src/files/lang/pal-beta/mp18_str_f.c | 3 + src/files/lang/pal-beta/mp18_str_g.c | 3 + src/files/lang/pal-beta/mp18_str_i.c | 3 + src/files/lang/pal-beta/mp18_str_s.c | 3 + src/files/lang/pal-beta/mp19E.c | 3 + src/files/lang/pal-beta/mp19J.c | 3 + src/files/lang/pal-beta/mp19P.c | 3 + src/files/lang/pal-beta/mp19_str_f.c | 3 + src/files/lang/pal-beta/mp19_str_g.c | 3 + src/files/lang/pal-beta/mp19_str_i.c | 3 + src/files/lang/pal-beta/mp19_str_s.c | 3 + src/files/lang/pal-beta/mp1E.c | 3 + src/files/lang/pal-beta/mp1J.c | 3 + src/files/lang/pal-beta/mp1P.c | 3 + src/files/lang/pal-beta/mp1_str_f.c | 3 + src/files/lang/pal-beta/mp1_str_g.c | 3 + src/files/lang/pal-beta/mp1_str_i.c | 3 + src/files/lang/pal-beta/mp1_str_s.c | 3 + src/files/lang/pal-beta/mp20E.c | 3 + src/files/lang/pal-beta/mp20J.c | 3 + src/files/lang/pal-beta/mp20P.c | 3 + src/files/lang/pal-beta/mp20_str_f.c | 3 + src/files/lang/pal-beta/mp20_str_g.c | 3 + src/files/lang/pal-beta/mp20_str_i.c | 3 + src/files/lang/pal-beta/mp20_str_s.c | 3 + src/files/lang/pal-beta/mp2E.c | 3 + src/files/lang/pal-beta/mp2J.c | 3 + src/files/lang/pal-beta/mp2P.c | 3 + src/files/lang/pal-beta/mp2_str_f.c | 3 + src/files/lang/pal-beta/mp2_str_g.c | 3 + src/files/lang/pal-beta/mp2_str_i.c | 3 + src/files/lang/pal-beta/mp2_str_s.c | 3 + src/files/lang/pal-beta/mp3E.c | 3 + src/files/lang/pal-beta/mp3J.c | 3 + src/files/lang/pal-beta/mp3P.c | 3 + src/files/lang/pal-beta/mp3_str_f.c | 3 + src/files/lang/pal-beta/mp3_str_g.c | 3 + src/files/lang/pal-beta/mp3_str_i.c | 3 + src/files/lang/pal-beta/mp3_str_s.c | 3 + src/files/lang/pal-beta/mp4E.c | 3 + src/files/lang/pal-beta/mp4J.c | 3 + src/files/lang/pal-beta/mp4P.c | 3 + src/files/lang/pal-beta/mp4_str_f.c | 3 + src/files/lang/pal-beta/mp4_str_g.c | 3 + src/files/lang/pal-beta/mp4_str_i.c | 3 + src/files/lang/pal-beta/mp4_str_s.c | 3 + src/files/lang/pal-beta/mp5E.c | 3 + src/files/lang/pal-beta/mp5J.c | 3 + src/files/lang/pal-beta/mp5P.c | 3 + src/files/lang/pal-beta/mp5_str_f.c | 3 + src/files/lang/pal-beta/mp5_str_g.c | 3 + src/files/lang/pal-beta/mp5_str_i.c | 3 + src/files/lang/pal-beta/mp5_str_s.c | 3 + src/files/lang/pal-beta/mp6E.c | 3 + src/files/lang/pal-beta/mp6J.c | 3 + src/files/lang/pal-beta/mp6P.c | 3 + src/files/lang/pal-beta/mp6_str_f.c | 3 + src/files/lang/pal-beta/mp6_str_g.c | 3 + src/files/lang/pal-beta/mp6_str_i.c | 3 + src/files/lang/pal-beta/mp6_str_s.c | 3 + src/files/lang/pal-beta/mp7E.c | 3 + src/files/lang/pal-beta/mp7J.c | 3 + src/files/lang/pal-beta/mp7P.c | 3 + src/files/lang/pal-beta/mp7_str_f.c | 3 + src/files/lang/pal-beta/mp7_str_g.c | 3 + src/files/lang/pal-beta/mp7_str_i.c | 3 + src/files/lang/pal-beta/mp7_str_s.c | 3 + src/files/lang/pal-beta/mp8E.c | 3 + src/files/lang/pal-beta/mp8J.c | 3 + src/files/lang/pal-beta/mp8P.c | 3 + src/files/lang/pal-beta/mp8_str_f.c | 3 + src/files/lang/pal-beta/mp8_str_g.c | 3 + src/files/lang/pal-beta/mp8_str_i.c | 3 + src/files/lang/pal-beta/mp8_str_s.c | 3 + src/files/lang/pal-beta/mp9E.c | 3 + src/files/lang/pal-beta/mp9J.c | 3 + src/files/lang/pal-beta/mp9P.c | 3 + src/files/lang/pal-beta/mp9_str_f.c | 3 + src/files/lang/pal-beta/mp9_str_g.c | 3 + src/files/lang/pal-beta/mp9_str_i.c | 3 + src/files/lang/pal-beta/mp9_str_s.c | 3 + src/files/lang/pal-beta/mpmenuE.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenuJ.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenuP.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenu_str_f.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenu_str_g.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenu_str_i.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpmenu_str_s.c | 500 +++++++++++++++++ src/files/lang/pal-beta/mpweaponsE.c | 276 ++++++++++ src/files/lang/pal-beta/mpweaponsJ.c | 276 ++++++++++ src/files/lang/pal-beta/mpweaponsP.c | 276 ++++++++++ src/files/lang/pal-beta/mpweapons_str_f.c | 276 ++++++++++ src/files/lang/pal-beta/mpweapons_str_g.c | 276 ++++++++++ src/files/lang/pal-beta/mpweapons_str_i.c | 276 ++++++++++ src/files/lang/pal-beta/mpweapons_str_s.c | 276 ++++++++++ src/files/lang/pal-beta/oatE.c | 3 + src/files/lang/pal-beta/oatJ.c | 3 + src/files/lang/pal-beta/oatP.c | 3 + src/files/lang/pal-beta/oat_str_f.c | 3 + src/files/lang/pal-beta/oat_str_g.c | 3 + src/files/lang/pal-beta/oat_str_i.c | 3 + src/files/lang/pal-beta/oat_str_s.c | 3 + src/files/lang/pal-beta/oldE.c | 3 + src/files/lang/pal-beta/oldJ.c | 3 + src/files/lang/pal-beta/oldP.c | 3 + src/files/lang/pal-beta/old_str_f.c | 3 + src/files/lang/pal-beta/old_str_g.c | 3 + src/files/lang/pal-beta/old_str_i.c | 3 + src/files/lang/pal-beta/old_str_s.c | 3 + src/files/lang/pal-beta/optionsE.c | 500 +++++++++++++++++ src/files/lang/pal-beta/optionsJ.c | 500 +++++++++++++++++ src/files/lang/pal-beta/optionsP.c | 500 +++++++++++++++++ src/files/lang/pal-beta/options_str_f.c | 500 +++++++++++++++++ src/files/lang/pal-beta/options_str_g.c | 500 +++++++++++++++++ src/files/lang/pal-beta/options_str_i.c | 500 +++++++++++++++++ src/files/lang/pal-beta/options_str_s.c | 500 +++++++++++++++++ src/files/lang/pal-beta/pamE.c | 52 ++ src/files/lang/pal-beta/pamJ.c | 52 ++ src/files/lang/pal-beta/pamP.c | 52 ++ src/files/lang/pal-beta/pam_str_f.c | 52 ++ src/files/lang/pal-beta/pam_str_g.c | 52 ++ src/files/lang/pal-beta/pam_str_i.c | 52 ++ src/files/lang/pal-beta/pam_str_s.c | 52 ++ src/files/lang/pal-beta/peteE.c | 80 +++ src/files/lang/pal-beta/peteJ.c | 80 +++ src/files/lang/pal-beta/peteP.c | 80 +++ src/files/lang/pal-beta/pete_str_f.c | 80 +++ src/files/lang/pal-beta/pete_str_g.c | 80 +++ src/files/lang/pal-beta/pete_str_i.c | 80 +++ src/files/lang/pal-beta/pete_str_s.c | 80 +++ src/files/lang/pal-beta/propobjE.c | 92 ++++ src/files/lang/pal-beta/propobjJ.c | 92 ++++ src/files/lang/pal-beta/propobjP.c | 92 ++++ src/files/lang/pal-beta/propobj_str_f.c | 92 ++++ src/files/lang/pal-beta/propobj_str_g.c | 92 ++++ src/files/lang/pal-beta/propobj_str_i.c | 92 ++++ src/files/lang/pal-beta/propobj_str_s.c | 92 ++++ src/files/lang/pal-beta/refE.c | 3 + src/files/lang/pal-beta/refJ.c | 3 + src/files/lang/pal-beta/refP.c | 3 + src/files/lang/pal-beta/ref_str_f.c | 3 + src/files/lang/pal-beta/ref_str_g.c | 3 + src/files/lang/pal-beta/ref_str_i.c | 3 + src/files/lang/pal-beta/ref_str_s.c | 3 + src/files/lang/pal-beta/ritE.c | 92 ++++ src/files/lang/pal-beta/ritJ.c | 92 ++++ src/files/lang/pal-beta/ritP.c | 92 ++++ src/files/lang/pal-beta/rit_str_f.c | 92 ++++ src/files/lang/pal-beta/rit_str_g.c | 92 ++++ src/files/lang/pal-beta/rit_str_i.c | 92 ++++ src/files/lang/pal-beta/rit_str_s.c | 92 ++++ src/files/lang/pal-beta/runE.c | 3 + src/files/lang/pal-beta/runJ.c | 3 + src/files/lang/pal-beta/runP.c | 3 + src/files/lang/pal-beta/run_str_f.c | 3 + src/files/lang/pal-beta/run_str_g.c | 3 + src/files/lang/pal-beta/run_str_i.c | 3 + src/files/lang/pal-beta/run_str_s.c | 3 + src/files/lang/pal-beta/sevE.c | 20 + src/files/lang/pal-beta/sevJ.c | 20 + src/files/lang/pal-beta/sevP.c | 20 + src/files/lang/pal-beta/sev_str_f.c | 20 + src/files/lang/pal-beta/sev_str_g.c | 20 + src/files/lang/pal-beta/sev_str_i.c | 20 + src/files/lang/pal-beta/sev_str_s.c | 20 + src/files/lang/pal-beta/sevbE.c | 12 + src/files/lang/pal-beta/sevbJ.c | 12 + src/files/lang/pal-beta/sevbP.c | 12 + src/files/lang/pal-beta/sevb_str_f.c | 12 + src/files/lang/pal-beta/sevb_str_g.c | 12 + src/files/lang/pal-beta/sevb_str_i.c | 12 + src/files/lang/pal-beta/sevb_str_s.c | 12 + src/files/lang/pal-beta/sevxE.c | 3 + src/files/lang/pal-beta/sevxJ.c | 3 + src/files/lang/pal-beta/sevxP.c | 3 + src/files/lang/pal-beta/sevx_str_f.c | 3 + src/files/lang/pal-beta/sevx_str_g.c | 3 + src/files/lang/pal-beta/sevx_str_i.c | 3 + src/files/lang/pal-beta/sevx_str_s.c | 3 + src/files/lang/pal-beta/sevxbE.c | 3 + src/files/lang/pal-beta/sevxbJ.c | 3 + src/files/lang/pal-beta/sevxbP.c | 3 + src/files/lang/pal-beta/sevxb_str_f.c | 3 + src/files/lang/pal-beta/sevxb_str_g.c | 3 + src/files/lang/pal-beta/sevxb_str_i.c | 3 + src/files/lang/pal-beta/sevxb_str_s.c | 3 + src/files/lang/pal-beta/shoE.c | 60 +++ src/files/lang/pal-beta/shoJ.c | 60 +++ src/files/lang/pal-beta/shoP.c | 60 +++ src/files/lang/pal-beta/sho_str_f.c | 60 +++ src/files/lang/pal-beta/sho_str_g.c | 60 +++ src/files/lang/pal-beta/sho_str_i.c | 60 +++ src/files/lang/pal-beta/sho_str_s.c | 60 +++ src/files/lang/pal-beta/siloE.c | 3 + src/files/lang/pal-beta/siloJ.c | 3 + src/files/lang/pal-beta/siloP.c | 3 + src/files/lang/pal-beta/silo_str_f.c | 3 + src/files/lang/pal-beta/silo_str_g.c | 3 + src/files/lang/pal-beta/silo_str_i.c | 3 + src/files/lang/pal-beta/silo_str_s.c | 3 + src/files/lang/pal-beta/statE.c | 16 + src/files/lang/pal-beta/statJ.c | 16 + src/files/lang/pal-beta/statP.c | 16 + src/files/lang/pal-beta/stat_str_f.c | 16 + src/files/lang/pal-beta/stat_str_g.c | 16 + src/files/lang/pal-beta/stat_str_i.c | 16 + src/files/lang/pal-beta/stat_str_s.c | 16 + src/files/lang/pal-beta/titleE.c | 156 ++++++ src/files/lang/pal-beta/titleJ.c | 156 ++++++ src/files/lang/pal-beta/titleP.c | 156 ++++++ src/files/lang/pal-beta/title_str_f.c | 156 ++++++ src/files/lang/pal-beta/title_str_g.c | 156 ++++++ src/files/lang/pal-beta/title_str_i.c | 156 ++++++ src/files/lang/pal-beta/title_str_s.c | 156 ++++++ src/files/lang/pal-beta/traE.c | 92 ++++ src/files/lang/pal-beta/traJ.c | 92 ++++ src/files/lang/pal-beta/traP.c | 92 ++++ src/files/lang/pal-beta/tra_str_f.c | 92 ++++ src/files/lang/pal-beta/tra_str_g.c | 92 ++++ src/files/lang/pal-beta/tra_str_i.c | 92 ++++ src/files/lang/pal-beta/tra_str_s.c | 92 ++++ src/files/lang/pal-beta/uffE.c | 3 + src/files/lang/pal-beta/uffJ.c | 3 + src/files/lang/pal-beta/uffP.c | 3 + src/files/lang/pal-beta/uff_str_f.c | 3 + src/files/lang/pal-beta/uff_str_g.c | 3 + src/files/lang/pal-beta/uff_str_i.c | 3 + src/files/lang/pal-beta/uff_str_s.c | 3 + src/files/lang/pal-beta/waxE.c | 32 ++ src/files/lang/pal-beta/waxJ.c | 32 ++ src/files/lang/pal-beta/waxP.c | 32 ++ src/files/lang/pal-beta/wax_str_f.c | 32 ++ src/files/lang/pal-beta/wax_str_g.c | 32 ++ src/files/lang/pal-beta/wax_str_i.c | 32 ++ src/files/lang/pal-beta/wax_str_s.c | 32 ++ src/files/lang/pal-final/ameE.c | 116 ++++ src/files/lang/pal-final/ameJ.c | 116 ++++ src/files/lang/pal-final/ameP.c | 116 ++++ src/files/lang/pal-final/ame_str_f.c | 116 ++++ src/files/lang/pal-final/ame_str_g.c | 116 ++++ src/files/lang/pal-final/ame_str_i.c | 116 ++++ src/files/lang/pal-final/ame_str_s.c | 116 ++++ src/files/lang/pal-final/archE.c | 3 + src/files/lang/pal-final/archJ.c | 3 + src/files/lang/pal-final/archP.c | 3 + src/files/lang/pal-final/arch_str_f.c | 3 + src/files/lang/pal-final/arch_str_g.c | 3 + src/files/lang/pal-final/arch_str_i.c | 3 + src/files/lang/pal-final/arch_str_s.c | 3 + src/files/lang/pal-final/arecE.c | 3 + src/files/lang/pal-final/arecJ.c | 3 + src/files/lang/pal-final/arecP.c | 3 + src/files/lang/pal-final/arec_str_f.c | 3 + src/files/lang/pal-final/arec_str_g.c | 3 + src/files/lang/pal-final/arec_str_i.c | 3 + src/files/lang/pal-final/arec_str_s.c | 3 + src/files/lang/pal-final/arkE.c | 80 +++ src/files/lang/pal-final/arkJ.c | 80 +++ src/files/lang/pal-final/arkP.c | 80 +++ src/files/lang/pal-final/ark_str_f.c | 80 +++ src/files/lang/pal-final/ark_str_g.c | 80 +++ src/files/lang/pal-final/ark_str_i.c | 80 +++ src/files/lang/pal-final/ark_str_s.c | 80 +++ src/files/lang/pal-final/ashE.c | 3 + src/files/lang/pal-final/ashJ.c | 3 + src/files/lang/pal-final/ashP.c | 3 + src/files/lang/pal-final/ash_str_f.c | 3 + src/files/lang/pal-final/ash_str_g.c | 3 + src/files/lang/pal-final/ash_str_i.c | 3 + src/files/lang/pal-final/ash_str_s.c | 3 + src/files/lang/pal-final/ateE.c | 20 + src/files/lang/pal-final/ateJ.c | 20 + src/files/lang/pal-final/ateP.c | 20 + src/files/lang/pal-final/ate_str_f.c | 20 + src/files/lang/pal-final/ate_str_g.c | 20 + src/files/lang/pal-final/ate_str_i.c | 20 + src/files/lang/pal-final/ate_str_s.c | 20 + src/files/lang/pal-final/aztE.c | 52 ++ src/files/lang/pal-final/aztJ.c | 52 ++ src/files/lang/pal-final/aztP.c | 52 ++ src/files/lang/pal-final/azt_str_f.c | 52 ++ src/files/lang/pal-final/azt_str_g.c | 52 ++ src/files/lang/pal-final/azt_str_i.c | 52 ++ src/files/lang/pal-final/azt_str_s.c | 52 ++ src/files/lang/pal-final/catE.c | 3 + src/files/lang/pal-final/catJ.c | 3 + src/files/lang/pal-final/catP.c | 3 + src/files/lang/pal-final/cat_str_f.c | 3 + src/files/lang/pal-final/cat_str_g.c | 3 + src/files/lang/pal-final/cat_str_i.c | 3 + src/files/lang/pal-final/cat_str_s.c | 3 + src/files/lang/pal-final/caveE.c | 72 +++ src/files/lang/pal-final/caveJ.c | 72 +++ src/files/lang/pal-final/caveP.c | 72 +++ src/files/lang/pal-final/cave_str_f.c | 72 +++ src/files/lang/pal-final/cave_str_g.c | 72 +++ src/files/lang/pal-final/cave_str_i.c | 72 +++ src/files/lang/pal-final/cave_str_s.c | 72 +++ src/files/lang/pal-final/cradE.c | 3 + src/files/lang/pal-final/cradJ.c | 3 + src/files/lang/pal-final/cradP.c | 3 + src/files/lang/pal-final/crad_str_f.c | 3 + src/files/lang/pal-final/crad_str_g.c | 3 + src/files/lang/pal-final/crad_str_i.c | 3 + src/files/lang/pal-final/crad_str_s.c | 3 + src/files/lang/pal-final/crypE.c | 3 + src/files/lang/pal-final/crypJ.c | 3 + src/files/lang/pal-final/crypP.c | 3 + src/files/lang/pal-final/cryp_str_f.c | 3 + src/files/lang/pal-final/cryp_str_g.c | 3 + src/files/lang/pal-final/cryp_str_i.c | 3 + src/files/lang/pal-final/cryp_str_s.c | 3 + src/files/lang/pal-final/damE.c | 52 ++ src/files/lang/pal-final/damJ.c | 52 ++ src/files/lang/pal-final/damP.c | 52 ++ src/files/lang/pal-final/dam_str_f.c | 52 ++ src/files/lang/pal-final/dam_str_g.c | 52 ++ src/files/lang/pal-final/dam_str_i.c | 52 ++ src/files/lang/pal-final/dam_str_s.c | 52 ++ src/files/lang/pal-final/depoE.c | 88 +++ src/files/lang/pal-final/depoJ.c | 88 +++ src/files/lang/pal-final/depoP.c | 88 +++ src/files/lang/pal-final/depo_str_f.c | 88 +++ src/files/lang/pal-final/depo_str_g.c | 88 +++ src/files/lang/pal-final/depo_str_i.c | 88 +++ src/files/lang/pal-final/depo_str_s.c | 88 +++ src/files/lang/pal-final/destE.c | 3 + src/files/lang/pal-final/destJ.c | 3 + src/files/lang/pal-final/destP.c | 3 + src/files/lang/pal-final/dest_str_f.c | 3 + src/files/lang/pal-final/dest_str_g.c | 3 + src/files/lang/pal-final/dest_str_i.c | 3 + src/files/lang/pal-final/dest_str_s.c | 3 + src/files/lang/pal-final/dishE.c | 328 ++++++++++++ src/files/lang/pal-final/dishJ.c | 328 ++++++++++++ src/files/lang/pal-final/dishP.c | 328 ++++++++++++ src/files/lang/pal-final/dish_str_f.c | 328 ++++++++++++ src/files/lang/pal-final/dish_str_g.c | 328 ++++++++++++ src/files/lang/pal-final/dish_str_i.c | 328 ++++++++++++ src/files/lang/pal-final/dish_str_s.c | 328 ++++++++++++ src/files/lang/pal-final/earE.c | 112 ++++ src/files/lang/pal-final/earJ.c | 112 ++++ src/files/lang/pal-final/earP.c | 112 ++++ src/files/lang/pal-final/ear_str_f.c | 112 ++++ src/files/lang/pal-final/ear_str_g.c | 112 ++++ src/files/lang/pal-final/ear_str_i.c | 112 ++++ src/files/lang/pal-final/ear_str_s.c | 112 ++++ src/files/lang/pal-final/eldE.c | 56 ++ src/files/lang/pal-final/eldJ.c | 56 ++ src/files/lang/pal-final/eldP.c | 56 ++ src/files/lang/pal-final/eld_str_f.c | 56 ++ src/files/lang/pal-final/eld_str_g.c | 56 ++ src/files/lang/pal-final/eld_str_i.c | 56 ++ src/files/lang/pal-final/eld_str_s.c | 56 ++ src/files/lang/pal-final/gunE.c | 260 +++++++++ src/files/lang/pal-final/gunJ.c | 260 +++++++++ src/files/lang/pal-final/gunP.c | 260 +++++++++ src/files/lang/pal-final/gun_str_f.c | 260 +++++++++ src/files/lang/pal-final/gun_str_g.c | 260 +++++++++ src/files/lang/pal-final/gun_str_i.c | 260 +++++++++ src/files/lang/pal-final/gun_str_s.c | 260 +++++++++ src/files/lang/pal-final/impE.c | 68 +++ src/files/lang/pal-final/impJ.c | 68 +++ src/files/lang/pal-final/impP.c | 68 +++ src/files/lang/pal-final/imp_str_f.c | 68 +++ src/files/lang/pal-final/imp_str_g.c | 68 +++ src/files/lang/pal-final/imp_str_i.c | 68 +++ src/files/lang/pal-final/imp_str_s.c | 68 +++ src/files/lang/pal-final/junE.c | 3 + src/files/lang/pal-final/junJ.c | 3 + src/files/lang/pal-final/junP.c | 3 + src/files/lang/pal-final/jun_str_f.c | 3 + src/files/lang/pal-final/jun_str_g.c | 3 + src/files/lang/pal-final/jun_str_i.c | 3 + src/files/lang/pal-final/jun_str_s.c | 3 + src/files/lang/pal-final/lamE.c | 3 + src/files/lang/pal-final/lamJ.c | 3 + src/files/lang/pal-final/lamP.c | 3 + src/files/lang/pal-final/lam_str_f.c | 3 + src/files/lang/pal-final/lam_str_g.c | 3 + src/files/lang/pal-final/lam_str_i.c | 3 + src/files/lang/pal-final/lam_str_s.c | 3 + src/files/lang/pal-final/leeE.c | 60 +++ src/files/lang/pal-final/leeJ.c | 60 +++ src/files/lang/pal-final/leeP.c | 60 +++ src/files/lang/pal-final/lee_str_f.c | 60 +++ src/files/lang/pal-final/lee_str_g.c | 60 +++ src/files/lang/pal-final/lee_str_i.c | 60 +++ src/files/lang/pal-final/lee_str_s.c | 60 +++ src/files/lang/pal-final/lenE.c | 3 + src/files/lang/pal-final/lenJ.c | 3 + src/files/lang/pal-final/lenP.c | 3 + src/files/lang/pal-final/len_str_f.c | 3 + src/files/lang/pal-final/len_str_g.c | 3 + src/files/lang/pal-final/len_str_i.c | 3 + src/files/lang/pal-final/len_str_s.c | 3 + src/files/lang/pal-final/lipE.c | 112 ++++ src/files/lang/pal-final/lipJ.c | 112 ++++ src/files/lang/pal-final/lipP.c | 112 ++++ src/files/lang/pal-final/lip_str_f.c | 112 ++++ src/files/lang/pal-final/lip_str_g.c | 112 ++++ src/files/lang/pal-final/lip_str_i.c | 112 ++++ src/files/lang/pal-final/lip_str_s.c | 112 ++++ src/files/lang/pal-final/lueE.c | 80 +++ src/files/lang/pal-final/lueJ.c | 80 +++ src/files/lang/pal-final/lueP.c | 80 +++ src/files/lang/pal-final/lue_str_f.c | 80 +++ src/files/lang/pal-final/lue_str_g.c | 80 +++ src/files/lang/pal-final/lue_str_i.c | 80 +++ src/files/lang/pal-final/lue_str_s.c | 80 +++ src/files/lang/pal-final/miscE.c | 224 ++++++++ src/files/lang/pal-final/miscJ.c | 224 ++++++++ src/files/lang/pal-final/miscP.c | 224 ++++++++ src/files/lang/pal-final/misc_str_f.c | 224 ++++++++ src/files/lang/pal-final/misc_str_g.c | 224 ++++++++ src/files/lang/pal-final/misc_str_i.c | 224 ++++++++ src/files/lang/pal-final/misc_str_s.c | 224 ++++++++ src/files/lang/pal-final/mp10E.c | 3 + src/files/lang/pal-final/mp10J.c | 3 + src/files/lang/pal-final/mp10P.c | 3 + src/files/lang/pal-final/mp10_str_f.c | 3 + src/files/lang/pal-final/mp10_str_g.c | 3 + src/files/lang/pal-final/mp10_str_i.c | 3 + src/files/lang/pal-final/mp10_str_s.c | 3 + src/files/lang/pal-final/mp11E.c | 3 + src/files/lang/pal-final/mp11J.c | 3 + src/files/lang/pal-final/mp11P.c | 3 + src/files/lang/pal-final/mp11_str_f.c | 3 + src/files/lang/pal-final/mp11_str_g.c | 3 + src/files/lang/pal-final/mp11_str_i.c | 3 + src/files/lang/pal-final/mp11_str_s.c | 3 + src/files/lang/pal-final/mp12E.c | 3 + src/files/lang/pal-final/mp12J.c | 3 + src/files/lang/pal-final/mp12P.c | 3 + src/files/lang/pal-final/mp12_str_f.c | 3 + src/files/lang/pal-final/mp12_str_g.c | 3 + src/files/lang/pal-final/mp12_str_i.c | 3 + src/files/lang/pal-final/mp12_str_s.c | 3 + src/files/lang/pal-final/mp13E.c | 3 + src/files/lang/pal-final/mp13J.c | 3 + src/files/lang/pal-final/mp13P.c | 3 + src/files/lang/pal-final/mp13_str_f.c | 3 + src/files/lang/pal-final/mp13_str_g.c | 3 + src/files/lang/pal-final/mp13_str_i.c | 3 + src/files/lang/pal-final/mp13_str_s.c | 3 + src/files/lang/pal-final/mp14E.c | 3 + src/files/lang/pal-final/mp14J.c | 3 + src/files/lang/pal-final/mp14P.c | 3 + src/files/lang/pal-final/mp14_str_f.c | 3 + src/files/lang/pal-final/mp14_str_g.c | 3 + src/files/lang/pal-final/mp14_str_i.c | 3 + src/files/lang/pal-final/mp14_str_s.c | 3 + src/files/lang/pal-final/mp15E.c | 3 + src/files/lang/pal-final/mp15J.c | 3 + src/files/lang/pal-final/mp15P.c | 3 + src/files/lang/pal-final/mp15_str_f.c | 3 + src/files/lang/pal-final/mp15_str_g.c | 3 + src/files/lang/pal-final/mp15_str_i.c | 3 + src/files/lang/pal-final/mp15_str_s.c | 3 + src/files/lang/pal-final/mp16E.c | 3 + src/files/lang/pal-final/mp16J.c | 3 + src/files/lang/pal-final/mp16P.c | 3 + src/files/lang/pal-final/mp16_str_f.c | 3 + src/files/lang/pal-final/mp16_str_g.c | 3 + src/files/lang/pal-final/mp16_str_i.c | 3 + src/files/lang/pal-final/mp16_str_s.c | 3 + src/files/lang/pal-final/mp17E.c | 3 + src/files/lang/pal-final/mp17J.c | 3 + src/files/lang/pal-final/mp17P.c | 3 + src/files/lang/pal-final/mp17_str_f.c | 3 + src/files/lang/pal-final/mp17_str_g.c | 3 + src/files/lang/pal-final/mp17_str_i.c | 3 + src/files/lang/pal-final/mp17_str_s.c | 3 + src/files/lang/pal-final/mp18E.c | 3 + src/files/lang/pal-final/mp18J.c | 3 + src/files/lang/pal-final/mp18P.c | 3 + src/files/lang/pal-final/mp18_str_f.c | 3 + src/files/lang/pal-final/mp18_str_g.c | 3 + src/files/lang/pal-final/mp18_str_i.c | 3 + src/files/lang/pal-final/mp18_str_s.c | 3 + src/files/lang/pal-final/mp19E.c | 3 + src/files/lang/pal-final/mp19J.c | 3 + src/files/lang/pal-final/mp19P.c | 3 + src/files/lang/pal-final/mp19_str_f.c | 3 + src/files/lang/pal-final/mp19_str_g.c | 3 + src/files/lang/pal-final/mp19_str_i.c | 3 + src/files/lang/pal-final/mp19_str_s.c | 3 + src/files/lang/pal-final/mp1E.c | 3 + src/files/lang/pal-final/mp1J.c | 3 + src/files/lang/pal-final/mp1P.c | 3 + src/files/lang/pal-final/mp1_str_f.c | 3 + src/files/lang/pal-final/mp1_str_g.c | 3 + src/files/lang/pal-final/mp1_str_i.c | 3 + src/files/lang/pal-final/mp1_str_s.c | 3 + src/files/lang/pal-final/mp20E.c | 3 + src/files/lang/pal-final/mp20J.c | 3 + src/files/lang/pal-final/mp20P.c | 3 + src/files/lang/pal-final/mp20_str_f.c | 3 + src/files/lang/pal-final/mp20_str_g.c | 3 + src/files/lang/pal-final/mp20_str_i.c | 3 + src/files/lang/pal-final/mp20_str_s.c | 3 + src/files/lang/pal-final/mp2E.c | 3 + src/files/lang/pal-final/mp2J.c | 3 + src/files/lang/pal-final/mp2P.c | 3 + src/files/lang/pal-final/mp2_str_f.c | 3 + src/files/lang/pal-final/mp2_str_g.c | 3 + src/files/lang/pal-final/mp2_str_i.c | 3 + src/files/lang/pal-final/mp2_str_s.c | 3 + src/files/lang/pal-final/mp3E.c | 3 + src/files/lang/pal-final/mp3J.c | 3 + src/files/lang/pal-final/mp3P.c | 3 + src/files/lang/pal-final/mp3_str_f.c | 3 + src/files/lang/pal-final/mp3_str_g.c | 3 + src/files/lang/pal-final/mp3_str_i.c | 3 + src/files/lang/pal-final/mp3_str_s.c | 3 + src/files/lang/pal-final/mp4E.c | 3 + src/files/lang/pal-final/mp4J.c | 3 + src/files/lang/pal-final/mp4P.c | 3 + src/files/lang/pal-final/mp4_str_f.c | 3 + src/files/lang/pal-final/mp4_str_g.c | 3 + src/files/lang/pal-final/mp4_str_i.c | 3 + src/files/lang/pal-final/mp4_str_s.c | 3 + src/files/lang/pal-final/mp5E.c | 3 + src/files/lang/pal-final/mp5J.c | 3 + src/files/lang/pal-final/mp5P.c | 3 + src/files/lang/pal-final/mp5_str_f.c | 3 + src/files/lang/pal-final/mp5_str_g.c | 3 + src/files/lang/pal-final/mp5_str_i.c | 3 + src/files/lang/pal-final/mp5_str_s.c | 3 + src/files/lang/pal-final/mp6E.c | 3 + src/files/lang/pal-final/mp6J.c | 3 + src/files/lang/pal-final/mp6P.c | 3 + src/files/lang/pal-final/mp6_str_f.c | 3 + src/files/lang/pal-final/mp6_str_g.c | 3 + src/files/lang/pal-final/mp6_str_i.c | 3 + src/files/lang/pal-final/mp6_str_s.c | 3 + src/files/lang/pal-final/mp7E.c | 3 + src/files/lang/pal-final/mp7J.c | 3 + src/files/lang/pal-final/mp7P.c | 3 + src/files/lang/pal-final/mp7_str_f.c | 3 + src/files/lang/pal-final/mp7_str_g.c | 3 + src/files/lang/pal-final/mp7_str_i.c | 3 + src/files/lang/pal-final/mp7_str_s.c | 3 + src/files/lang/pal-final/mp8E.c | 3 + src/files/lang/pal-final/mp8J.c | 3 + src/files/lang/pal-final/mp8P.c | 3 + src/files/lang/pal-final/mp8_str_f.c | 3 + src/files/lang/pal-final/mp8_str_g.c | 3 + src/files/lang/pal-final/mp8_str_i.c | 3 + src/files/lang/pal-final/mp8_str_s.c | 3 + src/files/lang/pal-final/mp9E.c | 3 + src/files/lang/pal-final/mp9J.c | 3 + src/files/lang/pal-final/mp9P.c | 3 + src/files/lang/pal-final/mp9_str_f.c | 3 + src/files/lang/pal-final/mp9_str_g.c | 3 + src/files/lang/pal-final/mp9_str_i.c | 3 + src/files/lang/pal-final/mp9_str_s.c | 3 + src/files/lang/pal-final/mpmenuE.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenuJ.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenuP.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenu_str_f.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenu_str_g.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenu_str_i.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpmenu_str_s.c | 500 +++++++++++++++++ src/files/lang/pal-final/mpweaponsE.c | 288 ++++++++++ src/files/lang/pal-final/mpweaponsJ.c | 288 ++++++++++ src/files/lang/pal-final/mpweaponsP.c | 288 ++++++++++ src/files/lang/pal-final/mpweapons_str_f.c | 288 ++++++++++ src/files/lang/pal-final/mpweapons_str_g.c | 288 ++++++++++ src/files/lang/pal-final/mpweapons_str_i.c | 288 ++++++++++ src/files/lang/pal-final/mpweapons_str_s.c | 288 ++++++++++ src/files/lang/pal-final/oatE.c | 3 + src/files/lang/pal-final/oatJ.c | 3 + src/files/lang/pal-final/oatP.c | 3 + src/files/lang/pal-final/oat_str_f.c | 3 + src/files/lang/pal-final/oat_str_g.c | 3 + src/files/lang/pal-final/oat_str_i.c | 3 + src/files/lang/pal-final/oat_str_s.c | 3 + src/files/lang/pal-final/oldE.c | 3 + src/files/lang/pal-final/oldJ.c | 3 + src/files/lang/pal-final/oldP.c | 3 + src/files/lang/pal-final/old_str_f.c | 3 + src/files/lang/pal-final/old_str_g.c | 3 + src/files/lang/pal-final/old_str_i.c | 3 + src/files/lang/pal-final/old_str_s.c | 3 + src/files/lang/pal-final/optionsE.c | 500 +++++++++++++++++ src/files/lang/pal-final/optionsJ.c | 500 +++++++++++++++++ src/files/lang/pal-final/optionsP.c | 500 +++++++++++++++++ src/files/lang/pal-final/options_str_f.c | 500 +++++++++++++++++ src/files/lang/pal-final/options_str_g.c | 500 +++++++++++++++++ src/files/lang/pal-final/options_str_i.c | 500 +++++++++++++++++ src/files/lang/pal-final/options_str_s.c | 500 +++++++++++++++++ src/files/lang/pal-final/pamE.c | 52 ++ src/files/lang/pal-final/pamJ.c | 52 ++ src/files/lang/pal-final/pamP.c | 52 ++ src/files/lang/pal-final/pam_str_f.c | 52 ++ src/files/lang/pal-final/pam_str_g.c | 52 ++ src/files/lang/pal-final/pam_str_i.c | 52 ++ src/files/lang/pal-final/pam_str_s.c | 52 ++ src/files/lang/pal-final/peteE.c | 80 +++ src/files/lang/pal-final/peteJ.c | 80 +++ src/files/lang/pal-final/peteP.c | 80 +++ src/files/lang/pal-final/pete_str_f.c | 80 +++ src/files/lang/pal-final/pete_str_g.c | 80 +++ src/files/lang/pal-final/pete_str_i.c | 80 +++ src/files/lang/pal-final/pete_str_s.c | 80 +++ src/files/lang/pal-final/propobjE.c | 92 ++++ src/files/lang/pal-final/propobjJ.c | 92 ++++ src/files/lang/pal-final/propobjP.c | 92 ++++ src/files/lang/pal-final/propobj_str_f.c | 92 ++++ src/files/lang/pal-final/propobj_str_g.c | 92 ++++ src/files/lang/pal-final/propobj_str_i.c | 92 ++++ src/files/lang/pal-final/propobj_str_s.c | 92 ++++ src/files/lang/pal-final/refE.c | 3 + src/files/lang/pal-final/refJ.c | 3 + src/files/lang/pal-final/refP.c | 3 + src/files/lang/pal-final/ref_str_f.c | 3 + src/files/lang/pal-final/ref_str_g.c | 3 + src/files/lang/pal-final/ref_str_i.c | 3 + src/files/lang/pal-final/ref_str_s.c | 3 + src/files/lang/pal-final/ritE.c | 92 ++++ src/files/lang/pal-final/ritJ.c | 92 ++++ src/files/lang/pal-final/ritP.c | 92 ++++ src/files/lang/pal-final/rit_str_f.c | 92 ++++ src/files/lang/pal-final/rit_str_g.c | 92 ++++ src/files/lang/pal-final/rit_str_i.c | 92 ++++ src/files/lang/pal-final/rit_str_s.c | 92 ++++ src/files/lang/pal-final/runE.c | 3 + src/files/lang/pal-final/runJ.c | 3 + src/files/lang/pal-final/runP.c | 3 + src/files/lang/pal-final/run_str_f.c | 3 + src/files/lang/pal-final/run_str_g.c | 3 + src/files/lang/pal-final/run_str_i.c | 3 + src/files/lang/pal-final/run_str_s.c | 3 + src/files/lang/pal-final/sevE.c | 20 + src/files/lang/pal-final/sevJ.c | 20 + src/files/lang/pal-final/sevP.c | 20 + src/files/lang/pal-final/sev_str_f.c | 20 + src/files/lang/pal-final/sev_str_g.c | 20 + src/files/lang/pal-final/sev_str_i.c | 20 + src/files/lang/pal-final/sev_str_s.c | 20 + src/files/lang/pal-final/sevbE.c | 12 + src/files/lang/pal-final/sevbJ.c | 12 + src/files/lang/pal-final/sevbP.c | 12 + src/files/lang/pal-final/sevb_str_f.c | 12 + src/files/lang/pal-final/sevb_str_g.c | 12 + src/files/lang/pal-final/sevb_str_i.c | 12 + src/files/lang/pal-final/sevb_str_s.c | 12 + src/files/lang/pal-final/sevxE.c | 3 + src/files/lang/pal-final/sevxJ.c | 3 + src/files/lang/pal-final/sevxP.c | 3 + src/files/lang/pal-final/sevx_str_f.c | 3 + src/files/lang/pal-final/sevx_str_g.c | 3 + src/files/lang/pal-final/sevx_str_i.c | 3 + src/files/lang/pal-final/sevx_str_s.c | 3 + src/files/lang/pal-final/sevxbE.c | 3 + src/files/lang/pal-final/sevxbJ.c | 3 + src/files/lang/pal-final/sevxbP.c | 3 + src/files/lang/pal-final/sevxb_str_f.c | 3 + src/files/lang/pal-final/sevxb_str_g.c | 3 + src/files/lang/pal-final/sevxb_str_i.c | 3 + src/files/lang/pal-final/sevxb_str_s.c | 3 + src/files/lang/pal-final/shoE.c | 60 +++ src/files/lang/pal-final/shoJ.c | 60 +++ src/files/lang/pal-final/shoP.c | 60 +++ src/files/lang/pal-final/sho_str_f.c | 60 +++ src/files/lang/pal-final/sho_str_g.c | 60 +++ src/files/lang/pal-final/sho_str_i.c | 60 +++ src/files/lang/pal-final/sho_str_s.c | 60 +++ src/files/lang/pal-final/siloE.c | 3 + src/files/lang/pal-final/siloJ.c | 3 + src/files/lang/pal-final/siloP.c | 3 + src/files/lang/pal-final/silo_str_f.c | 3 + src/files/lang/pal-final/silo_str_g.c | 3 + src/files/lang/pal-final/silo_str_i.c | 3 + src/files/lang/pal-final/silo_str_s.c | 3 + src/files/lang/pal-final/statE.c | 16 + src/files/lang/pal-final/statJ.c | 16 + src/files/lang/pal-final/statP.c | 16 + src/files/lang/pal-final/stat_str_f.c | 16 + src/files/lang/pal-final/stat_str_g.c | 16 + src/files/lang/pal-final/stat_str_i.c | 16 + src/files/lang/pal-final/stat_str_s.c | 16 + src/files/lang/pal-final/titleE.c | 188 +++++++ src/files/lang/pal-final/titleJ.c | 188 +++++++ src/files/lang/pal-final/titleP.c | 188 +++++++ src/files/lang/pal-final/title_str_f.c | 188 +++++++ src/files/lang/pal-final/title_str_g.c | 188 +++++++ src/files/lang/pal-final/title_str_i.c | 188 +++++++ src/files/lang/pal-final/title_str_s.c | 188 +++++++ src/files/lang/pal-final/traE.c | 92 ++++ src/files/lang/pal-final/traJ.c | 92 ++++ src/files/lang/pal-final/traP.c | 92 ++++ src/files/lang/pal-final/tra_str_f.c | 92 ++++ src/files/lang/pal-final/tra_str_g.c | 92 ++++ src/files/lang/pal-final/tra_str_i.c | 92 ++++ src/files/lang/pal-final/tra_str_s.c | 92 ++++ src/files/lang/pal-final/uffE.c | 3 + src/files/lang/pal-final/uffJ.c | 3 + src/files/lang/pal-final/uffP.c | 3 + src/files/lang/pal-final/uff_str_f.c | 3 + src/files/lang/pal-final/uff_str_g.c | 3 + src/files/lang/pal-final/uff_str_i.c | 3 + src/files/lang/pal-final/uff_str_s.c | 3 + src/files/lang/pal-final/waxE.c | 32 ++ src/files/lang/pal-final/waxJ.c | 32 ++ src/files/lang/pal-final/waxP.c | 32 ++ src/files/lang/pal-final/wax_str_f.c | 32 ++ src/files/lang/pal-final/wax_str_g.c | 32 ++ src/files/lang/pal-final/wax_str_i.c | 32 ++ src/files/lang/pal-final/wax_str_s.c | 32 ++ 2857 files changed, 136075 insertions(+), 2 deletions(-) rename src/files/lang/{ => jap-final}/ameE.c (100%) create mode 100644 src/files/lang/jap-final/ameJ.c create mode 100644 src/files/lang/jap-final/ameP.c create mode 100644 src/files/lang/jap-final/ame_str_f.c create mode 100644 src/files/lang/jap-final/ame_str_g.c create mode 100644 src/files/lang/jap-final/ame_str_i.c create mode 100644 src/files/lang/jap-final/ame_str_s.c rename src/files/lang/{ => jap-final}/archE.c (100%) rename src/files/lang/{ => jap-final}/archJ.c (100%) rename src/files/lang/{ => jap-final}/archP.c (100%) rename src/files/lang/{ => jap-final}/arch_str_f.c (100%) rename src/files/lang/{ => jap-final}/arch_str_g.c (100%) rename src/files/lang/{ => jap-final}/arch_str_i.c (100%) rename src/files/lang/{ => jap-final}/arch_str_s.c (100%) rename src/files/lang/{ => jap-final}/arecE.c (100%) rename src/files/lang/{ => jap-final}/arecJ.c (100%) rename src/files/lang/{ => jap-final}/arecP.c (100%) rename src/files/lang/{ => jap-final}/arec_str_f.c (100%) rename src/files/lang/{ => jap-final}/arec_str_g.c (100%) rename src/files/lang/{ => jap-final}/arec_str_i.c (100%) rename src/files/lang/{ => jap-final}/arec_str_s.c (100%) rename src/files/lang/{ => jap-final}/arkE.c (100%) create mode 100644 src/files/lang/jap-final/arkJ.c create mode 100644 src/files/lang/jap-final/arkP.c create mode 100644 src/files/lang/jap-final/ark_str_f.c create mode 100644 src/files/lang/jap-final/ark_str_g.c create mode 100644 src/files/lang/jap-final/ark_str_i.c create mode 100644 src/files/lang/jap-final/ark_str_s.c rename src/files/lang/{ => jap-final}/ashE.c (100%) rename src/files/lang/{ => jap-final}/ashJ.c (100%) rename src/files/lang/{ => jap-final}/ashP.c (100%) rename src/files/lang/{ => jap-final}/ash_str_f.c (100%) rename src/files/lang/{ => jap-final}/ash_str_g.c (100%) rename src/files/lang/{ => jap-final}/ash_str_i.c (100%) rename src/files/lang/{ => jap-final}/ash_str_s.c (100%) rename src/files/lang/{ => jap-final}/ateE.c (100%) create mode 100644 src/files/lang/jap-final/ateJ.c rename src/files/lang/{ => jap-final}/ateP.c (100%) create mode 100644 src/files/lang/jap-final/ate_str_f.c create mode 100644 src/files/lang/jap-final/ate_str_g.c create mode 100644 src/files/lang/jap-final/ate_str_i.c create mode 100644 src/files/lang/jap-final/ate_str_s.c rename src/files/lang/{ => jap-final}/aztE.c (100%) create mode 100644 src/files/lang/jap-final/aztJ.c create mode 100644 src/files/lang/jap-final/aztP.c create mode 100644 src/files/lang/jap-final/azt_str_f.c create mode 100644 src/files/lang/jap-final/azt_str_g.c create mode 100644 src/files/lang/jap-final/azt_str_i.c create mode 100644 src/files/lang/jap-final/azt_str_s.c rename src/files/lang/{ => jap-final}/catE.c (100%) rename src/files/lang/{ => jap-final}/catJ.c (100%) rename src/files/lang/{ => jap-final}/catP.c (100%) rename src/files/lang/{ => jap-final}/cat_str_f.c (100%) rename src/files/lang/{ => jap-final}/cat_str_g.c (100%) rename src/files/lang/{ => jap-final}/cat_str_i.c (100%) rename src/files/lang/{ => jap-final}/cat_str_s.c (100%) rename src/files/lang/{ => jap-final}/caveE.c (100%) create mode 100644 src/files/lang/jap-final/caveJ.c create mode 100644 src/files/lang/jap-final/caveP.c create mode 100644 src/files/lang/jap-final/cave_str_f.c create mode 100644 src/files/lang/jap-final/cave_str_g.c create mode 100644 src/files/lang/jap-final/cave_str_i.c create mode 100644 src/files/lang/jap-final/cave_str_s.c rename src/files/lang/{ => jap-final}/cradE.c (100%) rename src/files/lang/{ => jap-final}/cradJ.c (100%) rename src/files/lang/{ => jap-final}/cradP.c (100%) rename src/files/lang/{ => jap-final}/crad_str_f.c (100%) rename src/files/lang/{ => jap-final}/crad_str_g.c (100%) rename src/files/lang/{ => jap-final}/crad_str_i.c (100%) rename src/files/lang/{ => jap-final}/crad_str_s.c (100%) rename src/files/lang/{ => jap-final}/crypE.c (100%) rename src/files/lang/{ => jap-final}/crypJ.c (100%) rename src/files/lang/{ => jap-final}/crypP.c (100%) rename src/files/lang/{ => jap-final}/cryp_str_f.c (100%) rename src/files/lang/{ => jap-final}/cryp_str_g.c (100%) rename src/files/lang/{ => jap-final}/cryp_str_i.c (100%) rename src/files/lang/{ => jap-final}/cryp_str_s.c (100%) rename src/files/lang/{ => jap-final}/damE.c (100%) create mode 100644 src/files/lang/jap-final/damJ.c create mode 100644 src/files/lang/jap-final/damP.c create mode 100644 src/files/lang/jap-final/dam_str_f.c create mode 100644 src/files/lang/jap-final/dam_str_g.c create mode 100644 src/files/lang/jap-final/dam_str_i.c create mode 100644 src/files/lang/jap-final/dam_str_s.c rename src/files/lang/{ => jap-final}/depoE.c (100%) create mode 100644 src/files/lang/jap-final/depoJ.c create mode 100644 src/files/lang/jap-final/depoP.c create mode 100644 src/files/lang/jap-final/depo_str_f.c create mode 100644 src/files/lang/jap-final/depo_str_g.c create mode 100644 src/files/lang/jap-final/depo_str_i.c create mode 100644 src/files/lang/jap-final/depo_str_s.c rename src/files/lang/{ => jap-final}/destE.c (100%) rename src/files/lang/{ => jap-final}/destJ.c (100%) rename src/files/lang/{ => jap-final}/destP.c (100%) rename src/files/lang/{ => jap-final}/dest_str_f.c (100%) rename src/files/lang/{ => jap-final}/dest_str_g.c (100%) rename src/files/lang/{ => jap-final}/dest_str_i.c (100%) rename src/files/lang/{ => jap-final}/dest_str_s.c (100%) create mode 100644 src/files/lang/jap-final/dishE.c create mode 100644 src/files/lang/jap-final/dishJ.c create mode 100644 src/files/lang/jap-final/dishP.c create mode 100644 src/files/lang/jap-final/dish_str_f.c create mode 100644 src/files/lang/jap-final/dish_str_g.c create mode 100644 src/files/lang/jap-final/dish_str_i.c create mode 100644 src/files/lang/jap-final/dish_str_s.c rename src/files/lang/{ => jap-final}/earE.c (100%) create mode 100644 src/files/lang/jap-final/earJ.c create mode 100644 src/files/lang/jap-final/earP.c create mode 100644 src/files/lang/jap-final/ear_str_f.c create mode 100644 src/files/lang/jap-final/ear_str_g.c create mode 100644 src/files/lang/jap-final/ear_str_i.c create mode 100644 src/files/lang/jap-final/ear_str_s.c create mode 100644 src/files/lang/jap-final/eldE.c create mode 100644 src/files/lang/jap-final/eldJ.c create mode 100644 src/files/lang/jap-final/eldP.c create mode 100644 src/files/lang/jap-final/eld_str_f.c create mode 100644 src/files/lang/jap-final/eld_str_g.c create mode 100644 src/files/lang/jap-final/eld_str_i.c create mode 100644 src/files/lang/jap-final/eld_str_s.c create mode 100644 src/files/lang/jap-final/gunE.c create mode 100644 src/files/lang/jap-final/gunJ.c create mode 100644 src/files/lang/jap-final/gunP.c create mode 100644 src/files/lang/jap-final/gun_str_f.c create mode 100644 src/files/lang/jap-final/gun_str_g.c create mode 100644 src/files/lang/jap-final/gun_str_i.c create mode 100644 src/files/lang/jap-final/gun_str_s.c rename src/files/lang/{ => jap-final}/impE.c (100%) create mode 100644 src/files/lang/jap-final/impJ.c create mode 100644 src/files/lang/jap-final/impP.c create mode 100644 src/files/lang/jap-final/imp_str_f.c create mode 100644 src/files/lang/jap-final/imp_str_g.c create mode 100644 src/files/lang/jap-final/imp_str_i.c create mode 100644 src/files/lang/jap-final/imp_str_s.c rename src/files/lang/{ => jap-final}/junE.c (100%) rename src/files/lang/{ => jap-final}/junJ.c (100%) rename src/files/lang/{ => jap-final}/junP.c (100%) rename src/files/lang/{ => jap-final}/jun_str_f.c (100%) rename src/files/lang/{ => jap-final}/jun_str_g.c (100%) rename src/files/lang/{ => jap-final}/jun_str_i.c (100%) rename src/files/lang/{ => jap-final}/jun_str_s.c (100%) rename src/files/lang/{ => jap-final}/lamE.c (100%) rename src/files/lang/{ => jap-final}/lamJ.c (100%) rename src/files/lang/{ => jap-final}/lamP.c (100%) rename src/files/lang/{ => jap-final}/lam_str_f.c (100%) rename src/files/lang/{ => jap-final}/lam_str_g.c (100%) rename src/files/lang/{ => jap-final}/lam_str_i.c (100%) rename src/files/lang/{ => jap-final}/lam_str_s.c (100%) rename src/files/lang/{ => jap-final}/leeE.c (100%) create mode 100644 src/files/lang/jap-final/leeJ.c create mode 100644 src/files/lang/jap-final/leeP.c create mode 100644 src/files/lang/jap-final/lee_str_f.c create mode 100644 src/files/lang/jap-final/lee_str_g.c create mode 100644 src/files/lang/jap-final/lee_str_i.c create mode 100644 src/files/lang/jap-final/lee_str_s.c rename src/files/lang/{ => jap-final}/lenE.c (100%) rename src/files/lang/{ => jap-final}/lenJ.c (100%) rename src/files/lang/{ => jap-final}/lenP.c (100%) rename src/files/lang/{ => jap-final}/len_str_f.c (100%) rename src/files/lang/{ => jap-final}/len_str_g.c (100%) rename src/files/lang/{ => jap-final}/len_str_i.c (100%) rename src/files/lang/{ => jap-final}/len_str_s.c (100%) rename src/files/lang/{ => jap-final}/lipE.c (100%) create mode 100644 src/files/lang/jap-final/lipJ.c create mode 100644 src/files/lang/jap-final/lipP.c create mode 100644 src/files/lang/jap-final/lip_str_f.c create mode 100644 src/files/lang/jap-final/lip_str_g.c create mode 100644 src/files/lang/jap-final/lip_str_i.c create mode 100644 src/files/lang/jap-final/lip_str_s.c rename src/files/lang/{ => jap-final}/lueE.c (100%) create mode 100644 src/files/lang/jap-final/lueJ.c create mode 100644 src/files/lang/jap-final/lueP.c create mode 100644 src/files/lang/jap-final/lue_str_f.c create mode 100644 src/files/lang/jap-final/lue_str_g.c create mode 100644 src/files/lang/jap-final/lue_str_i.c create mode 100644 src/files/lang/jap-final/lue_str_s.c create mode 100644 src/files/lang/jap-final/miscE.c create mode 100644 src/files/lang/jap-final/miscJ.c create mode 100644 src/files/lang/jap-final/miscP.c create mode 100644 src/files/lang/jap-final/misc_str_f.c create mode 100644 src/files/lang/jap-final/misc_str_g.c create mode 100644 src/files/lang/jap-final/misc_str_i.c create mode 100644 src/files/lang/jap-final/misc_str_s.c rename src/files/lang/{ => jap-final}/mp10E.c (100%) rename src/files/lang/{ => jap-final}/mp10J.c (100%) rename src/files/lang/{ => jap-final}/mp10P.c (100%) rename src/files/lang/{ => jap-final}/mp10_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp10_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp10_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp10_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp11E.c (100%) rename src/files/lang/{ => jap-final}/mp11J.c (100%) rename src/files/lang/{ => jap-final}/mp11P.c (100%) rename src/files/lang/{ => jap-final}/mp11_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp11_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp11_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp11_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp12E.c (100%) rename src/files/lang/{ => jap-final}/mp12J.c (100%) rename src/files/lang/{ => jap-final}/mp12P.c (100%) rename src/files/lang/{ => jap-final}/mp12_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp12_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp12_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp12_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp13E.c (100%) rename src/files/lang/{ => jap-final}/mp13J.c (100%) rename src/files/lang/{ => jap-final}/mp13P.c (100%) rename src/files/lang/{ => jap-final}/mp13_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp13_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp13_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp13_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp14E.c (100%) rename src/files/lang/{ => jap-final}/mp14J.c (100%) rename src/files/lang/{ => jap-final}/mp14P.c (100%) rename src/files/lang/{ => jap-final}/mp14_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp14_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp14_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp14_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp15E.c (100%) rename src/files/lang/{ => jap-final}/mp15J.c (100%) rename src/files/lang/{ => jap-final}/mp15P.c (100%) rename src/files/lang/{ => jap-final}/mp15_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp15_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp15_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp15_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp16E.c (100%) rename src/files/lang/{ => jap-final}/mp16J.c (100%) rename src/files/lang/{ => jap-final}/mp16P.c (100%) rename src/files/lang/{ => jap-final}/mp16_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp16_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp16_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp16_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp17E.c (100%) rename src/files/lang/{ => jap-final}/mp17J.c (100%) rename src/files/lang/{ => jap-final}/mp17P.c (100%) rename src/files/lang/{ => jap-final}/mp17_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp17_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp17_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp17_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp18E.c (100%) rename src/files/lang/{ => jap-final}/mp18J.c (100%) rename src/files/lang/{ => jap-final}/mp18P.c (100%) rename src/files/lang/{ => jap-final}/mp18_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp18_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp18_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp18_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp19E.c (100%) rename src/files/lang/{ => jap-final}/mp19J.c (100%) rename src/files/lang/{ => jap-final}/mp19P.c (100%) rename src/files/lang/{ => jap-final}/mp19_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp19_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp19_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp19_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp1E.c (100%) rename src/files/lang/{ => jap-final}/mp1J.c (100%) rename src/files/lang/{ => jap-final}/mp1P.c (100%) rename src/files/lang/{ => jap-final}/mp1_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp1_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp1_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp1_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp20E.c (100%) rename src/files/lang/{ => jap-final}/mp20J.c (100%) rename src/files/lang/{ => jap-final}/mp20P.c (100%) rename src/files/lang/{ => jap-final}/mp20_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp20_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp20_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp20_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp2E.c (100%) rename src/files/lang/{ => jap-final}/mp2J.c (100%) rename src/files/lang/{ => jap-final}/mp2P.c (100%) rename src/files/lang/{ => jap-final}/mp2_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp2_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp2_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp2_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp3E.c (100%) rename src/files/lang/{ => jap-final}/mp3J.c (100%) rename src/files/lang/{ => jap-final}/mp3P.c (100%) rename src/files/lang/{ => jap-final}/mp3_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp3_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp3_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp3_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp4E.c (100%) rename src/files/lang/{ => jap-final}/mp4J.c (100%) rename src/files/lang/{ => jap-final}/mp4P.c (100%) rename src/files/lang/{ => jap-final}/mp4_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp4_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp4_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp4_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp5E.c (100%) rename src/files/lang/{ => jap-final}/mp5J.c (100%) rename src/files/lang/{ => jap-final}/mp5P.c (100%) rename src/files/lang/{ => jap-final}/mp5_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp5_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp5_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp5_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp6E.c (100%) rename src/files/lang/{ => jap-final}/mp6J.c (100%) rename src/files/lang/{ => jap-final}/mp6P.c (100%) rename src/files/lang/{ => jap-final}/mp6_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp6_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp6_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp6_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp7E.c (100%) rename src/files/lang/{ => jap-final}/mp7J.c (100%) rename src/files/lang/{ => jap-final}/mp7P.c (100%) rename src/files/lang/{ => jap-final}/mp7_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp7_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp7_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp7_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp8E.c (100%) rename src/files/lang/{ => jap-final}/mp8J.c (100%) rename src/files/lang/{ => jap-final}/mp8P.c (100%) rename src/files/lang/{ => jap-final}/mp8_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp8_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp8_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp8_str_s.c (100%) rename src/files/lang/{ => jap-final}/mp9E.c (100%) rename src/files/lang/{ => jap-final}/mp9J.c (100%) rename src/files/lang/{ => jap-final}/mp9P.c (100%) rename src/files/lang/{ => jap-final}/mp9_str_f.c (100%) rename src/files/lang/{ => jap-final}/mp9_str_g.c (100%) rename src/files/lang/{ => jap-final}/mp9_str_i.c (100%) rename src/files/lang/{ => jap-final}/mp9_str_s.c (100%) rename src/files/lang/{ => jap-final}/mpmenuE.c (100%) create mode 100644 src/files/lang/jap-final/mpmenuJ.c create mode 100644 src/files/lang/jap-final/mpmenuP.c create mode 100644 src/files/lang/jap-final/mpmenu_str_f.c create mode 100644 src/files/lang/jap-final/mpmenu_str_g.c create mode 100644 src/files/lang/jap-final/mpmenu_str_i.c create mode 100644 src/files/lang/jap-final/mpmenu_str_s.c create mode 100644 src/files/lang/jap-final/mpweaponsE.c create mode 100644 src/files/lang/jap-final/mpweaponsJ.c create mode 100644 src/files/lang/jap-final/mpweaponsP.c create mode 100644 src/files/lang/jap-final/mpweapons_str_f.c create mode 100644 src/files/lang/jap-final/mpweapons_str_g.c create mode 100644 src/files/lang/jap-final/mpweapons_str_i.c create mode 100644 src/files/lang/jap-final/mpweapons_str_s.c rename src/files/lang/{ => jap-final}/oatE.c (100%) rename src/files/lang/{ => jap-final}/oatJ.c (100%) rename src/files/lang/{ => jap-final}/oatP.c (100%) rename src/files/lang/{ => jap-final}/oat_str_f.c (100%) rename src/files/lang/{ => jap-final}/oat_str_g.c (100%) rename src/files/lang/{ => jap-final}/oat_str_i.c (100%) rename src/files/lang/{ => jap-final}/oat_str_s.c (100%) rename src/files/lang/{ => jap-final}/oldE.c (100%) rename src/files/lang/{ => jap-final}/oldJ.c (100%) rename src/files/lang/{ => jap-final}/oldP.c (100%) rename src/files/lang/{ => jap-final}/old_str_f.c (100%) rename src/files/lang/{ => jap-final}/old_str_g.c (100%) rename src/files/lang/{ => jap-final}/old_str_i.c (100%) rename src/files/lang/{ => jap-final}/old_str_s.c (100%) create mode 100644 src/files/lang/jap-final/optionsE.c create mode 100644 src/files/lang/jap-final/optionsJ.c create mode 100644 src/files/lang/jap-final/optionsP.c create mode 100644 src/files/lang/jap-final/options_str_f.c create mode 100644 src/files/lang/jap-final/options_str_g.c create mode 100644 src/files/lang/jap-final/options_str_i.c create mode 100644 src/files/lang/jap-final/options_str_s.c rename src/files/lang/{ => jap-final}/pamE.c (100%) create mode 100644 src/files/lang/jap-final/pamJ.c create mode 100644 src/files/lang/jap-final/pamP.c create mode 100644 src/files/lang/jap-final/pam_str_f.c create mode 100644 src/files/lang/jap-final/pam_str_g.c create mode 100644 src/files/lang/jap-final/pam_str_i.c create mode 100644 src/files/lang/jap-final/pam_str_s.c rename src/files/lang/{ => jap-final}/peteE.c (100%) create mode 100644 src/files/lang/jap-final/peteJ.c create mode 100644 src/files/lang/jap-final/peteP.c create mode 100644 src/files/lang/jap-final/pete_str_f.c create mode 100644 src/files/lang/jap-final/pete_str_g.c create mode 100644 src/files/lang/jap-final/pete_str_i.c create mode 100644 src/files/lang/jap-final/pete_str_s.c create mode 100644 src/files/lang/jap-final/propobjE.c create mode 100644 src/files/lang/jap-final/propobjJ.c create mode 100644 src/files/lang/jap-final/propobjP.c create mode 100644 src/files/lang/jap-final/propobj_str_f.c create mode 100644 src/files/lang/jap-final/propobj_str_g.c create mode 100644 src/files/lang/jap-final/propobj_str_i.c create mode 100644 src/files/lang/jap-final/propobj_str_s.c rename src/files/lang/{ => jap-final}/refE.c (100%) rename src/files/lang/{ => jap-final}/refJ.c (100%) rename src/files/lang/{ => jap-final}/refP.c (100%) rename src/files/lang/{ => jap-final}/ref_str_f.c (100%) rename src/files/lang/{ => jap-final}/ref_str_g.c (100%) rename src/files/lang/{ => jap-final}/ref_str_i.c (100%) rename src/files/lang/{ => jap-final}/ref_str_s.c (100%) rename src/files/lang/{ => jap-final}/ritE.c (100%) create mode 100644 src/files/lang/jap-final/ritJ.c create mode 100644 src/files/lang/jap-final/ritP.c create mode 100644 src/files/lang/jap-final/rit_str_f.c create mode 100644 src/files/lang/jap-final/rit_str_g.c create mode 100644 src/files/lang/jap-final/rit_str_i.c create mode 100644 src/files/lang/jap-final/rit_str_s.c rename src/files/lang/{ => jap-final}/runE.c (100%) rename src/files/lang/{ => jap-final}/runJ.c (100%) rename src/files/lang/{ => jap-final}/runP.c (100%) rename src/files/lang/{ => jap-final}/run_str_f.c (100%) rename src/files/lang/{ => jap-final}/run_str_g.c (100%) rename src/files/lang/{ => jap-final}/run_str_i.c (100%) rename src/files/lang/{ => jap-final}/run_str_s.c (100%) rename src/files/lang/{ => jap-final}/sevE.c (100%) create mode 100644 src/files/lang/jap-final/sevJ.c create mode 100644 src/files/lang/jap-final/sevP.c create mode 100644 src/files/lang/jap-final/sev_str_f.c create mode 100644 src/files/lang/jap-final/sev_str_g.c create mode 100644 src/files/lang/jap-final/sev_str_i.c create mode 100644 src/files/lang/jap-final/sev_str_s.c rename src/files/lang/{ => jap-final}/sevbE.c (100%) rename src/files/lang/{ => jap-final}/sevbJ.c (100%) rename src/files/lang/{ => jap-final}/sevbP.c (100%) rename src/files/lang/{ => jap-final}/sevb_str_f.c (100%) rename src/files/lang/{ => jap-final}/sevb_str_g.c (100%) rename src/files/lang/{ => jap-final}/sevb_str_i.c (100%) rename src/files/lang/{ => jap-final}/sevb_str_s.c (100%) rename src/files/lang/{ => jap-final}/sevxE.c (100%) rename src/files/lang/{ => jap-final}/sevxJ.c (100%) rename src/files/lang/{ => jap-final}/sevxP.c (100%) rename src/files/lang/{ => jap-final}/sevx_str_f.c (100%) rename src/files/lang/{ => jap-final}/sevx_str_g.c (100%) rename src/files/lang/{ => jap-final}/sevx_str_i.c (100%) rename src/files/lang/{ => jap-final}/sevx_str_s.c (100%) rename src/files/lang/{ => jap-final}/sevxbE.c (100%) rename src/files/lang/{ => jap-final}/sevxbJ.c (100%) rename src/files/lang/{ => jap-final}/sevxbP.c (100%) rename src/files/lang/{ => jap-final}/sevxb_str_f.c (100%) rename src/files/lang/{ => jap-final}/sevxb_str_g.c (100%) rename src/files/lang/{ => jap-final}/sevxb_str_i.c (100%) rename src/files/lang/{ => jap-final}/sevxb_str_s.c (100%) rename src/files/lang/{ => jap-final}/shoE.c (100%) create mode 100644 src/files/lang/jap-final/shoJ.c create mode 100644 src/files/lang/jap-final/shoP.c create mode 100644 src/files/lang/jap-final/sho_str_f.c create mode 100644 src/files/lang/jap-final/sho_str_g.c create mode 100644 src/files/lang/jap-final/sho_str_i.c create mode 100644 src/files/lang/jap-final/sho_str_s.c rename src/files/lang/{ => jap-final}/siloE.c (100%) rename src/files/lang/{ => jap-final}/siloJ.c (100%) rename src/files/lang/{ => jap-final}/siloP.c (100%) rename src/files/lang/{ => jap-final}/silo_str_f.c (100%) rename src/files/lang/{ => jap-final}/silo_str_g.c (100%) rename src/files/lang/{ => jap-final}/silo_str_i.c (100%) rename src/files/lang/{ => jap-final}/silo_str_s.c (100%) rename src/files/lang/{ => jap-final}/statE.c (100%) create mode 100644 src/files/lang/jap-final/statJ.c rename src/files/lang/{ => jap-final}/statP.c (100%) create mode 100644 src/files/lang/jap-final/stat_str_f.c create mode 100644 src/files/lang/jap-final/stat_str_g.c create mode 100644 src/files/lang/jap-final/stat_str_i.c create mode 100644 src/files/lang/jap-final/stat_str_s.c create mode 100644 src/files/lang/jap-final/titleE.c create mode 100644 src/files/lang/jap-final/titleJ.c create mode 100644 src/files/lang/jap-final/titleP.c create mode 100644 src/files/lang/jap-final/title_str_f.c create mode 100644 src/files/lang/jap-final/title_str_g.c create mode 100644 src/files/lang/jap-final/title_str_i.c create mode 100644 src/files/lang/jap-final/title_str_s.c rename src/files/lang/{ => jap-final}/traE.c (100%) create mode 100644 src/files/lang/jap-final/traJ.c create mode 100644 src/files/lang/jap-final/traP.c create mode 100644 src/files/lang/jap-final/tra_str_f.c create mode 100644 src/files/lang/jap-final/tra_str_g.c create mode 100644 src/files/lang/jap-final/tra_str_i.c create mode 100644 src/files/lang/jap-final/tra_str_s.c rename src/files/lang/{ => jap-final}/uffE.c (100%) rename src/files/lang/{ => jap-final}/uffJ.c (100%) rename src/files/lang/{ => jap-final}/uffP.c (100%) rename src/files/lang/{ => jap-final}/uff_str_f.c (100%) rename src/files/lang/{ => jap-final}/uff_str_g.c (100%) rename src/files/lang/{ => jap-final}/uff_str_i.c (100%) rename src/files/lang/{ => jap-final}/uff_str_s.c (100%) rename src/files/lang/{ => jap-final}/waxE.c (100%) create mode 100644 src/files/lang/jap-final/waxJ.c create mode 100644 src/files/lang/jap-final/waxP.c create mode 100644 src/files/lang/jap-final/wax_str_f.c create mode 100644 src/files/lang/jap-final/wax_str_g.c create mode 100644 src/files/lang/jap-final/wax_str_i.c create mode 100644 src/files/lang/jap-final/wax_str_s.c create mode 100644 src/files/lang/ntsc-1.0/ameE.c rename src/files/lang/{ => ntsc-1.0}/ameJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/ameP.c (100%) rename src/files/lang/{ => ntsc-1.0}/ame_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/ame_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/ame_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/ame_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/archE.c create mode 100644 src/files/lang/ntsc-1.0/archJ.c create mode 100644 src/files/lang/ntsc-1.0/archP.c create mode 100644 src/files/lang/ntsc-1.0/arch_str_f.c create mode 100644 src/files/lang/ntsc-1.0/arch_str_g.c create mode 100644 src/files/lang/ntsc-1.0/arch_str_i.c create mode 100644 src/files/lang/ntsc-1.0/arch_str_s.c create mode 100644 src/files/lang/ntsc-1.0/arecE.c create mode 100644 src/files/lang/ntsc-1.0/arecJ.c create mode 100644 src/files/lang/ntsc-1.0/arecP.c create mode 100644 src/files/lang/ntsc-1.0/arec_str_f.c create mode 100644 src/files/lang/ntsc-1.0/arec_str_g.c create mode 100644 src/files/lang/ntsc-1.0/arec_str_i.c create mode 100644 src/files/lang/ntsc-1.0/arec_str_s.c create mode 100644 src/files/lang/ntsc-1.0/arkE.c rename src/files/lang/{ => ntsc-1.0}/arkJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/arkP.c (100%) rename src/files/lang/{ => ntsc-1.0}/ark_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/ark_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/ark_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/ark_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/ashE.c create mode 100644 src/files/lang/ntsc-1.0/ashJ.c create mode 100644 src/files/lang/ntsc-1.0/ashP.c create mode 100644 src/files/lang/ntsc-1.0/ash_str_f.c create mode 100644 src/files/lang/ntsc-1.0/ash_str_g.c create mode 100644 src/files/lang/ntsc-1.0/ash_str_i.c create mode 100644 src/files/lang/ntsc-1.0/ash_str_s.c rename src/files/lang/{ate_str_f.c => ntsc-1.0/ateE.c} (100%) rename src/files/lang/{ => ntsc-1.0}/ateJ.c (100%) rename src/files/lang/{ate_str_g.c => ntsc-1.0/ateP.c} (100%) rename src/files/lang/{ate_str_i.c => ntsc-1.0/ate_str_f.c} (100%) rename src/files/lang/{ate_str_s.c => ntsc-1.0/ate_str_g.c} (100%) create mode 100644 src/files/lang/ntsc-1.0/ate_str_i.c create mode 100644 src/files/lang/ntsc-1.0/ate_str_s.c create mode 100644 src/files/lang/ntsc-1.0/aztE.c rename src/files/lang/{ => ntsc-1.0}/aztJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/aztP.c (100%) rename src/files/lang/{ => ntsc-1.0}/azt_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/azt_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/azt_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/azt_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/catE.c create mode 100644 src/files/lang/ntsc-1.0/catJ.c create mode 100644 src/files/lang/ntsc-1.0/catP.c create mode 100644 src/files/lang/ntsc-1.0/cat_str_f.c create mode 100644 src/files/lang/ntsc-1.0/cat_str_g.c create mode 100644 src/files/lang/ntsc-1.0/cat_str_i.c create mode 100644 src/files/lang/ntsc-1.0/cat_str_s.c create mode 100644 src/files/lang/ntsc-1.0/caveE.c rename src/files/lang/{ => ntsc-1.0}/caveJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/caveP.c (100%) rename src/files/lang/{ => ntsc-1.0}/cave_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/cave_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/cave_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/cave_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/cradE.c create mode 100644 src/files/lang/ntsc-1.0/cradJ.c create mode 100644 src/files/lang/ntsc-1.0/cradP.c create mode 100644 src/files/lang/ntsc-1.0/crad_str_f.c create mode 100644 src/files/lang/ntsc-1.0/crad_str_g.c create mode 100644 src/files/lang/ntsc-1.0/crad_str_i.c create mode 100644 src/files/lang/ntsc-1.0/crad_str_s.c create mode 100644 src/files/lang/ntsc-1.0/crypE.c create mode 100644 src/files/lang/ntsc-1.0/crypJ.c create mode 100644 src/files/lang/ntsc-1.0/crypP.c create mode 100644 src/files/lang/ntsc-1.0/cryp_str_f.c create mode 100644 src/files/lang/ntsc-1.0/cryp_str_g.c create mode 100644 src/files/lang/ntsc-1.0/cryp_str_i.c create mode 100644 src/files/lang/ntsc-1.0/cryp_str_s.c create mode 100644 src/files/lang/ntsc-1.0/damE.c rename src/files/lang/{ => ntsc-1.0}/damJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/damP.c (100%) rename src/files/lang/{ => ntsc-1.0}/dam_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/dam_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/dam_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/dam_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/depoE.c rename src/files/lang/{ => ntsc-1.0}/depoJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/depoP.c (100%) rename src/files/lang/{ => ntsc-1.0}/depo_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/depo_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/depo_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/depo_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/destE.c create mode 100644 src/files/lang/ntsc-1.0/destJ.c create mode 100644 src/files/lang/ntsc-1.0/destP.c create mode 100644 src/files/lang/ntsc-1.0/dest_str_f.c create mode 100644 src/files/lang/ntsc-1.0/dest_str_g.c create mode 100644 src/files/lang/ntsc-1.0/dest_str_i.c create mode 100644 src/files/lang/ntsc-1.0/dest_str_s.c rename src/files/lang/{ => ntsc-1.0}/dishE.c (100%) rename src/files/lang/{ => ntsc-1.0}/dishJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/dishP.c (100%) rename src/files/lang/{ => ntsc-1.0}/dish_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/dish_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/dish_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/dish_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/earE.c rename src/files/lang/{ => ntsc-1.0}/earJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/earP.c (100%) rename src/files/lang/{ => ntsc-1.0}/ear_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/ear_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/ear_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/ear_str_s.c (100%) rename src/files/lang/{ => ntsc-1.0}/eldE.c (100%) rename src/files/lang/{ => ntsc-1.0}/eldJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/eldP.c (100%) rename src/files/lang/{ => ntsc-1.0}/eld_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/eld_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/eld_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/eld_str_s.c (100%) rename src/files/lang/{ => ntsc-1.0}/gunE.c (100%) rename src/files/lang/{ => ntsc-1.0}/gunJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/gunP.c (100%) rename src/files/lang/{ => ntsc-1.0}/gun_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/gun_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/gun_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/gun_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/impE.c rename src/files/lang/{ => ntsc-1.0}/impJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/impP.c (100%) rename src/files/lang/{ => ntsc-1.0}/imp_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/imp_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/imp_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/imp_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/junE.c create mode 100644 src/files/lang/ntsc-1.0/junJ.c create mode 100644 src/files/lang/ntsc-1.0/junP.c create mode 100644 src/files/lang/ntsc-1.0/jun_str_f.c create mode 100644 src/files/lang/ntsc-1.0/jun_str_g.c create mode 100644 src/files/lang/ntsc-1.0/jun_str_i.c create mode 100644 src/files/lang/ntsc-1.0/jun_str_s.c create mode 100644 src/files/lang/ntsc-1.0/lamE.c create mode 100644 src/files/lang/ntsc-1.0/lamJ.c create mode 100644 src/files/lang/ntsc-1.0/lamP.c create mode 100644 src/files/lang/ntsc-1.0/lam_str_f.c create mode 100644 src/files/lang/ntsc-1.0/lam_str_g.c create mode 100644 src/files/lang/ntsc-1.0/lam_str_i.c create mode 100644 src/files/lang/ntsc-1.0/lam_str_s.c create mode 100644 src/files/lang/ntsc-1.0/leeE.c rename src/files/lang/{ => ntsc-1.0}/leeJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/leeP.c (100%) rename src/files/lang/{ => ntsc-1.0}/lee_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/lee_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/lee_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/lee_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/lenE.c create mode 100644 src/files/lang/ntsc-1.0/lenJ.c create mode 100644 src/files/lang/ntsc-1.0/lenP.c create mode 100644 src/files/lang/ntsc-1.0/len_str_f.c create mode 100644 src/files/lang/ntsc-1.0/len_str_g.c create mode 100644 src/files/lang/ntsc-1.0/len_str_i.c create mode 100644 src/files/lang/ntsc-1.0/len_str_s.c create mode 100644 src/files/lang/ntsc-1.0/lipE.c rename src/files/lang/{ => ntsc-1.0}/lipJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/lipP.c (100%) rename src/files/lang/{ => ntsc-1.0}/lip_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/lip_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/lip_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/lip_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/lueE.c rename src/files/lang/{ => ntsc-1.0}/lueJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/lueP.c (100%) rename src/files/lang/{ => ntsc-1.0}/lue_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/lue_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/lue_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/lue_str_s.c (100%) rename src/files/lang/{ => ntsc-1.0}/miscE.c (100%) rename src/files/lang/{ => ntsc-1.0}/miscJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/miscP.c (100%) rename src/files/lang/{ => ntsc-1.0}/misc_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/misc_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/misc_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/misc_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/mp10E.c create mode 100644 src/files/lang/ntsc-1.0/mp10J.c create mode 100644 src/files/lang/ntsc-1.0/mp10P.c create mode 100644 src/files/lang/ntsc-1.0/mp10_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp10_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp10_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp10_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp11E.c create mode 100644 src/files/lang/ntsc-1.0/mp11J.c create mode 100644 src/files/lang/ntsc-1.0/mp11P.c create mode 100644 src/files/lang/ntsc-1.0/mp11_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp11_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp11_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp11_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp12E.c create mode 100644 src/files/lang/ntsc-1.0/mp12J.c create mode 100644 src/files/lang/ntsc-1.0/mp12P.c create mode 100644 src/files/lang/ntsc-1.0/mp12_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp12_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp12_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp12_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp13E.c create mode 100644 src/files/lang/ntsc-1.0/mp13J.c create mode 100644 src/files/lang/ntsc-1.0/mp13P.c create mode 100644 src/files/lang/ntsc-1.0/mp13_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp13_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp13_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp13_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp14E.c create mode 100644 src/files/lang/ntsc-1.0/mp14J.c create mode 100644 src/files/lang/ntsc-1.0/mp14P.c create mode 100644 src/files/lang/ntsc-1.0/mp14_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp14_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp14_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp14_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp15E.c create mode 100644 src/files/lang/ntsc-1.0/mp15J.c create mode 100644 src/files/lang/ntsc-1.0/mp15P.c create mode 100644 src/files/lang/ntsc-1.0/mp15_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp15_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp15_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp15_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp16E.c create mode 100644 src/files/lang/ntsc-1.0/mp16J.c create mode 100644 src/files/lang/ntsc-1.0/mp16P.c create mode 100644 src/files/lang/ntsc-1.0/mp16_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp16_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp16_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp16_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp17E.c create mode 100644 src/files/lang/ntsc-1.0/mp17J.c create mode 100644 src/files/lang/ntsc-1.0/mp17P.c create mode 100644 src/files/lang/ntsc-1.0/mp17_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp17_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp17_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp17_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp18E.c create mode 100644 src/files/lang/ntsc-1.0/mp18J.c create mode 100644 src/files/lang/ntsc-1.0/mp18P.c create mode 100644 src/files/lang/ntsc-1.0/mp18_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp18_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp18_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp18_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp19E.c create mode 100644 src/files/lang/ntsc-1.0/mp19J.c create mode 100644 src/files/lang/ntsc-1.0/mp19P.c create mode 100644 src/files/lang/ntsc-1.0/mp19_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp19_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp19_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp19_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp1E.c create mode 100644 src/files/lang/ntsc-1.0/mp1J.c create mode 100644 src/files/lang/ntsc-1.0/mp1P.c create mode 100644 src/files/lang/ntsc-1.0/mp1_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp1_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp1_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp1_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp20E.c create mode 100644 src/files/lang/ntsc-1.0/mp20J.c create mode 100644 src/files/lang/ntsc-1.0/mp20P.c create mode 100644 src/files/lang/ntsc-1.0/mp20_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp20_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp20_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp20_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp2E.c create mode 100644 src/files/lang/ntsc-1.0/mp2J.c create mode 100644 src/files/lang/ntsc-1.0/mp2P.c create mode 100644 src/files/lang/ntsc-1.0/mp2_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp2_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp2_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp2_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp3E.c create mode 100644 src/files/lang/ntsc-1.0/mp3J.c create mode 100644 src/files/lang/ntsc-1.0/mp3P.c create mode 100644 src/files/lang/ntsc-1.0/mp3_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp3_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp3_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp3_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp4E.c create mode 100644 src/files/lang/ntsc-1.0/mp4J.c create mode 100644 src/files/lang/ntsc-1.0/mp4P.c create mode 100644 src/files/lang/ntsc-1.0/mp4_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp4_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp4_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp4_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp5E.c create mode 100644 src/files/lang/ntsc-1.0/mp5J.c create mode 100644 src/files/lang/ntsc-1.0/mp5P.c create mode 100644 src/files/lang/ntsc-1.0/mp5_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp5_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp5_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp5_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp6E.c create mode 100644 src/files/lang/ntsc-1.0/mp6J.c create mode 100644 src/files/lang/ntsc-1.0/mp6P.c create mode 100644 src/files/lang/ntsc-1.0/mp6_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp6_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp6_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp6_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp7E.c create mode 100644 src/files/lang/ntsc-1.0/mp7J.c create mode 100644 src/files/lang/ntsc-1.0/mp7P.c create mode 100644 src/files/lang/ntsc-1.0/mp7_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp7_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp7_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp7_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp8E.c create mode 100644 src/files/lang/ntsc-1.0/mp8J.c create mode 100644 src/files/lang/ntsc-1.0/mp8P.c create mode 100644 src/files/lang/ntsc-1.0/mp8_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp8_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp8_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp8_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mp9E.c create mode 100644 src/files/lang/ntsc-1.0/mp9J.c create mode 100644 src/files/lang/ntsc-1.0/mp9P.c create mode 100644 src/files/lang/ntsc-1.0/mp9_str_f.c create mode 100644 src/files/lang/ntsc-1.0/mp9_str_g.c create mode 100644 src/files/lang/ntsc-1.0/mp9_str_i.c create mode 100644 src/files/lang/ntsc-1.0/mp9_str_s.c create mode 100644 src/files/lang/ntsc-1.0/mpmenuE.c rename src/files/lang/{ => ntsc-1.0}/mpmenuJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpmenuP.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpmenu_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpmenu_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpmenu_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpmenu_str_s.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweaponsE.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweaponsJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweaponsP.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweapons_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweapons_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweapons_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/mpweapons_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/oatE.c create mode 100644 src/files/lang/ntsc-1.0/oatJ.c create mode 100644 src/files/lang/ntsc-1.0/oatP.c create mode 100644 src/files/lang/ntsc-1.0/oat_str_f.c create mode 100644 src/files/lang/ntsc-1.0/oat_str_g.c create mode 100644 src/files/lang/ntsc-1.0/oat_str_i.c create mode 100644 src/files/lang/ntsc-1.0/oat_str_s.c create mode 100644 src/files/lang/ntsc-1.0/oldE.c create mode 100644 src/files/lang/ntsc-1.0/oldJ.c create mode 100644 src/files/lang/ntsc-1.0/oldP.c create mode 100644 src/files/lang/ntsc-1.0/old_str_f.c create mode 100644 src/files/lang/ntsc-1.0/old_str_g.c create mode 100644 src/files/lang/ntsc-1.0/old_str_i.c create mode 100644 src/files/lang/ntsc-1.0/old_str_s.c rename src/files/lang/{ => ntsc-1.0}/optionsE.c (100%) rename src/files/lang/{ => ntsc-1.0}/optionsJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/optionsP.c (100%) rename src/files/lang/{ => ntsc-1.0}/options_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/options_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/options_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/options_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/pamE.c rename src/files/lang/{ => ntsc-1.0}/pamJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/pamP.c (100%) rename src/files/lang/{ => ntsc-1.0}/pam_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/pam_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/pam_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/pam_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/peteE.c rename src/files/lang/{ => ntsc-1.0}/peteJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/peteP.c (100%) rename src/files/lang/{ => ntsc-1.0}/pete_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/pete_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/pete_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/pete_str_s.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobjE.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobjJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobjP.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobj_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobj_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobj_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/propobj_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/refE.c create mode 100644 src/files/lang/ntsc-1.0/refJ.c create mode 100644 src/files/lang/ntsc-1.0/refP.c create mode 100644 src/files/lang/ntsc-1.0/ref_str_f.c create mode 100644 src/files/lang/ntsc-1.0/ref_str_g.c create mode 100644 src/files/lang/ntsc-1.0/ref_str_i.c create mode 100644 src/files/lang/ntsc-1.0/ref_str_s.c create mode 100644 src/files/lang/ntsc-1.0/ritE.c rename src/files/lang/{ => ntsc-1.0}/ritJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/ritP.c (100%) rename src/files/lang/{ => ntsc-1.0}/rit_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/rit_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/rit_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/rit_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/runE.c create mode 100644 src/files/lang/ntsc-1.0/runJ.c create mode 100644 src/files/lang/ntsc-1.0/runP.c create mode 100644 src/files/lang/ntsc-1.0/run_str_f.c create mode 100644 src/files/lang/ntsc-1.0/run_str_g.c create mode 100644 src/files/lang/ntsc-1.0/run_str_i.c create mode 100644 src/files/lang/ntsc-1.0/run_str_s.c create mode 100644 src/files/lang/ntsc-1.0/sevE.c rename src/files/lang/{ => ntsc-1.0}/sevJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/sevP.c (100%) rename src/files/lang/{ => ntsc-1.0}/sev_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/sev_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/sev_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/sev_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/sevbE.c create mode 100644 src/files/lang/ntsc-1.0/sevbJ.c create mode 100644 src/files/lang/ntsc-1.0/sevbP.c create mode 100644 src/files/lang/ntsc-1.0/sevb_str_f.c create mode 100644 src/files/lang/ntsc-1.0/sevb_str_g.c create mode 100644 src/files/lang/ntsc-1.0/sevb_str_i.c create mode 100644 src/files/lang/ntsc-1.0/sevb_str_s.c create mode 100644 src/files/lang/ntsc-1.0/sevxE.c create mode 100644 src/files/lang/ntsc-1.0/sevxJ.c create mode 100644 src/files/lang/ntsc-1.0/sevxP.c create mode 100644 src/files/lang/ntsc-1.0/sevx_str_f.c create mode 100644 src/files/lang/ntsc-1.0/sevx_str_g.c create mode 100644 src/files/lang/ntsc-1.0/sevx_str_i.c create mode 100644 src/files/lang/ntsc-1.0/sevx_str_s.c create mode 100644 src/files/lang/ntsc-1.0/sevxbE.c create mode 100644 src/files/lang/ntsc-1.0/sevxbJ.c create mode 100644 src/files/lang/ntsc-1.0/sevxbP.c create mode 100644 src/files/lang/ntsc-1.0/sevxb_str_f.c create mode 100644 src/files/lang/ntsc-1.0/sevxb_str_g.c create mode 100644 src/files/lang/ntsc-1.0/sevxb_str_i.c create mode 100644 src/files/lang/ntsc-1.0/sevxb_str_s.c create mode 100644 src/files/lang/ntsc-1.0/shoE.c rename src/files/lang/{ => ntsc-1.0}/shoJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/shoP.c (100%) rename src/files/lang/{ => ntsc-1.0}/sho_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/sho_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/sho_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/sho_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/siloE.c create mode 100644 src/files/lang/ntsc-1.0/siloJ.c create mode 100644 src/files/lang/ntsc-1.0/siloP.c create mode 100644 src/files/lang/ntsc-1.0/silo_str_f.c create mode 100644 src/files/lang/ntsc-1.0/silo_str_g.c create mode 100644 src/files/lang/ntsc-1.0/silo_str_i.c create mode 100644 src/files/lang/ntsc-1.0/silo_str_s.c rename src/files/lang/{stat_str_f.c => ntsc-1.0/statE.c} (100%) rename src/files/lang/{ => ntsc-1.0}/statJ.c (100%) rename src/files/lang/{stat_str_g.c => ntsc-1.0/statP.c} (100%) rename src/files/lang/{stat_str_i.c => ntsc-1.0/stat_str_f.c} (100%) rename src/files/lang/{stat_str_s.c => ntsc-1.0/stat_str_g.c} (100%) create mode 100644 src/files/lang/ntsc-1.0/stat_str_i.c create mode 100644 src/files/lang/ntsc-1.0/stat_str_s.c rename src/files/lang/{ => ntsc-1.0}/titleE.c (100%) rename src/files/lang/{ => ntsc-1.0}/titleJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/titleP.c (100%) rename src/files/lang/{ => ntsc-1.0}/title_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/title_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/title_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/title_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/traE.c rename src/files/lang/{ => ntsc-1.0}/traJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/traP.c (100%) rename src/files/lang/{ => ntsc-1.0}/tra_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/tra_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/tra_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/tra_str_s.c (100%) create mode 100644 src/files/lang/ntsc-1.0/uffE.c create mode 100644 src/files/lang/ntsc-1.0/uffJ.c create mode 100644 src/files/lang/ntsc-1.0/uffP.c create mode 100644 src/files/lang/ntsc-1.0/uff_str_f.c create mode 100644 src/files/lang/ntsc-1.0/uff_str_g.c create mode 100644 src/files/lang/ntsc-1.0/uff_str_i.c create mode 100644 src/files/lang/ntsc-1.0/uff_str_s.c create mode 100644 src/files/lang/ntsc-1.0/waxE.c rename src/files/lang/{ => ntsc-1.0}/waxJ.c (100%) rename src/files/lang/{ => ntsc-1.0}/waxP.c (100%) rename src/files/lang/{ => ntsc-1.0}/wax_str_f.c (100%) rename src/files/lang/{ => ntsc-1.0}/wax_str_g.c (100%) rename src/files/lang/{ => ntsc-1.0}/wax_str_i.c (100%) rename src/files/lang/{ => ntsc-1.0}/wax_str_s.c (100%) create mode 100644 src/files/lang/ntsc-beta/ameE.c create mode 100644 src/files/lang/ntsc-beta/ameJ.c create mode 100644 src/files/lang/ntsc-beta/ameP.c create mode 100644 src/files/lang/ntsc-beta/ame_str_f.c create mode 100644 src/files/lang/ntsc-beta/ame_str_g.c create mode 100644 src/files/lang/ntsc-beta/ame_str_i.c create mode 100644 src/files/lang/ntsc-beta/ame_str_s.c create mode 100644 src/files/lang/ntsc-beta/archE.c create mode 100644 src/files/lang/ntsc-beta/archJ.c create mode 100644 src/files/lang/ntsc-beta/archP.c create mode 100644 src/files/lang/ntsc-beta/arch_str_f.c create mode 100644 src/files/lang/ntsc-beta/arch_str_g.c create mode 100644 src/files/lang/ntsc-beta/arch_str_i.c create mode 100644 src/files/lang/ntsc-beta/arch_str_s.c create mode 100644 src/files/lang/ntsc-beta/arecE.c create mode 100644 src/files/lang/ntsc-beta/arecJ.c create mode 100644 src/files/lang/ntsc-beta/arecP.c create mode 100644 src/files/lang/ntsc-beta/arec_str_f.c create mode 100644 src/files/lang/ntsc-beta/arec_str_g.c create mode 100644 src/files/lang/ntsc-beta/arec_str_i.c create mode 100644 src/files/lang/ntsc-beta/arec_str_s.c create mode 100644 src/files/lang/ntsc-beta/arkE.c create mode 100644 src/files/lang/ntsc-beta/arkJ.c create mode 100644 src/files/lang/ntsc-beta/arkP.c create mode 100644 src/files/lang/ntsc-beta/ark_str_f.c create mode 100644 src/files/lang/ntsc-beta/ark_str_g.c create mode 100644 src/files/lang/ntsc-beta/ark_str_i.c create mode 100644 src/files/lang/ntsc-beta/ark_str_s.c create mode 100644 src/files/lang/ntsc-beta/ashE.c create mode 100644 src/files/lang/ntsc-beta/ashJ.c create mode 100644 src/files/lang/ntsc-beta/ashP.c create mode 100644 src/files/lang/ntsc-beta/ash_str_f.c create mode 100644 src/files/lang/ntsc-beta/ash_str_g.c create mode 100644 src/files/lang/ntsc-beta/ash_str_i.c create mode 100644 src/files/lang/ntsc-beta/ash_str_s.c create mode 100644 src/files/lang/ntsc-beta/ateE.c create mode 100644 src/files/lang/ntsc-beta/ateJ.c create mode 100644 src/files/lang/ntsc-beta/ateP.c create mode 100644 src/files/lang/ntsc-beta/ate_str_f.c create mode 100644 src/files/lang/ntsc-beta/ate_str_g.c create mode 100644 src/files/lang/ntsc-beta/ate_str_i.c create mode 100644 src/files/lang/ntsc-beta/ate_str_s.c create mode 100644 src/files/lang/ntsc-beta/aztE.c create mode 100644 src/files/lang/ntsc-beta/aztJ.c create mode 100644 src/files/lang/ntsc-beta/aztP.c create mode 100644 src/files/lang/ntsc-beta/azt_str_f.c create mode 100644 src/files/lang/ntsc-beta/azt_str_g.c create mode 100644 src/files/lang/ntsc-beta/azt_str_i.c create mode 100644 src/files/lang/ntsc-beta/azt_str_s.c create mode 100644 src/files/lang/ntsc-beta/catE.c create mode 100644 src/files/lang/ntsc-beta/catJ.c create mode 100644 src/files/lang/ntsc-beta/catP.c create mode 100644 src/files/lang/ntsc-beta/cat_str_f.c create mode 100644 src/files/lang/ntsc-beta/cat_str_g.c create mode 100644 src/files/lang/ntsc-beta/cat_str_i.c create mode 100644 src/files/lang/ntsc-beta/cat_str_s.c create mode 100644 src/files/lang/ntsc-beta/caveE.c create mode 100644 src/files/lang/ntsc-beta/caveJ.c create mode 100644 src/files/lang/ntsc-beta/caveP.c create mode 100644 src/files/lang/ntsc-beta/cave_str_f.c create mode 100644 src/files/lang/ntsc-beta/cave_str_g.c create mode 100644 src/files/lang/ntsc-beta/cave_str_i.c create mode 100644 src/files/lang/ntsc-beta/cave_str_s.c create mode 100644 src/files/lang/ntsc-beta/cradE.c create mode 100644 src/files/lang/ntsc-beta/cradJ.c create mode 100644 src/files/lang/ntsc-beta/cradP.c create mode 100644 src/files/lang/ntsc-beta/crad_str_f.c create mode 100644 src/files/lang/ntsc-beta/crad_str_g.c create mode 100644 src/files/lang/ntsc-beta/crad_str_i.c create mode 100644 src/files/lang/ntsc-beta/crad_str_s.c create mode 100644 src/files/lang/ntsc-beta/crypE.c create mode 100644 src/files/lang/ntsc-beta/crypJ.c create mode 100644 src/files/lang/ntsc-beta/crypP.c create mode 100644 src/files/lang/ntsc-beta/cryp_str_f.c create mode 100644 src/files/lang/ntsc-beta/cryp_str_g.c create mode 100644 src/files/lang/ntsc-beta/cryp_str_i.c create mode 100644 src/files/lang/ntsc-beta/cryp_str_s.c create mode 100644 src/files/lang/ntsc-beta/damE.c create mode 100644 src/files/lang/ntsc-beta/damJ.c create mode 100644 src/files/lang/ntsc-beta/damP.c create mode 100644 src/files/lang/ntsc-beta/dam_str_f.c create mode 100644 src/files/lang/ntsc-beta/dam_str_g.c create mode 100644 src/files/lang/ntsc-beta/dam_str_i.c create mode 100644 src/files/lang/ntsc-beta/dam_str_s.c create mode 100644 src/files/lang/ntsc-beta/depoE.c create mode 100644 src/files/lang/ntsc-beta/depoJ.c create mode 100644 src/files/lang/ntsc-beta/depoP.c create mode 100644 src/files/lang/ntsc-beta/depo_str_f.c create mode 100644 src/files/lang/ntsc-beta/depo_str_g.c create mode 100644 src/files/lang/ntsc-beta/depo_str_i.c create mode 100644 src/files/lang/ntsc-beta/depo_str_s.c create mode 100644 src/files/lang/ntsc-beta/destE.c create mode 100644 src/files/lang/ntsc-beta/destJ.c create mode 100644 src/files/lang/ntsc-beta/destP.c create mode 100644 src/files/lang/ntsc-beta/dest_str_f.c create mode 100644 src/files/lang/ntsc-beta/dest_str_g.c create mode 100644 src/files/lang/ntsc-beta/dest_str_i.c create mode 100644 src/files/lang/ntsc-beta/dest_str_s.c create mode 100644 src/files/lang/ntsc-beta/dishE.c create mode 100644 src/files/lang/ntsc-beta/dishJ.c create mode 100644 src/files/lang/ntsc-beta/dishP.c create mode 100644 src/files/lang/ntsc-beta/dish_str_f.c create mode 100644 src/files/lang/ntsc-beta/dish_str_g.c create mode 100644 src/files/lang/ntsc-beta/dish_str_i.c create mode 100644 src/files/lang/ntsc-beta/dish_str_s.c create mode 100644 src/files/lang/ntsc-beta/earE.c create mode 100644 src/files/lang/ntsc-beta/earJ.c create mode 100644 src/files/lang/ntsc-beta/earP.c create mode 100644 src/files/lang/ntsc-beta/ear_str_f.c create mode 100644 src/files/lang/ntsc-beta/ear_str_g.c create mode 100644 src/files/lang/ntsc-beta/ear_str_i.c create mode 100644 src/files/lang/ntsc-beta/ear_str_s.c create mode 100644 src/files/lang/ntsc-beta/eldE.c create mode 100644 src/files/lang/ntsc-beta/eldJ.c create mode 100644 src/files/lang/ntsc-beta/eldP.c create mode 100644 src/files/lang/ntsc-beta/eld_str_f.c create mode 100644 src/files/lang/ntsc-beta/eld_str_g.c create mode 100644 src/files/lang/ntsc-beta/eld_str_i.c create mode 100644 src/files/lang/ntsc-beta/eld_str_s.c create mode 100644 src/files/lang/ntsc-beta/gunE.c create mode 100644 src/files/lang/ntsc-beta/gunJ.c create mode 100644 src/files/lang/ntsc-beta/gunP.c create mode 100644 src/files/lang/ntsc-beta/gun_str_f.c create mode 100644 src/files/lang/ntsc-beta/gun_str_g.c create mode 100644 src/files/lang/ntsc-beta/gun_str_i.c create mode 100644 src/files/lang/ntsc-beta/gun_str_s.c create mode 100644 src/files/lang/ntsc-beta/impE.c create mode 100644 src/files/lang/ntsc-beta/impJ.c create mode 100644 src/files/lang/ntsc-beta/impP.c create mode 100644 src/files/lang/ntsc-beta/imp_str_f.c create mode 100644 src/files/lang/ntsc-beta/imp_str_g.c create mode 100644 src/files/lang/ntsc-beta/imp_str_i.c create mode 100644 src/files/lang/ntsc-beta/imp_str_s.c create mode 100644 src/files/lang/ntsc-beta/junE.c create mode 100644 src/files/lang/ntsc-beta/junJ.c create mode 100644 src/files/lang/ntsc-beta/junP.c create mode 100644 src/files/lang/ntsc-beta/jun_str_f.c create mode 100644 src/files/lang/ntsc-beta/jun_str_g.c create mode 100644 src/files/lang/ntsc-beta/jun_str_i.c create mode 100644 src/files/lang/ntsc-beta/jun_str_s.c create mode 100644 src/files/lang/ntsc-beta/lamE.c create mode 100644 src/files/lang/ntsc-beta/lamJ.c create mode 100644 src/files/lang/ntsc-beta/lamP.c create mode 100644 src/files/lang/ntsc-beta/lam_str_f.c create mode 100644 src/files/lang/ntsc-beta/lam_str_g.c create mode 100644 src/files/lang/ntsc-beta/lam_str_i.c create mode 100644 src/files/lang/ntsc-beta/lam_str_s.c create mode 100644 src/files/lang/ntsc-beta/leeE.c create mode 100644 src/files/lang/ntsc-beta/leeJ.c create mode 100644 src/files/lang/ntsc-beta/leeP.c create mode 100644 src/files/lang/ntsc-beta/lee_str_f.c create mode 100644 src/files/lang/ntsc-beta/lee_str_g.c create mode 100644 src/files/lang/ntsc-beta/lee_str_i.c create mode 100644 src/files/lang/ntsc-beta/lee_str_s.c create mode 100644 src/files/lang/ntsc-beta/lenE.c create mode 100644 src/files/lang/ntsc-beta/lenJ.c create mode 100644 src/files/lang/ntsc-beta/lenP.c create mode 100644 src/files/lang/ntsc-beta/len_str_f.c create mode 100644 src/files/lang/ntsc-beta/len_str_g.c create mode 100644 src/files/lang/ntsc-beta/len_str_i.c create mode 100644 src/files/lang/ntsc-beta/len_str_s.c create mode 100644 src/files/lang/ntsc-beta/lipE.c create mode 100644 src/files/lang/ntsc-beta/lipJ.c create mode 100644 src/files/lang/ntsc-beta/lipP.c create mode 100644 src/files/lang/ntsc-beta/lip_str_f.c create mode 100644 src/files/lang/ntsc-beta/lip_str_g.c create mode 100644 src/files/lang/ntsc-beta/lip_str_i.c create mode 100644 src/files/lang/ntsc-beta/lip_str_s.c create mode 100644 src/files/lang/ntsc-beta/lueE.c create mode 100644 src/files/lang/ntsc-beta/lueJ.c create mode 100644 src/files/lang/ntsc-beta/lueP.c create mode 100644 src/files/lang/ntsc-beta/lue_str_f.c create mode 100644 src/files/lang/ntsc-beta/lue_str_g.c create mode 100644 src/files/lang/ntsc-beta/lue_str_i.c create mode 100644 src/files/lang/ntsc-beta/lue_str_s.c create mode 100644 src/files/lang/ntsc-beta/miscE.c create mode 100644 src/files/lang/ntsc-beta/miscJ.c create mode 100644 src/files/lang/ntsc-beta/miscP.c create mode 100644 src/files/lang/ntsc-beta/misc_str_f.c create mode 100644 src/files/lang/ntsc-beta/misc_str_g.c create mode 100644 src/files/lang/ntsc-beta/misc_str_i.c create mode 100644 src/files/lang/ntsc-beta/misc_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp10E.c create mode 100644 src/files/lang/ntsc-beta/mp10J.c create mode 100644 src/files/lang/ntsc-beta/mp10P.c create mode 100644 src/files/lang/ntsc-beta/mp10_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp10_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp10_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp10_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp11E.c create mode 100644 src/files/lang/ntsc-beta/mp11J.c create mode 100644 src/files/lang/ntsc-beta/mp11P.c create mode 100644 src/files/lang/ntsc-beta/mp11_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp11_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp11_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp11_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp12E.c create mode 100644 src/files/lang/ntsc-beta/mp12J.c create mode 100644 src/files/lang/ntsc-beta/mp12P.c create mode 100644 src/files/lang/ntsc-beta/mp12_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp12_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp12_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp12_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp13E.c create mode 100644 src/files/lang/ntsc-beta/mp13J.c create mode 100644 src/files/lang/ntsc-beta/mp13P.c create mode 100644 src/files/lang/ntsc-beta/mp13_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp13_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp13_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp13_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp14E.c create mode 100644 src/files/lang/ntsc-beta/mp14J.c create mode 100644 src/files/lang/ntsc-beta/mp14P.c create mode 100644 src/files/lang/ntsc-beta/mp14_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp14_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp14_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp14_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp15E.c create mode 100644 src/files/lang/ntsc-beta/mp15J.c create mode 100644 src/files/lang/ntsc-beta/mp15P.c create mode 100644 src/files/lang/ntsc-beta/mp15_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp15_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp15_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp15_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp16E.c create mode 100644 src/files/lang/ntsc-beta/mp16J.c create mode 100644 src/files/lang/ntsc-beta/mp16P.c create mode 100644 src/files/lang/ntsc-beta/mp16_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp16_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp16_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp16_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp17E.c create mode 100644 src/files/lang/ntsc-beta/mp17J.c create mode 100644 src/files/lang/ntsc-beta/mp17P.c create mode 100644 src/files/lang/ntsc-beta/mp17_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp17_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp17_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp17_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp18E.c create mode 100644 src/files/lang/ntsc-beta/mp18J.c create mode 100644 src/files/lang/ntsc-beta/mp18P.c create mode 100644 src/files/lang/ntsc-beta/mp18_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp18_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp18_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp18_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp19E.c create mode 100644 src/files/lang/ntsc-beta/mp19J.c create mode 100644 src/files/lang/ntsc-beta/mp19P.c create mode 100644 src/files/lang/ntsc-beta/mp19_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp19_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp19_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp19_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp1E.c create mode 100644 src/files/lang/ntsc-beta/mp1J.c create mode 100644 src/files/lang/ntsc-beta/mp1P.c create mode 100644 src/files/lang/ntsc-beta/mp1_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp1_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp1_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp1_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp20E.c create mode 100644 src/files/lang/ntsc-beta/mp20J.c create mode 100644 src/files/lang/ntsc-beta/mp20P.c create mode 100644 src/files/lang/ntsc-beta/mp20_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp20_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp20_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp20_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp2E.c create mode 100644 src/files/lang/ntsc-beta/mp2J.c create mode 100644 src/files/lang/ntsc-beta/mp2P.c create mode 100644 src/files/lang/ntsc-beta/mp2_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp2_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp2_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp2_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp3E.c create mode 100644 src/files/lang/ntsc-beta/mp3J.c create mode 100644 src/files/lang/ntsc-beta/mp3P.c create mode 100644 src/files/lang/ntsc-beta/mp3_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp3_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp3_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp3_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp4E.c create mode 100644 src/files/lang/ntsc-beta/mp4J.c create mode 100644 src/files/lang/ntsc-beta/mp4P.c create mode 100644 src/files/lang/ntsc-beta/mp4_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp4_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp4_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp4_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp5E.c create mode 100644 src/files/lang/ntsc-beta/mp5J.c create mode 100644 src/files/lang/ntsc-beta/mp5P.c create mode 100644 src/files/lang/ntsc-beta/mp5_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp5_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp5_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp5_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp6E.c create mode 100644 src/files/lang/ntsc-beta/mp6J.c create mode 100644 src/files/lang/ntsc-beta/mp6P.c create mode 100644 src/files/lang/ntsc-beta/mp6_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp6_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp6_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp6_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp7E.c create mode 100644 src/files/lang/ntsc-beta/mp7J.c create mode 100644 src/files/lang/ntsc-beta/mp7P.c create mode 100644 src/files/lang/ntsc-beta/mp7_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp7_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp7_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp7_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp8E.c create mode 100644 src/files/lang/ntsc-beta/mp8J.c create mode 100644 src/files/lang/ntsc-beta/mp8P.c create mode 100644 src/files/lang/ntsc-beta/mp8_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp8_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp8_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp8_str_s.c create mode 100644 src/files/lang/ntsc-beta/mp9E.c create mode 100644 src/files/lang/ntsc-beta/mp9J.c create mode 100644 src/files/lang/ntsc-beta/mp9P.c create mode 100644 src/files/lang/ntsc-beta/mp9_str_f.c create mode 100644 src/files/lang/ntsc-beta/mp9_str_g.c create mode 100644 src/files/lang/ntsc-beta/mp9_str_i.c create mode 100644 src/files/lang/ntsc-beta/mp9_str_s.c create mode 100644 src/files/lang/ntsc-beta/mpmenuE.c create mode 100644 src/files/lang/ntsc-beta/mpmenuJ.c create mode 100644 src/files/lang/ntsc-beta/mpmenuP.c create mode 100644 src/files/lang/ntsc-beta/mpmenu_str_f.c create mode 100644 src/files/lang/ntsc-beta/mpmenu_str_g.c create mode 100644 src/files/lang/ntsc-beta/mpmenu_str_i.c create mode 100644 src/files/lang/ntsc-beta/mpmenu_str_s.c create mode 100644 src/files/lang/ntsc-beta/mpweaponsE.c create mode 100644 src/files/lang/ntsc-beta/mpweaponsJ.c create mode 100644 src/files/lang/ntsc-beta/mpweaponsP.c create mode 100644 src/files/lang/ntsc-beta/mpweapons_str_f.c create mode 100644 src/files/lang/ntsc-beta/mpweapons_str_g.c create mode 100644 src/files/lang/ntsc-beta/mpweapons_str_i.c create mode 100644 src/files/lang/ntsc-beta/mpweapons_str_s.c create mode 100644 src/files/lang/ntsc-beta/oatE.c create mode 100644 src/files/lang/ntsc-beta/oatJ.c create mode 100644 src/files/lang/ntsc-beta/oatP.c create mode 100644 src/files/lang/ntsc-beta/oat_str_f.c create mode 100644 src/files/lang/ntsc-beta/oat_str_g.c create mode 100644 src/files/lang/ntsc-beta/oat_str_i.c create mode 100644 src/files/lang/ntsc-beta/oat_str_s.c create mode 100644 src/files/lang/ntsc-beta/oldE.c create mode 100644 src/files/lang/ntsc-beta/oldJ.c create mode 100644 src/files/lang/ntsc-beta/oldP.c create mode 100644 src/files/lang/ntsc-beta/old_str_f.c create mode 100644 src/files/lang/ntsc-beta/old_str_g.c create mode 100644 src/files/lang/ntsc-beta/old_str_i.c create mode 100644 src/files/lang/ntsc-beta/old_str_s.c create mode 100644 src/files/lang/ntsc-beta/optionsE.c create mode 100644 src/files/lang/ntsc-beta/optionsJ.c create mode 100644 src/files/lang/ntsc-beta/optionsP.c create mode 100644 src/files/lang/ntsc-beta/options_str_f.c create mode 100644 src/files/lang/ntsc-beta/options_str_g.c create mode 100644 src/files/lang/ntsc-beta/options_str_i.c create mode 100644 src/files/lang/ntsc-beta/options_str_s.c create mode 100644 src/files/lang/ntsc-beta/pamE.c create mode 100644 src/files/lang/ntsc-beta/pamJ.c create mode 100644 src/files/lang/ntsc-beta/pamP.c create mode 100644 src/files/lang/ntsc-beta/pam_str_f.c create mode 100644 src/files/lang/ntsc-beta/pam_str_g.c create mode 100644 src/files/lang/ntsc-beta/pam_str_i.c create mode 100644 src/files/lang/ntsc-beta/pam_str_s.c create mode 100644 src/files/lang/ntsc-beta/peteE.c create mode 100644 src/files/lang/ntsc-beta/peteJ.c create mode 100644 src/files/lang/ntsc-beta/peteP.c create mode 100644 src/files/lang/ntsc-beta/pete_str_f.c create mode 100644 src/files/lang/ntsc-beta/pete_str_g.c create mode 100644 src/files/lang/ntsc-beta/pete_str_i.c create mode 100644 src/files/lang/ntsc-beta/pete_str_s.c create mode 100644 src/files/lang/ntsc-beta/propobjE.c create mode 100644 src/files/lang/ntsc-beta/propobjJ.c create mode 100644 src/files/lang/ntsc-beta/propobjP.c create mode 100644 src/files/lang/ntsc-beta/propobj_str_f.c create mode 100644 src/files/lang/ntsc-beta/propobj_str_g.c create mode 100644 src/files/lang/ntsc-beta/propobj_str_i.c create mode 100644 src/files/lang/ntsc-beta/propobj_str_s.c create mode 100644 src/files/lang/ntsc-beta/refE.c create mode 100644 src/files/lang/ntsc-beta/refJ.c create mode 100644 src/files/lang/ntsc-beta/refP.c create mode 100644 src/files/lang/ntsc-beta/ref_str_f.c create mode 100644 src/files/lang/ntsc-beta/ref_str_g.c create mode 100644 src/files/lang/ntsc-beta/ref_str_i.c create mode 100644 src/files/lang/ntsc-beta/ref_str_s.c create mode 100644 src/files/lang/ntsc-beta/ritE.c create mode 100644 src/files/lang/ntsc-beta/ritJ.c create mode 100644 src/files/lang/ntsc-beta/ritP.c create mode 100644 src/files/lang/ntsc-beta/rit_str_f.c create mode 100644 src/files/lang/ntsc-beta/rit_str_g.c create mode 100644 src/files/lang/ntsc-beta/rit_str_i.c create mode 100644 src/files/lang/ntsc-beta/rit_str_s.c create mode 100644 src/files/lang/ntsc-beta/runE.c create mode 100644 src/files/lang/ntsc-beta/runJ.c create mode 100644 src/files/lang/ntsc-beta/runP.c create mode 100644 src/files/lang/ntsc-beta/run_str_f.c create mode 100644 src/files/lang/ntsc-beta/run_str_g.c create mode 100644 src/files/lang/ntsc-beta/run_str_i.c create mode 100644 src/files/lang/ntsc-beta/run_str_s.c create mode 100644 src/files/lang/ntsc-beta/sevE.c create mode 100644 src/files/lang/ntsc-beta/sevJ.c create mode 100644 src/files/lang/ntsc-beta/sevP.c create mode 100644 src/files/lang/ntsc-beta/sev_str_f.c create mode 100644 src/files/lang/ntsc-beta/sev_str_g.c create mode 100644 src/files/lang/ntsc-beta/sev_str_i.c create mode 100644 src/files/lang/ntsc-beta/sev_str_s.c create mode 100644 src/files/lang/ntsc-beta/sevbE.c create mode 100644 src/files/lang/ntsc-beta/sevbJ.c create mode 100644 src/files/lang/ntsc-beta/sevbP.c create mode 100644 src/files/lang/ntsc-beta/sevb_str_f.c create mode 100644 src/files/lang/ntsc-beta/sevb_str_g.c create mode 100644 src/files/lang/ntsc-beta/sevb_str_i.c create mode 100644 src/files/lang/ntsc-beta/sevb_str_s.c create mode 100644 src/files/lang/ntsc-beta/sevxE.c create mode 100644 src/files/lang/ntsc-beta/sevxJ.c create mode 100644 src/files/lang/ntsc-beta/sevxP.c create mode 100644 src/files/lang/ntsc-beta/sevx_str_f.c create mode 100644 src/files/lang/ntsc-beta/sevx_str_g.c create mode 100644 src/files/lang/ntsc-beta/sevx_str_i.c create mode 100644 src/files/lang/ntsc-beta/sevx_str_s.c create mode 100644 src/files/lang/ntsc-beta/sevxbE.c create mode 100644 src/files/lang/ntsc-beta/sevxbJ.c create mode 100644 src/files/lang/ntsc-beta/sevxbP.c create mode 100644 src/files/lang/ntsc-beta/sevxb_str_f.c create mode 100644 src/files/lang/ntsc-beta/sevxb_str_g.c create mode 100644 src/files/lang/ntsc-beta/sevxb_str_i.c create mode 100644 src/files/lang/ntsc-beta/sevxb_str_s.c create mode 100644 src/files/lang/ntsc-beta/shoE.c create mode 100644 src/files/lang/ntsc-beta/shoJ.c create mode 100644 src/files/lang/ntsc-beta/shoP.c create mode 100644 src/files/lang/ntsc-beta/sho_str_f.c create mode 100644 src/files/lang/ntsc-beta/sho_str_g.c create mode 100644 src/files/lang/ntsc-beta/sho_str_i.c create mode 100644 src/files/lang/ntsc-beta/sho_str_s.c create mode 100644 src/files/lang/ntsc-beta/siloE.c create mode 100644 src/files/lang/ntsc-beta/siloJ.c create mode 100644 src/files/lang/ntsc-beta/siloP.c create mode 100644 src/files/lang/ntsc-beta/silo_str_f.c create mode 100644 src/files/lang/ntsc-beta/silo_str_g.c create mode 100644 src/files/lang/ntsc-beta/silo_str_i.c create mode 100644 src/files/lang/ntsc-beta/silo_str_s.c create mode 100644 src/files/lang/ntsc-beta/statE.c create mode 100644 src/files/lang/ntsc-beta/statJ.c create mode 100644 src/files/lang/ntsc-beta/statP.c create mode 100644 src/files/lang/ntsc-beta/stat_str_f.c create mode 100644 src/files/lang/ntsc-beta/stat_str_g.c create mode 100644 src/files/lang/ntsc-beta/stat_str_i.c create mode 100644 src/files/lang/ntsc-beta/stat_str_s.c create mode 100644 src/files/lang/ntsc-beta/titleE.c create mode 100644 src/files/lang/ntsc-beta/titleJ.c create mode 100644 src/files/lang/ntsc-beta/titleP.c create mode 100644 src/files/lang/ntsc-beta/title_str_f.c create mode 100644 src/files/lang/ntsc-beta/title_str_g.c create mode 100644 src/files/lang/ntsc-beta/title_str_i.c create mode 100644 src/files/lang/ntsc-beta/title_str_s.c create mode 100644 src/files/lang/ntsc-beta/traE.c create mode 100644 src/files/lang/ntsc-beta/traJ.c create mode 100644 src/files/lang/ntsc-beta/traP.c create mode 100644 src/files/lang/ntsc-beta/tra_str_f.c create mode 100644 src/files/lang/ntsc-beta/tra_str_g.c create mode 100644 src/files/lang/ntsc-beta/tra_str_i.c create mode 100644 src/files/lang/ntsc-beta/tra_str_s.c create mode 100644 src/files/lang/ntsc-beta/uffE.c create mode 100644 src/files/lang/ntsc-beta/uffJ.c create mode 100644 src/files/lang/ntsc-beta/uffP.c create mode 100644 src/files/lang/ntsc-beta/uff_str_f.c create mode 100644 src/files/lang/ntsc-beta/uff_str_g.c create mode 100644 src/files/lang/ntsc-beta/uff_str_i.c create mode 100644 src/files/lang/ntsc-beta/uff_str_s.c create mode 100644 src/files/lang/ntsc-beta/waxE.c create mode 100644 src/files/lang/ntsc-beta/waxJ.c create mode 100644 src/files/lang/ntsc-beta/waxP.c create mode 100644 src/files/lang/ntsc-beta/wax_str_f.c create mode 100644 src/files/lang/ntsc-beta/wax_str_g.c create mode 100644 src/files/lang/ntsc-beta/wax_str_i.c create mode 100644 src/files/lang/ntsc-beta/wax_str_s.c create mode 100644 src/files/lang/ntsc-final/ameE.c create mode 100644 src/files/lang/ntsc-final/ameJ.c create mode 100644 src/files/lang/ntsc-final/ameP.c create mode 100644 src/files/lang/ntsc-final/ame_str_f.c create mode 100644 src/files/lang/ntsc-final/ame_str_g.c create mode 100644 src/files/lang/ntsc-final/ame_str_i.c create mode 100644 src/files/lang/ntsc-final/ame_str_s.c create mode 100644 src/files/lang/ntsc-final/archE.c create mode 100644 src/files/lang/ntsc-final/archJ.c create mode 100644 src/files/lang/ntsc-final/archP.c create mode 100644 src/files/lang/ntsc-final/arch_str_f.c create mode 100644 src/files/lang/ntsc-final/arch_str_g.c create mode 100644 src/files/lang/ntsc-final/arch_str_i.c create mode 100644 src/files/lang/ntsc-final/arch_str_s.c create mode 100644 src/files/lang/ntsc-final/arecE.c create mode 100644 src/files/lang/ntsc-final/arecJ.c create mode 100644 src/files/lang/ntsc-final/arecP.c create mode 100644 src/files/lang/ntsc-final/arec_str_f.c create mode 100644 src/files/lang/ntsc-final/arec_str_g.c create mode 100644 src/files/lang/ntsc-final/arec_str_i.c create mode 100644 src/files/lang/ntsc-final/arec_str_s.c create mode 100644 src/files/lang/ntsc-final/arkE.c create mode 100644 src/files/lang/ntsc-final/arkJ.c create mode 100644 src/files/lang/ntsc-final/arkP.c create mode 100644 src/files/lang/ntsc-final/ark_str_f.c create mode 100644 src/files/lang/ntsc-final/ark_str_g.c create mode 100644 src/files/lang/ntsc-final/ark_str_i.c create mode 100644 src/files/lang/ntsc-final/ark_str_s.c create mode 100644 src/files/lang/ntsc-final/ashE.c create mode 100644 src/files/lang/ntsc-final/ashJ.c create mode 100644 src/files/lang/ntsc-final/ashP.c create mode 100644 src/files/lang/ntsc-final/ash_str_f.c create mode 100644 src/files/lang/ntsc-final/ash_str_g.c create mode 100644 src/files/lang/ntsc-final/ash_str_i.c create mode 100644 src/files/lang/ntsc-final/ash_str_s.c create mode 100644 src/files/lang/ntsc-final/ateE.c create mode 100644 src/files/lang/ntsc-final/ateJ.c create mode 100644 src/files/lang/ntsc-final/ateP.c create mode 100644 src/files/lang/ntsc-final/ate_str_f.c create mode 100644 src/files/lang/ntsc-final/ate_str_g.c create mode 100644 src/files/lang/ntsc-final/ate_str_i.c create mode 100644 src/files/lang/ntsc-final/ate_str_s.c create mode 100644 src/files/lang/ntsc-final/aztE.c create mode 100644 src/files/lang/ntsc-final/aztJ.c create mode 100644 src/files/lang/ntsc-final/aztP.c create mode 100644 src/files/lang/ntsc-final/azt_str_f.c create mode 100644 src/files/lang/ntsc-final/azt_str_g.c create mode 100644 src/files/lang/ntsc-final/azt_str_i.c create mode 100644 src/files/lang/ntsc-final/azt_str_s.c create mode 100644 src/files/lang/ntsc-final/catE.c create mode 100644 src/files/lang/ntsc-final/catJ.c create mode 100644 src/files/lang/ntsc-final/catP.c create mode 100644 src/files/lang/ntsc-final/cat_str_f.c create mode 100644 src/files/lang/ntsc-final/cat_str_g.c create mode 100644 src/files/lang/ntsc-final/cat_str_i.c create mode 100644 src/files/lang/ntsc-final/cat_str_s.c create mode 100644 src/files/lang/ntsc-final/caveE.c create mode 100644 src/files/lang/ntsc-final/caveJ.c create mode 100644 src/files/lang/ntsc-final/caveP.c create mode 100644 src/files/lang/ntsc-final/cave_str_f.c create mode 100644 src/files/lang/ntsc-final/cave_str_g.c create mode 100644 src/files/lang/ntsc-final/cave_str_i.c create mode 100644 src/files/lang/ntsc-final/cave_str_s.c create mode 100644 src/files/lang/ntsc-final/cradE.c create mode 100644 src/files/lang/ntsc-final/cradJ.c create mode 100644 src/files/lang/ntsc-final/cradP.c create mode 100644 src/files/lang/ntsc-final/crad_str_f.c create mode 100644 src/files/lang/ntsc-final/crad_str_g.c create mode 100644 src/files/lang/ntsc-final/crad_str_i.c create mode 100644 src/files/lang/ntsc-final/crad_str_s.c create mode 100644 src/files/lang/ntsc-final/crypE.c create mode 100644 src/files/lang/ntsc-final/crypJ.c create mode 100644 src/files/lang/ntsc-final/crypP.c create mode 100644 src/files/lang/ntsc-final/cryp_str_f.c create mode 100644 src/files/lang/ntsc-final/cryp_str_g.c create mode 100644 src/files/lang/ntsc-final/cryp_str_i.c create mode 100644 src/files/lang/ntsc-final/cryp_str_s.c create mode 100644 src/files/lang/ntsc-final/damE.c create mode 100644 src/files/lang/ntsc-final/damJ.c create mode 100644 src/files/lang/ntsc-final/damP.c create mode 100644 src/files/lang/ntsc-final/dam_str_f.c create mode 100644 src/files/lang/ntsc-final/dam_str_g.c create mode 100644 src/files/lang/ntsc-final/dam_str_i.c create mode 100644 src/files/lang/ntsc-final/dam_str_s.c create mode 100644 src/files/lang/ntsc-final/depoE.c create mode 100644 src/files/lang/ntsc-final/depoJ.c create mode 100644 src/files/lang/ntsc-final/depoP.c create mode 100644 src/files/lang/ntsc-final/depo_str_f.c create mode 100644 src/files/lang/ntsc-final/depo_str_g.c create mode 100644 src/files/lang/ntsc-final/depo_str_i.c create mode 100644 src/files/lang/ntsc-final/depo_str_s.c create mode 100644 src/files/lang/ntsc-final/destE.c create mode 100644 src/files/lang/ntsc-final/destJ.c create mode 100644 src/files/lang/ntsc-final/destP.c create mode 100644 src/files/lang/ntsc-final/dest_str_f.c create mode 100644 src/files/lang/ntsc-final/dest_str_g.c create mode 100644 src/files/lang/ntsc-final/dest_str_i.c create mode 100644 src/files/lang/ntsc-final/dest_str_s.c create mode 100644 src/files/lang/ntsc-final/dishE.c create mode 100644 src/files/lang/ntsc-final/dishJ.c create mode 100644 src/files/lang/ntsc-final/dishP.c create mode 100644 src/files/lang/ntsc-final/dish_str_f.c create mode 100644 src/files/lang/ntsc-final/dish_str_g.c create mode 100644 src/files/lang/ntsc-final/dish_str_i.c create mode 100644 src/files/lang/ntsc-final/dish_str_s.c create mode 100644 src/files/lang/ntsc-final/earE.c create mode 100644 src/files/lang/ntsc-final/earJ.c create mode 100644 src/files/lang/ntsc-final/earP.c create mode 100644 src/files/lang/ntsc-final/ear_str_f.c create mode 100644 src/files/lang/ntsc-final/ear_str_g.c create mode 100644 src/files/lang/ntsc-final/ear_str_i.c create mode 100644 src/files/lang/ntsc-final/ear_str_s.c create mode 100644 src/files/lang/ntsc-final/eldE.c create mode 100644 src/files/lang/ntsc-final/eldJ.c create mode 100644 src/files/lang/ntsc-final/eldP.c create mode 100644 src/files/lang/ntsc-final/eld_str_f.c create mode 100644 src/files/lang/ntsc-final/eld_str_g.c create mode 100644 src/files/lang/ntsc-final/eld_str_i.c create mode 100644 src/files/lang/ntsc-final/eld_str_s.c create mode 100644 src/files/lang/ntsc-final/gunE.c create mode 100644 src/files/lang/ntsc-final/gunJ.c create mode 100644 src/files/lang/ntsc-final/gunP.c create mode 100644 src/files/lang/ntsc-final/gun_str_f.c create mode 100644 src/files/lang/ntsc-final/gun_str_g.c create mode 100644 src/files/lang/ntsc-final/gun_str_i.c create mode 100644 src/files/lang/ntsc-final/gun_str_s.c create mode 100644 src/files/lang/ntsc-final/impE.c create mode 100644 src/files/lang/ntsc-final/impJ.c create mode 100644 src/files/lang/ntsc-final/impP.c create mode 100644 src/files/lang/ntsc-final/imp_str_f.c create mode 100644 src/files/lang/ntsc-final/imp_str_g.c create mode 100644 src/files/lang/ntsc-final/imp_str_i.c create mode 100644 src/files/lang/ntsc-final/imp_str_s.c create mode 100644 src/files/lang/ntsc-final/junE.c create mode 100644 src/files/lang/ntsc-final/junJ.c create mode 100644 src/files/lang/ntsc-final/junP.c create mode 100644 src/files/lang/ntsc-final/jun_str_f.c create mode 100644 src/files/lang/ntsc-final/jun_str_g.c create mode 100644 src/files/lang/ntsc-final/jun_str_i.c create mode 100644 src/files/lang/ntsc-final/jun_str_s.c create mode 100644 src/files/lang/ntsc-final/lamE.c create mode 100644 src/files/lang/ntsc-final/lamJ.c create mode 100644 src/files/lang/ntsc-final/lamP.c create mode 100644 src/files/lang/ntsc-final/lam_str_f.c create mode 100644 src/files/lang/ntsc-final/lam_str_g.c create mode 100644 src/files/lang/ntsc-final/lam_str_i.c create mode 100644 src/files/lang/ntsc-final/lam_str_s.c create mode 100644 src/files/lang/ntsc-final/leeE.c create mode 100644 src/files/lang/ntsc-final/leeJ.c create mode 100644 src/files/lang/ntsc-final/leeP.c create mode 100644 src/files/lang/ntsc-final/lee_str_f.c create mode 100644 src/files/lang/ntsc-final/lee_str_g.c create mode 100644 src/files/lang/ntsc-final/lee_str_i.c create mode 100644 src/files/lang/ntsc-final/lee_str_s.c create mode 100644 src/files/lang/ntsc-final/lenE.c create mode 100644 src/files/lang/ntsc-final/lenJ.c create mode 100644 src/files/lang/ntsc-final/lenP.c create mode 100644 src/files/lang/ntsc-final/len_str_f.c create mode 100644 src/files/lang/ntsc-final/len_str_g.c create mode 100644 src/files/lang/ntsc-final/len_str_i.c create mode 100644 src/files/lang/ntsc-final/len_str_s.c create mode 100644 src/files/lang/ntsc-final/lipE.c create mode 100644 src/files/lang/ntsc-final/lipJ.c create mode 100644 src/files/lang/ntsc-final/lipP.c create mode 100644 src/files/lang/ntsc-final/lip_str_f.c create mode 100644 src/files/lang/ntsc-final/lip_str_g.c create mode 100644 src/files/lang/ntsc-final/lip_str_i.c create mode 100644 src/files/lang/ntsc-final/lip_str_s.c create mode 100644 src/files/lang/ntsc-final/lueE.c create mode 100644 src/files/lang/ntsc-final/lueJ.c create mode 100644 src/files/lang/ntsc-final/lueP.c create mode 100644 src/files/lang/ntsc-final/lue_str_f.c create mode 100644 src/files/lang/ntsc-final/lue_str_g.c create mode 100644 src/files/lang/ntsc-final/lue_str_i.c create mode 100644 src/files/lang/ntsc-final/lue_str_s.c create mode 100644 src/files/lang/ntsc-final/miscE.c create mode 100644 src/files/lang/ntsc-final/miscJ.c create mode 100644 src/files/lang/ntsc-final/miscP.c create mode 100644 src/files/lang/ntsc-final/misc_str_f.c create mode 100644 src/files/lang/ntsc-final/misc_str_g.c create mode 100644 src/files/lang/ntsc-final/misc_str_i.c create mode 100644 src/files/lang/ntsc-final/misc_str_s.c create mode 100644 src/files/lang/ntsc-final/mp10E.c create mode 100644 src/files/lang/ntsc-final/mp10J.c create mode 100644 src/files/lang/ntsc-final/mp10P.c create mode 100644 src/files/lang/ntsc-final/mp10_str_f.c create mode 100644 src/files/lang/ntsc-final/mp10_str_g.c create mode 100644 src/files/lang/ntsc-final/mp10_str_i.c create mode 100644 src/files/lang/ntsc-final/mp10_str_s.c create mode 100644 src/files/lang/ntsc-final/mp11E.c create mode 100644 src/files/lang/ntsc-final/mp11J.c create mode 100644 src/files/lang/ntsc-final/mp11P.c create mode 100644 src/files/lang/ntsc-final/mp11_str_f.c create mode 100644 src/files/lang/ntsc-final/mp11_str_g.c create mode 100644 src/files/lang/ntsc-final/mp11_str_i.c create mode 100644 src/files/lang/ntsc-final/mp11_str_s.c create mode 100644 src/files/lang/ntsc-final/mp12E.c create mode 100644 src/files/lang/ntsc-final/mp12J.c create mode 100644 src/files/lang/ntsc-final/mp12P.c create mode 100644 src/files/lang/ntsc-final/mp12_str_f.c create mode 100644 src/files/lang/ntsc-final/mp12_str_g.c create mode 100644 src/files/lang/ntsc-final/mp12_str_i.c create mode 100644 src/files/lang/ntsc-final/mp12_str_s.c create mode 100644 src/files/lang/ntsc-final/mp13E.c create mode 100644 src/files/lang/ntsc-final/mp13J.c create mode 100644 src/files/lang/ntsc-final/mp13P.c create mode 100644 src/files/lang/ntsc-final/mp13_str_f.c create mode 100644 src/files/lang/ntsc-final/mp13_str_g.c create mode 100644 src/files/lang/ntsc-final/mp13_str_i.c create mode 100644 src/files/lang/ntsc-final/mp13_str_s.c create mode 100644 src/files/lang/ntsc-final/mp14E.c create mode 100644 src/files/lang/ntsc-final/mp14J.c create mode 100644 src/files/lang/ntsc-final/mp14P.c create mode 100644 src/files/lang/ntsc-final/mp14_str_f.c create mode 100644 src/files/lang/ntsc-final/mp14_str_g.c create mode 100644 src/files/lang/ntsc-final/mp14_str_i.c create mode 100644 src/files/lang/ntsc-final/mp14_str_s.c create mode 100644 src/files/lang/ntsc-final/mp15E.c create mode 100644 src/files/lang/ntsc-final/mp15J.c create mode 100644 src/files/lang/ntsc-final/mp15P.c create mode 100644 src/files/lang/ntsc-final/mp15_str_f.c create mode 100644 src/files/lang/ntsc-final/mp15_str_g.c create mode 100644 src/files/lang/ntsc-final/mp15_str_i.c create mode 100644 src/files/lang/ntsc-final/mp15_str_s.c create mode 100644 src/files/lang/ntsc-final/mp16E.c create mode 100644 src/files/lang/ntsc-final/mp16J.c create mode 100644 src/files/lang/ntsc-final/mp16P.c create mode 100644 src/files/lang/ntsc-final/mp16_str_f.c create mode 100644 src/files/lang/ntsc-final/mp16_str_g.c create mode 100644 src/files/lang/ntsc-final/mp16_str_i.c create mode 100644 src/files/lang/ntsc-final/mp16_str_s.c create mode 100644 src/files/lang/ntsc-final/mp17E.c create mode 100644 src/files/lang/ntsc-final/mp17J.c create mode 100644 src/files/lang/ntsc-final/mp17P.c create mode 100644 src/files/lang/ntsc-final/mp17_str_f.c create mode 100644 src/files/lang/ntsc-final/mp17_str_g.c create mode 100644 src/files/lang/ntsc-final/mp17_str_i.c create mode 100644 src/files/lang/ntsc-final/mp17_str_s.c create mode 100644 src/files/lang/ntsc-final/mp18E.c create mode 100644 src/files/lang/ntsc-final/mp18J.c create mode 100644 src/files/lang/ntsc-final/mp18P.c create mode 100644 src/files/lang/ntsc-final/mp18_str_f.c create mode 100644 src/files/lang/ntsc-final/mp18_str_g.c create mode 100644 src/files/lang/ntsc-final/mp18_str_i.c create mode 100644 src/files/lang/ntsc-final/mp18_str_s.c create mode 100644 src/files/lang/ntsc-final/mp19E.c create mode 100644 src/files/lang/ntsc-final/mp19J.c create mode 100644 src/files/lang/ntsc-final/mp19P.c create mode 100644 src/files/lang/ntsc-final/mp19_str_f.c create mode 100644 src/files/lang/ntsc-final/mp19_str_g.c create mode 100644 src/files/lang/ntsc-final/mp19_str_i.c create mode 100644 src/files/lang/ntsc-final/mp19_str_s.c create mode 100644 src/files/lang/ntsc-final/mp1E.c create mode 100644 src/files/lang/ntsc-final/mp1J.c create mode 100644 src/files/lang/ntsc-final/mp1P.c create mode 100644 src/files/lang/ntsc-final/mp1_str_f.c create mode 100644 src/files/lang/ntsc-final/mp1_str_g.c create mode 100644 src/files/lang/ntsc-final/mp1_str_i.c create mode 100644 src/files/lang/ntsc-final/mp1_str_s.c create mode 100644 src/files/lang/ntsc-final/mp20E.c create mode 100644 src/files/lang/ntsc-final/mp20J.c create mode 100644 src/files/lang/ntsc-final/mp20P.c create mode 100644 src/files/lang/ntsc-final/mp20_str_f.c create mode 100644 src/files/lang/ntsc-final/mp20_str_g.c create mode 100644 src/files/lang/ntsc-final/mp20_str_i.c create mode 100644 src/files/lang/ntsc-final/mp20_str_s.c create mode 100644 src/files/lang/ntsc-final/mp2E.c create mode 100644 src/files/lang/ntsc-final/mp2J.c create mode 100644 src/files/lang/ntsc-final/mp2P.c create mode 100644 src/files/lang/ntsc-final/mp2_str_f.c create mode 100644 src/files/lang/ntsc-final/mp2_str_g.c create mode 100644 src/files/lang/ntsc-final/mp2_str_i.c create mode 100644 src/files/lang/ntsc-final/mp2_str_s.c create mode 100644 src/files/lang/ntsc-final/mp3E.c create mode 100644 src/files/lang/ntsc-final/mp3J.c create mode 100644 src/files/lang/ntsc-final/mp3P.c create mode 100644 src/files/lang/ntsc-final/mp3_str_f.c create mode 100644 src/files/lang/ntsc-final/mp3_str_g.c create mode 100644 src/files/lang/ntsc-final/mp3_str_i.c create mode 100644 src/files/lang/ntsc-final/mp3_str_s.c create mode 100644 src/files/lang/ntsc-final/mp4E.c create mode 100644 src/files/lang/ntsc-final/mp4J.c create mode 100644 src/files/lang/ntsc-final/mp4P.c create mode 100644 src/files/lang/ntsc-final/mp4_str_f.c create mode 100644 src/files/lang/ntsc-final/mp4_str_g.c create mode 100644 src/files/lang/ntsc-final/mp4_str_i.c create mode 100644 src/files/lang/ntsc-final/mp4_str_s.c create mode 100644 src/files/lang/ntsc-final/mp5E.c create mode 100644 src/files/lang/ntsc-final/mp5J.c create mode 100644 src/files/lang/ntsc-final/mp5P.c create mode 100644 src/files/lang/ntsc-final/mp5_str_f.c create mode 100644 src/files/lang/ntsc-final/mp5_str_g.c create mode 100644 src/files/lang/ntsc-final/mp5_str_i.c create mode 100644 src/files/lang/ntsc-final/mp5_str_s.c create mode 100644 src/files/lang/ntsc-final/mp6E.c create mode 100644 src/files/lang/ntsc-final/mp6J.c create mode 100644 src/files/lang/ntsc-final/mp6P.c create mode 100644 src/files/lang/ntsc-final/mp6_str_f.c create mode 100644 src/files/lang/ntsc-final/mp6_str_g.c create mode 100644 src/files/lang/ntsc-final/mp6_str_i.c create mode 100644 src/files/lang/ntsc-final/mp6_str_s.c create mode 100644 src/files/lang/ntsc-final/mp7E.c create mode 100644 src/files/lang/ntsc-final/mp7J.c create mode 100644 src/files/lang/ntsc-final/mp7P.c create mode 100644 src/files/lang/ntsc-final/mp7_str_f.c create mode 100644 src/files/lang/ntsc-final/mp7_str_g.c create mode 100644 src/files/lang/ntsc-final/mp7_str_i.c create mode 100644 src/files/lang/ntsc-final/mp7_str_s.c create mode 100644 src/files/lang/ntsc-final/mp8E.c create mode 100644 src/files/lang/ntsc-final/mp8J.c create mode 100644 src/files/lang/ntsc-final/mp8P.c create mode 100644 src/files/lang/ntsc-final/mp8_str_f.c create mode 100644 src/files/lang/ntsc-final/mp8_str_g.c create mode 100644 src/files/lang/ntsc-final/mp8_str_i.c create mode 100644 src/files/lang/ntsc-final/mp8_str_s.c create mode 100644 src/files/lang/ntsc-final/mp9E.c create mode 100644 src/files/lang/ntsc-final/mp9J.c create mode 100644 src/files/lang/ntsc-final/mp9P.c create mode 100644 src/files/lang/ntsc-final/mp9_str_f.c create mode 100644 src/files/lang/ntsc-final/mp9_str_g.c create mode 100644 src/files/lang/ntsc-final/mp9_str_i.c create mode 100644 src/files/lang/ntsc-final/mp9_str_s.c create mode 100644 src/files/lang/ntsc-final/mpmenuE.c create mode 100644 src/files/lang/ntsc-final/mpmenuJ.c create mode 100644 src/files/lang/ntsc-final/mpmenuP.c create mode 100644 src/files/lang/ntsc-final/mpmenu_str_f.c create mode 100644 src/files/lang/ntsc-final/mpmenu_str_g.c create mode 100644 src/files/lang/ntsc-final/mpmenu_str_i.c create mode 100644 src/files/lang/ntsc-final/mpmenu_str_s.c create mode 100644 src/files/lang/ntsc-final/mpweaponsE.c create mode 100644 src/files/lang/ntsc-final/mpweaponsJ.c create mode 100644 src/files/lang/ntsc-final/mpweaponsP.c create mode 100644 src/files/lang/ntsc-final/mpweapons_str_f.c create mode 100644 src/files/lang/ntsc-final/mpweapons_str_g.c create mode 100644 src/files/lang/ntsc-final/mpweapons_str_i.c create mode 100644 src/files/lang/ntsc-final/mpweapons_str_s.c create mode 100644 src/files/lang/ntsc-final/oatE.c create mode 100644 src/files/lang/ntsc-final/oatJ.c create mode 100644 src/files/lang/ntsc-final/oatP.c create mode 100644 src/files/lang/ntsc-final/oat_str_f.c create mode 100644 src/files/lang/ntsc-final/oat_str_g.c create mode 100644 src/files/lang/ntsc-final/oat_str_i.c create mode 100644 src/files/lang/ntsc-final/oat_str_s.c create mode 100644 src/files/lang/ntsc-final/oldE.c create mode 100644 src/files/lang/ntsc-final/oldJ.c create mode 100644 src/files/lang/ntsc-final/oldP.c create mode 100644 src/files/lang/ntsc-final/old_str_f.c create mode 100644 src/files/lang/ntsc-final/old_str_g.c create mode 100644 src/files/lang/ntsc-final/old_str_i.c create mode 100644 src/files/lang/ntsc-final/old_str_s.c create mode 100644 src/files/lang/ntsc-final/optionsE.c create mode 100644 src/files/lang/ntsc-final/optionsJ.c create mode 100644 src/files/lang/ntsc-final/optionsP.c create mode 100644 src/files/lang/ntsc-final/options_str_f.c create mode 100644 src/files/lang/ntsc-final/options_str_g.c create mode 100644 src/files/lang/ntsc-final/options_str_i.c create mode 100644 src/files/lang/ntsc-final/options_str_s.c create mode 100644 src/files/lang/ntsc-final/pamE.c create mode 100644 src/files/lang/ntsc-final/pamJ.c create mode 100644 src/files/lang/ntsc-final/pamP.c create mode 100644 src/files/lang/ntsc-final/pam_str_f.c create mode 100644 src/files/lang/ntsc-final/pam_str_g.c create mode 100644 src/files/lang/ntsc-final/pam_str_i.c create mode 100644 src/files/lang/ntsc-final/pam_str_s.c create mode 100644 src/files/lang/ntsc-final/peteE.c create mode 100644 src/files/lang/ntsc-final/peteJ.c create mode 100644 src/files/lang/ntsc-final/peteP.c create mode 100644 src/files/lang/ntsc-final/pete_str_f.c create mode 100644 src/files/lang/ntsc-final/pete_str_g.c create mode 100644 src/files/lang/ntsc-final/pete_str_i.c create mode 100644 src/files/lang/ntsc-final/pete_str_s.c create mode 100644 src/files/lang/ntsc-final/propobjE.c create mode 100644 src/files/lang/ntsc-final/propobjJ.c create mode 100644 src/files/lang/ntsc-final/propobjP.c create mode 100644 src/files/lang/ntsc-final/propobj_str_f.c create mode 100644 src/files/lang/ntsc-final/propobj_str_g.c create mode 100644 src/files/lang/ntsc-final/propobj_str_i.c create mode 100644 src/files/lang/ntsc-final/propobj_str_s.c create mode 100644 src/files/lang/ntsc-final/refE.c create mode 100644 src/files/lang/ntsc-final/refJ.c create mode 100644 src/files/lang/ntsc-final/refP.c create mode 100644 src/files/lang/ntsc-final/ref_str_f.c create mode 100644 src/files/lang/ntsc-final/ref_str_g.c create mode 100644 src/files/lang/ntsc-final/ref_str_i.c create mode 100644 src/files/lang/ntsc-final/ref_str_s.c create mode 100644 src/files/lang/ntsc-final/ritE.c create mode 100644 src/files/lang/ntsc-final/ritJ.c create mode 100644 src/files/lang/ntsc-final/ritP.c create mode 100644 src/files/lang/ntsc-final/rit_str_f.c create mode 100644 src/files/lang/ntsc-final/rit_str_g.c create mode 100644 src/files/lang/ntsc-final/rit_str_i.c create mode 100644 src/files/lang/ntsc-final/rit_str_s.c create mode 100644 src/files/lang/ntsc-final/runE.c create mode 100644 src/files/lang/ntsc-final/runJ.c create mode 100644 src/files/lang/ntsc-final/runP.c create mode 100644 src/files/lang/ntsc-final/run_str_f.c create mode 100644 src/files/lang/ntsc-final/run_str_g.c create mode 100644 src/files/lang/ntsc-final/run_str_i.c create mode 100644 src/files/lang/ntsc-final/run_str_s.c create mode 100644 src/files/lang/ntsc-final/sevE.c create mode 100644 src/files/lang/ntsc-final/sevJ.c create mode 100644 src/files/lang/ntsc-final/sevP.c create mode 100644 src/files/lang/ntsc-final/sev_str_f.c create mode 100644 src/files/lang/ntsc-final/sev_str_g.c create mode 100644 src/files/lang/ntsc-final/sev_str_i.c create mode 100644 src/files/lang/ntsc-final/sev_str_s.c create mode 100644 src/files/lang/ntsc-final/sevbE.c create mode 100644 src/files/lang/ntsc-final/sevbJ.c create mode 100644 src/files/lang/ntsc-final/sevbP.c create mode 100644 src/files/lang/ntsc-final/sevb_str_f.c create mode 100644 src/files/lang/ntsc-final/sevb_str_g.c create mode 100644 src/files/lang/ntsc-final/sevb_str_i.c create mode 100644 src/files/lang/ntsc-final/sevb_str_s.c create mode 100644 src/files/lang/ntsc-final/sevxE.c create mode 100644 src/files/lang/ntsc-final/sevxJ.c create mode 100644 src/files/lang/ntsc-final/sevxP.c create mode 100644 src/files/lang/ntsc-final/sevx_str_f.c create mode 100644 src/files/lang/ntsc-final/sevx_str_g.c create mode 100644 src/files/lang/ntsc-final/sevx_str_i.c create mode 100644 src/files/lang/ntsc-final/sevx_str_s.c create mode 100644 src/files/lang/ntsc-final/sevxbE.c create mode 100644 src/files/lang/ntsc-final/sevxbJ.c create mode 100644 src/files/lang/ntsc-final/sevxbP.c create mode 100644 src/files/lang/ntsc-final/sevxb_str_f.c create mode 100644 src/files/lang/ntsc-final/sevxb_str_g.c create mode 100644 src/files/lang/ntsc-final/sevxb_str_i.c create mode 100644 src/files/lang/ntsc-final/sevxb_str_s.c create mode 100644 src/files/lang/ntsc-final/shoE.c create mode 100644 src/files/lang/ntsc-final/shoJ.c create mode 100644 src/files/lang/ntsc-final/shoP.c create mode 100644 src/files/lang/ntsc-final/sho_str_f.c create mode 100644 src/files/lang/ntsc-final/sho_str_g.c create mode 100644 src/files/lang/ntsc-final/sho_str_i.c create mode 100644 src/files/lang/ntsc-final/sho_str_s.c create mode 100644 src/files/lang/ntsc-final/siloE.c create mode 100644 src/files/lang/ntsc-final/siloJ.c create mode 100644 src/files/lang/ntsc-final/siloP.c create mode 100644 src/files/lang/ntsc-final/silo_str_f.c create mode 100644 src/files/lang/ntsc-final/silo_str_g.c create mode 100644 src/files/lang/ntsc-final/silo_str_i.c create mode 100644 src/files/lang/ntsc-final/silo_str_s.c create mode 100644 src/files/lang/ntsc-final/statE.c create mode 100644 src/files/lang/ntsc-final/statJ.c create mode 100644 src/files/lang/ntsc-final/statP.c create mode 100644 src/files/lang/ntsc-final/stat_str_f.c create mode 100644 src/files/lang/ntsc-final/stat_str_g.c create mode 100644 src/files/lang/ntsc-final/stat_str_i.c create mode 100644 src/files/lang/ntsc-final/stat_str_s.c create mode 100644 src/files/lang/ntsc-final/titleE.c create mode 100644 src/files/lang/ntsc-final/titleJ.c create mode 100644 src/files/lang/ntsc-final/titleP.c create mode 100644 src/files/lang/ntsc-final/title_str_f.c create mode 100644 src/files/lang/ntsc-final/title_str_g.c create mode 100644 src/files/lang/ntsc-final/title_str_i.c create mode 100644 src/files/lang/ntsc-final/title_str_s.c create mode 100644 src/files/lang/ntsc-final/traE.c create mode 100644 src/files/lang/ntsc-final/traJ.c create mode 100644 src/files/lang/ntsc-final/traP.c create mode 100644 src/files/lang/ntsc-final/tra_str_f.c create mode 100644 src/files/lang/ntsc-final/tra_str_g.c create mode 100644 src/files/lang/ntsc-final/tra_str_i.c create mode 100644 src/files/lang/ntsc-final/tra_str_s.c create mode 100644 src/files/lang/ntsc-final/uffE.c create mode 100644 src/files/lang/ntsc-final/uffJ.c create mode 100644 src/files/lang/ntsc-final/uffP.c create mode 100644 src/files/lang/ntsc-final/uff_str_f.c create mode 100644 src/files/lang/ntsc-final/uff_str_g.c create mode 100644 src/files/lang/ntsc-final/uff_str_i.c create mode 100644 src/files/lang/ntsc-final/uff_str_s.c create mode 100644 src/files/lang/ntsc-final/waxE.c create mode 100644 src/files/lang/ntsc-final/waxJ.c create mode 100644 src/files/lang/ntsc-final/waxP.c create mode 100644 src/files/lang/ntsc-final/wax_str_f.c create mode 100644 src/files/lang/ntsc-final/wax_str_g.c create mode 100644 src/files/lang/ntsc-final/wax_str_i.c create mode 100644 src/files/lang/ntsc-final/wax_str_s.c create mode 100644 src/files/lang/pal-beta/ameE.c create mode 100644 src/files/lang/pal-beta/ameJ.c create mode 100644 src/files/lang/pal-beta/ameP.c create mode 100644 src/files/lang/pal-beta/ame_str_f.c create mode 100644 src/files/lang/pal-beta/ame_str_g.c create mode 100644 src/files/lang/pal-beta/ame_str_i.c create mode 100644 src/files/lang/pal-beta/ame_str_s.c create mode 100644 src/files/lang/pal-beta/archE.c create mode 100644 src/files/lang/pal-beta/archJ.c create mode 100644 src/files/lang/pal-beta/archP.c create mode 100644 src/files/lang/pal-beta/arch_str_f.c create mode 100644 src/files/lang/pal-beta/arch_str_g.c create mode 100644 src/files/lang/pal-beta/arch_str_i.c create mode 100644 src/files/lang/pal-beta/arch_str_s.c create mode 100644 src/files/lang/pal-beta/arecE.c create mode 100644 src/files/lang/pal-beta/arecJ.c create mode 100644 src/files/lang/pal-beta/arecP.c create mode 100644 src/files/lang/pal-beta/arec_str_f.c create mode 100644 src/files/lang/pal-beta/arec_str_g.c create mode 100644 src/files/lang/pal-beta/arec_str_i.c create mode 100644 src/files/lang/pal-beta/arec_str_s.c create mode 100644 src/files/lang/pal-beta/arkE.c create mode 100644 src/files/lang/pal-beta/arkJ.c create mode 100644 src/files/lang/pal-beta/arkP.c create mode 100644 src/files/lang/pal-beta/ark_str_f.c create mode 100644 src/files/lang/pal-beta/ark_str_g.c create mode 100644 src/files/lang/pal-beta/ark_str_i.c create mode 100644 src/files/lang/pal-beta/ark_str_s.c create mode 100644 src/files/lang/pal-beta/ashE.c create mode 100644 src/files/lang/pal-beta/ashJ.c create mode 100644 src/files/lang/pal-beta/ashP.c create mode 100644 src/files/lang/pal-beta/ash_str_f.c create mode 100644 src/files/lang/pal-beta/ash_str_g.c create mode 100644 src/files/lang/pal-beta/ash_str_i.c create mode 100644 src/files/lang/pal-beta/ash_str_s.c create mode 100644 src/files/lang/pal-beta/ateE.c create mode 100644 src/files/lang/pal-beta/ateJ.c create mode 100644 src/files/lang/pal-beta/ateP.c create mode 100644 src/files/lang/pal-beta/ate_str_f.c create mode 100644 src/files/lang/pal-beta/ate_str_g.c create mode 100644 src/files/lang/pal-beta/ate_str_i.c create mode 100644 src/files/lang/pal-beta/ate_str_s.c create mode 100644 src/files/lang/pal-beta/aztE.c create mode 100644 src/files/lang/pal-beta/aztJ.c create mode 100644 src/files/lang/pal-beta/aztP.c create mode 100644 src/files/lang/pal-beta/azt_str_f.c create mode 100644 src/files/lang/pal-beta/azt_str_g.c create mode 100644 src/files/lang/pal-beta/azt_str_i.c create mode 100644 src/files/lang/pal-beta/azt_str_s.c create mode 100644 src/files/lang/pal-beta/catE.c create mode 100644 src/files/lang/pal-beta/catJ.c create mode 100644 src/files/lang/pal-beta/catP.c create mode 100644 src/files/lang/pal-beta/cat_str_f.c create mode 100644 src/files/lang/pal-beta/cat_str_g.c create mode 100644 src/files/lang/pal-beta/cat_str_i.c create mode 100644 src/files/lang/pal-beta/cat_str_s.c create mode 100644 src/files/lang/pal-beta/caveE.c create mode 100644 src/files/lang/pal-beta/caveJ.c create mode 100644 src/files/lang/pal-beta/caveP.c create mode 100644 src/files/lang/pal-beta/cave_str_f.c create mode 100644 src/files/lang/pal-beta/cave_str_g.c create mode 100644 src/files/lang/pal-beta/cave_str_i.c create mode 100644 src/files/lang/pal-beta/cave_str_s.c create mode 100644 src/files/lang/pal-beta/cradE.c create mode 100644 src/files/lang/pal-beta/cradJ.c create mode 100644 src/files/lang/pal-beta/cradP.c create mode 100644 src/files/lang/pal-beta/crad_str_f.c create mode 100644 src/files/lang/pal-beta/crad_str_g.c create mode 100644 src/files/lang/pal-beta/crad_str_i.c create mode 100644 src/files/lang/pal-beta/crad_str_s.c create mode 100644 src/files/lang/pal-beta/crypE.c create mode 100644 src/files/lang/pal-beta/crypJ.c create mode 100644 src/files/lang/pal-beta/crypP.c create mode 100644 src/files/lang/pal-beta/cryp_str_f.c create mode 100644 src/files/lang/pal-beta/cryp_str_g.c create mode 100644 src/files/lang/pal-beta/cryp_str_i.c create mode 100644 src/files/lang/pal-beta/cryp_str_s.c create mode 100644 src/files/lang/pal-beta/damE.c create mode 100644 src/files/lang/pal-beta/damJ.c create mode 100644 src/files/lang/pal-beta/damP.c create mode 100644 src/files/lang/pal-beta/dam_str_f.c create mode 100644 src/files/lang/pal-beta/dam_str_g.c create mode 100644 src/files/lang/pal-beta/dam_str_i.c create mode 100644 src/files/lang/pal-beta/dam_str_s.c create mode 100644 src/files/lang/pal-beta/depoE.c create mode 100644 src/files/lang/pal-beta/depoJ.c create mode 100644 src/files/lang/pal-beta/depoP.c create mode 100644 src/files/lang/pal-beta/depo_str_f.c create mode 100644 src/files/lang/pal-beta/depo_str_g.c create mode 100644 src/files/lang/pal-beta/depo_str_i.c create mode 100644 src/files/lang/pal-beta/depo_str_s.c create mode 100644 src/files/lang/pal-beta/destE.c create mode 100644 src/files/lang/pal-beta/destJ.c create mode 100644 src/files/lang/pal-beta/destP.c create mode 100644 src/files/lang/pal-beta/dest_str_f.c create mode 100644 src/files/lang/pal-beta/dest_str_g.c create mode 100644 src/files/lang/pal-beta/dest_str_i.c create mode 100644 src/files/lang/pal-beta/dest_str_s.c create mode 100644 src/files/lang/pal-beta/dishE.c create mode 100644 src/files/lang/pal-beta/dishJ.c create mode 100644 src/files/lang/pal-beta/dishP.c create mode 100644 src/files/lang/pal-beta/dish_str_f.c create mode 100644 src/files/lang/pal-beta/dish_str_g.c create mode 100644 src/files/lang/pal-beta/dish_str_i.c create mode 100644 src/files/lang/pal-beta/dish_str_s.c create mode 100644 src/files/lang/pal-beta/earE.c create mode 100644 src/files/lang/pal-beta/earJ.c create mode 100644 src/files/lang/pal-beta/earP.c create mode 100644 src/files/lang/pal-beta/ear_str_f.c create mode 100644 src/files/lang/pal-beta/ear_str_g.c create mode 100644 src/files/lang/pal-beta/ear_str_i.c create mode 100644 src/files/lang/pal-beta/ear_str_s.c create mode 100644 src/files/lang/pal-beta/eldE.c create mode 100644 src/files/lang/pal-beta/eldJ.c create mode 100644 src/files/lang/pal-beta/eldP.c create mode 100644 src/files/lang/pal-beta/eld_str_f.c create mode 100644 src/files/lang/pal-beta/eld_str_g.c create mode 100644 src/files/lang/pal-beta/eld_str_i.c create mode 100644 src/files/lang/pal-beta/eld_str_s.c create mode 100644 src/files/lang/pal-beta/gunE.c create mode 100644 src/files/lang/pal-beta/gunJ.c create mode 100644 src/files/lang/pal-beta/gunP.c create mode 100644 src/files/lang/pal-beta/gun_str_f.c create mode 100644 src/files/lang/pal-beta/gun_str_g.c create mode 100644 src/files/lang/pal-beta/gun_str_i.c create mode 100644 src/files/lang/pal-beta/gun_str_s.c create mode 100644 src/files/lang/pal-beta/impE.c create mode 100644 src/files/lang/pal-beta/impJ.c create mode 100644 src/files/lang/pal-beta/impP.c create mode 100644 src/files/lang/pal-beta/imp_str_f.c create mode 100644 src/files/lang/pal-beta/imp_str_g.c create mode 100644 src/files/lang/pal-beta/imp_str_i.c create mode 100644 src/files/lang/pal-beta/imp_str_s.c create mode 100644 src/files/lang/pal-beta/junE.c create mode 100644 src/files/lang/pal-beta/junJ.c create mode 100644 src/files/lang/pal-beta/junP.c create mode 100644 src/files/lang/pal-beta/jun_str_f.c create mode 100644 src/files/lang/pal-beta/jun_str_g.c create mode 100644 src/files/lang/pal-beta/jun_str_i.c create mode 100644 src/files/lang/pal-beta/jun_str_s.c create mode 100644 src/files/lang/pal-beta/lamE.c create mode 100644 src/files/lang/pal-beta/lamJ.c create mode 100644 src/files/lang/pal-beta/lamP.c create mode 100644 src/files/lang/pal-beta/lam_str_f.c create mode 100644 src/files/lang/pal-beta/lam_str_g.c create mode 100644 src/files/lang/pal-beta/lam_str_i.c create mode 100644 src/files/lang/pal-beta/lam_str_s.c create mode 100644 src/files/lang/pal-beta/leeE.c create mode 100644 src/files/lang/pal-beta/leeJ.c create mode 100644 src/files/lang/pal-beta/leeP.c create mode 100644 src/files/lang/pal-beta/lee_str_f.c create mode 100644 src/files/lang/pal-beta/lee_str_g.c create mode 100644 src/files/lang/pal-beta/lee_str_i.c create mode 100644 src/files/lang/pal-beta/lee_str_s.c create mode 100644 src/files/lang/pal-beta/lenE.c create mode 100644 src/files/lang/pal-beta/lenJ.c create mode 100644 src/files/lang/pal-beta/lenP.c create mode 100644 src/files/lang/pal-beta/len_str_f.c create mode 100644 src/files/lang/pal-beta/len_str_g.c create mode 100644 src/files/lang/pal-beta/len_str_i.c create mode 100644 src/files/lang/pal-beta/len_str_s.c create mode 100644 src/files/lang/pal-beta/lipE.c create mode 100644 src/files/lang/pal-beta/lipJ.c create mode 100644 src/files/lang/pal-beta/lipP.c create mode 100644 src/files/lang/pal-beta/lip_str_f.c create mode 100644 src/files/lang/pal-beta/lip_str_g.c create mode 100644 src/files/lang/pal-beta/lip_str_i.c create mode 100644 src/files/lang/pal-beta/lip_str_s.c create mode 100644 src/files/lang/pal-beta/lueE.c create mode 100644 src/files/lang/pal-beta/lueJ.c create mode 100644 src/files/lang/pal-beta/lueP.c create mode 100644 src/files/lang/pal-beta/lue_str_f.c create mode 100644 src/files/lang/pal-beta/lue_str_g.c create mode 100644 src/files/lang/pal-beta/lue_str_i.c create mode 100644 src/files/lang/pal-beta/lue_str_s.c create mode 100644 src/files/lang/pal-beta/miscE.c create mode 100644 src/files/lang/pal-beta/miscJ.c create mode 100644 src/files/lang/pal-beta/miscP.c create mode 100644 src/files/lang/pal-beta/misc_str_f.c create mode 100644 src/files/lang/pal-beta/misc_str_g.c create mode 100644 src/files/lang/pal-beta/misc_str_i.c create mode 100644 src/files/lang/pal-beta/misc_str_s.c create mode 100644 src/files/lang/pal-beta/mp10E.c create mode 100644 src/files/lang/pal-beta/mp10J.c create mode 100644 src/files/lang/pal-beta/mp10P.c create mode 100644 src/files/lang/pal-beta/mp10_str_f.c create mode 100644 src/files/lang/pal-beta/mp10_str_g.c create mode 100644 src/files/lang/pal-beta/mp10_str_i.c create mode 100644 src/files/lang/pal-beta/mp10_str_s.c create mode 100644 src/files/lang/pal-beta/mp11E.c create mode 100644 src/files/lang/pal-beta/mp11J.c create mode 100644 src/files/lang/pal-beta/mp11P.c create mode 100644 src/files/lang/pal-beta/mp11_str_f.c create mode 100644 src/files/lang/pal-beta/mp11_str_g.c create mode 100644 src/files/lang/pal-beta/mp11_str_i.c create mode 100644 src/files/lang/pal-beta/mp11_str_s.c create mode 100644 src/files/lang/pal-beta/mp12E.c create mode 100644 src/files/lang/pal-beta/mp12J.c create mode 100644 src/files/lang/pal-beta/mp12P.c create mode 100644 src/files/lang/pal-beta/mp12_str_f.c create mode 100644 src/files/lang/pal-beta/mp12_str_g.c create mode 100644 src/files/lang/pal-beta/mp12_str_i.c create mode 100644 src/files/lang/pal-beta/mp12_str_s.c create mode 100644 src/files/lang/pal-beta/mp13E.c create mode 100644 src/files/lang/pal-beta/mp13J.c create mode 100644 src/files/lang/pal-beta/mp13P.c create mode 100644 src/files/lang/pal-beta/mp13_str_f.c create mode 100644 src/files/lang/pal-beta/mp13_str_g.c create mode 100644 src/files/lang/pal-beta/mp13_str_i.c create mode 100644 src/files/lang/pal-beta/mp13_str_s.c create mode 100644 src/files/lang/pal-beta/mp14E.c create mode 100644 src/files/lang/pal-beta/mp14J.c create mode 100644 src/files/lang/pal-beta/mp14P.c create mode 100644 src/files/lang/pal-beta/mp14_str_f.c create mode 100644 src/files/lang/pal-beta/mp14_str_g.c create mode 100644 src/files/lang/pal-beta/mp14_str_i.c create mode 100644 src/files/lang/pal-beta/mp14_str_s.c create mode 100644 src/files/lang/pal-beta/mp15E.c create mode 100644 src/files/lang/pal-beta/mp15J.c create mode 100644 src/files/lang/pal-beta/mp15P.c create mode 100644 src/files/lang/pal-beta/mp15_str_f.c create mode 100644 src/files/lang/pal-beta/mp15_str_g.c create mode 100644 src/files/lang/pal-beta/mp15_str_i.c create mode 100644 src/files/lang/pal-beta/mp15_str_s.c create mode 100644 src/files/lang/pal-beta/mp16E.c create mode 100644 src/files/lang/pal-beta/mp16J.c create mode 100644 src/files/lang/pal-beta/mp16P.c create mode 100644 src/files/lang/pal-beta/mp16_str_f.c create mode 100644 src/files/lang/pal-beta/mp16_str_g.c create mode 100644 src/files/lang/pal-beta/mp16_str_i.c create mode 100644 src/files/lang/pal-beta/mp16_str_s.c create mode 100644 src/files/lang/pal-beta/mp17E.c create mode 100644 src/files/lang/pal-beta/mp17J.c create mode 100644 src/files/lang/pal-beta/mp17P.c create mode 100644 src/files/lang/pal-beta/mp17_str_f.c create mode 100644 src/files/lang/pal-beta/mp17_str_g.c create mode 100644 src/files/lang/pal-beta/mp17_str_i.c create mode 100644 src/files/lang/pal-beta/mp17_str_s.c create mode 100644 src/files/lang/pal-beta/mp18E.c create mode 100644 src/files/lang/pal-beta/mp18J.c create mode 100644 src/files/lang/pal-beta/mp18P.c create mode 100644 src/files/lang/pal-beta/mp18_str_f.c create mode 100644 src/files/lang/pal-beta/mp18_str_g.c create mode 100644 src/files/lang/pal-beta/mp18_str_i.c create mode 100644 src/files/lang/pal-beta/mp18_str_s.c create mode 100644 src/files/lang/pal-beta/mp19E.c create mode 100644 src/files/lang/pal-beta/mp19J.c create mode 100644 src/files/lang/pal-beta/mp19P.c create mode 100644 src/files/lang/pal-beta/mp19_str_f.c create mode 100644 src/files/lang/pal-beta/mp19_str_g.c create mode 100644 src/files/lang/pal-beta/mp19_str_i.c create mode 100644 src/files/lang/pal-beta/mp19_str_s.c create mode 100644 src/files/lang/pal-beta/mp1E.c create mode 100644 src/files/lang/pal-beta/mp1J.c create mode 100644 src/files/lang/pal-beta/mp1P.c create mode 100644 src/files/lang/pal-beta/mp1_str_f.c create mode 100644 src/files/lang/pal-beta/mp1_str_g.c create mode 100644 src/files/lang/pal-beta/mp1_str_i.c create mode 100644 src/files/lang/pal-beta/mp1_str_s.c create mode 100644 src/files/lang/pal-beta/mp20E.c create mode 100644 src/files/lang/pal-beta/mp20J.c create mode 100644 src/files/lang/pal-beta/mp20P.c create mode 100644 src/files/lang/pal-beta/mp20_str_f.c create mode 100644 src/files/lang/pal-beta/mp20_str_g.c create mode 100644 src/files/lang/pal-beta/mp20_str_i.c create mode 100644 src/files/lang/pal-beta/mp20_str_s.c create mode 100644 src/files/lang/pal-beta/mp2E.c create mode 100644 src/files/lang/pal-beta/mp2J.c create mode 100644 src/files/lang/pal-beta/mp2P.c create mode 100644 src/files/lang/pal-beta/mp2_str_f.c create mode 100644 src/files/lang/pal-beta/mp2_str_g.c create mode 100644 src/files/lang/pal-beta/mp2_str_i.c create mode 100644 src/files/lang/pal-beta/mp2_str_s.c create mode 100644 src/files/lang/pal-beta/mp3E.c create mode 100644 src/files/lang/pal-beta/mp3J.c create mode 100644 src/files/lang/pal-beta/mp3P.c create mode 100644 src/files/lang/pal-beta/mp3_str_f.c create mode 100644 src/files/lang/pal-beta/mp3_str_g.c create mode 100644 src/files/lang/pal-beta/mp3_str_i.c create mode 100644 src/files/lang/pal-beta/mp3_str_s.c create mode 100644 src/files/lang/pal-beta/mp4E.c create mode 100644 src/files/lang/pal-beta/mp4J.c create mode 100644 src/files/lang/pal-beta/mp4P.c create mode 100644 src/files/lang/pal-beta/mp4_str_f.c create mode 100644 src/files/lang/pal-beta/mp4_str_g.c create mode 100644 src/files/lang/pal-beta/mp4_str_i.c create mode 100644 src/files/lang/pal-beta/mp4_str_s.c create mode 100644 src/files/lang/pal-beta/mp5E.c create mode 100644 src/files/lang/pal-beta/mp5J.c create mode 100644 src/files/lang/pal-beta/mp5P.c create mode 100644 src/files/lang/pal-beta/mp5_str_f.c create mode 100644 src/files/lang/pal-beta/mp5_str_g.c create mode 100644 src/files/lang/pal-beta/mp5_str_i.c create mode 100644 src/files/lang/pal-beta/mp5_str_s.c create mode 100644 src/files/lang/pal-beta/mp6E.c create mode 100644 src/files/lang/pal-beta/mp6J.c create mode 100644 src/files/lang/pal-beta/mp6P.c create mode 100644 src/files/lang/pal-beta/mp6_str_f.c create mode 100644 src/files/lang/pal-beta/mp6_str_g.c create mode 100644 src/files/lang/pal-beta/mp6_str_i.c create mode 100644 src/files/lang/pal-beta/mp6_str_s.c create mode 100644 src/files/lang/pal-beta/mp7E.c create mode 100644 src/files/lang/pal-beta/mp7J.c create mode 100644 src/files/lang/pal-beta/mp7P.c create mode 100644 src/files/lang/pal-beta/mp7_str_f.c create mode 100644 src/files/lang/pal-beta/mp7_str_g.c create mode 100644 src/files/lang/pal-beta/mp7_str_i.c create mode 100644 src/files/lang/pal-beta/mp7_str_s.c create mode 100644 src/files/lang/pal-beta/mp8E.c create mode 100644 src/files/lang/pal-beta/mp8J.c create mode 100644 src/files/lang/pal-beta/mp8P.c create mode 100644 src/files/lang/pal-beta/mp8_str_f.c create mode 100644 src/files/lang/pal-beta/mp8_str_g.c create mode 100644 src/files/lang/pal-beta/mp8_str_i.c create mode 100644 src/files/lang/pal-beta/mp8_str_s.c create mode 100644 src/files/lang/pal-beta/mp9E.c create mode 100644 src/files/lang/pal-beta/mp9J.c create mode 100644 src/files/lang/pal-beta/mp9P.c create mode 100644 src/files/lang/pal-beta/mp9_str_f.c create mode 100644 src/files/lang/pal-beta/mp9_str_g.c create mode 100644 src/files/lang/pal-beta/mp9_str_i.c create mode 100644 src/files/lang/pal-beta/mp9_str_s.c create mode 100644 src/files/lang/pal-beta/mpmenuE.c create mode 100644 src/files/lang/pal-beta/mpmenuJ.c create mode 100644 src/files/lang/pal-beta/mpmenuP.c create mode 100644 src/files/lang/pal-beta/mpmenu_str_f.c create mode 100644 src/files/lang/pal-beta/mpmenu_str_g.c create mode 100644 src/files/lang/pal-beta/mpmenu_str_i.c create mode 100644 src/files/lang/pal-beta/mpmenu_str_s.c create mode 100644 src/files/lang/pal-beta/mpweaponsE.c create mode 100644 src/files/lang/pal-beta/mpweaponsJ.c create mode 100644 src/files/lang/pal-beta/mpweaponsP.c create mode 100644 src/files/lang/pal-beta/mpweapons_str_f.c create mode 100644 src/files/lang/pal-beta/mpweapons_str_g.c create mode 100644 src/files/lang/pal-beta/mpweapons_str_i.c create mode 100644 src/files/lang/pal-beta/mpweapons_str_s.c create mode 100644 src/files/lang/pal-beta/oatE.c create mode 100644 src/files/lang/pal-beta/oatJ.c create mode 100644 src/files/lang/pal-beta/oatP.c create mode 100644 src/files/lang/pal-beta/oat_str_f.c create mode 100644 src/files/lang/pal-beta/oat_str_g.c create mode 100644 src/files/lang/pal-beta/oat_str_i.c create mode 100644 src/files/lang/pal-beta/oat_str_s.c create mode 100644 src/files/lang/pal-beta/oldE.c create mode 100644 src/files/lang/pal-beta/oldJ.c create mode 100644 src/files/lang/pal-beta/oldP.c create mode 100644 src/files/lang/pal-beta/old_str_f.c create mode 100644 src/files/lang/pal-beta/old_str_g.c create mode 100644 src/files/lang/pal-beta/old_str_i.c create mode 100644 src/files/lang/pal-beta/old_str_s.c create mode 100644 src/files/lang/pal-beta/optionsE.c create mode 100644 src/files/lang/pal-beta/optionsJ.c create mode 100644 src/files/lang/pal-beta/optionsP.c create mode 100644 src/files/lang/pal-beta/options_str_f.c create mode 100644 src/files/lang/pal-beta/options_str_g.c create mode 100644 src/files/lang/pal-beta/options_str_i.c create mode 100644 src/files/lang/pal-beta/options_str_s.c create mode 100644 src/files/lang/pal-beta/pamE.c create mode 100644 src/files/lang/pal-beta/pamJ.c create mode 100644 src/files/lang/pal-beta/pamP.c create mode 100644 src/files/lang/pal-beta/pam_str_f.c create mode 100644 src/files/lang/pal-beta/pam_str_g.c create mode 100644 src/files/lang/pal-beta/pam_str_i.c create mode 100644 src/files/lang/pal-beta/pam_str_s.c create mode 100644 src/files/lang/pal-beta/peteE.c create mode 100644 src/files/lang/pal-beta/peteJ.c create mode 100644 src/files/lang/pal-beta/peteP.c create mode 100644 src/files/lang/pal-beta/pete_str_f.c create mode 100644 src/files/lang/pal-beta/pete_str_g.c create mode 100644 src/files/lang/pal-beta/pete_str_i.c create mode 100644 src/files/lang/pal-beta/pete_str_s.c create mode 100644 src/files/lang/pal-beta/propobjE.c create mode 100644 src/files/lang/pal-beta/propobjJ.c create mode 100644 src/files/lang/pal-beta/propobjP.c create mode 100644 src/files/lang/pal-beta/propobj_str_f.c create mode 100644 src/files/lang/pal-beta/propobj_str_g.c create mode 100644 src/files/lang/pal-beta/propobj_str_i.c create mode 100644 src/files/lang/pal-beta/propobj_str_s.c create mode 100644 src/files/lang/pal-beta/refE.c create mode 100644 src/files/lang/pal-beta/refJ.c create mode 100644 src/files/lang/pal-beta/refP.c create mode 100644 src/files/lang/pal-beta/ref_str_f.c create mode 100644 src/files/lang/pal-beta/ref_str_g.c create mode 100644 src/files/lang/pal-beta/ref_str_i.c create mode 100644 src/files/lang/pal-beta/ref_str_s.c create mode 100644 src/files/lang/pal-beta/ritE.c create mode 100644 src/files/lang/pal-beta/ritJ.c create mode 100644 src/files/lang/pal-beta/ritP.c create mode 100644 src/files/lang/pal-beta/rit_str_f.c create mode 100644 src/files/lang/pal-beta/rit_str_g.c create mode 100644 src/files/lang/pal-beta/rit_str_i.c create mode 100644 src/files/lang/pal-beta/rit_str_s.c create mode 100644 src/files/lang/pal-beta/runE.c create mode 100644 src/files/lang/pal-beta/runJ.c create mode 100644 src/files/lang/pal-beta/runP.c create mode 100644 src/files/lang/pal-beta/run_str_f.c create mode 100644 src/files/lang/pal-beta/run_str_g.c create mode 100644 src/files/lang/pal-beta/run_str_i.c create mode 100644 src/files/lang/pal-beta/run_str_s.c create mode 100644 src/files/lang/pal-beta/sevE.c create mode 100644 src/files/lang/pal-beta/sevJ.c create mode 100644 src/files/lang/pal-beta/sevP.c create mode 100644 src/files/lang/pal-beta/sev_str_f.c create mode 100644 src/files/lang/pal-beta/sev_str_g.c create mode 100644 src/files/lang/pal-beta/sev_str_i.c create mode 100644 src/files/lang/pal-beta/sev_str_s.c create mode 100644 src/files/lang/pal-beta/sevbE.c create mode 100644 src/files/lang/pal-beta/sevbJ.c create mode 100644 src/files/lang/pal-beta/sevbP.c create mode 100644 src/files/lang/pal-beta/sevb_str_f.c create mode 100644 src/files/lang/pal-beta/sevb_str_g.c create mode 100644 src/files/lang/pal-beta/sevb_str_i.c create mode 100644 src/files/lang/pal-beta/sevb_str_s.c create mode 100644 src/files/lang/pal-beta/sevxE.c create mode 100644 src/files/lang/pal-beta/sevxJ.c create mode 100644 src/files/lang/pal-beta/sevxP.c create mode 100644 src/files/lang/pal-beta/sevx_str_f.c create mode 100644 src/files/lang/pal-beta/sevx_str_g.c create mode 100644 src/files/lang/pal-beta/sevx_str_i.c create mode 100644 src/files/lang/pal-beta/sevx_str_s.c create mode 100644 src/files/lang/pal-beta/sevxbE.c create mode 100644 src/files/lang/pal-beta/sevxbJ.c create mode 100644 src/files/lang/pal-beta/sevxbP.c create mode 100644 src/files/lang/pal-beta/sevxb_str_f.c create mode 100644 src/files/lang/pal-beta/sevxb_str_g.c create mode 100644 src/files/lang/pal-beta/sevxb_str_i.c create mode 100644 src/files/lang/pal-beta/sevxb_str_s.c create mode 100644 src/files/lang/pal-beta/shoE.c create mode 100644 src/files/lang/pal-beta/shoJ.c create mode 100644 src/files/lang/pal-beta/shoP.c create mode 100644 src/files/lang/pal-beta/sho_str_f.c create mode 100644 src/files/lang/pal-beta/sho_str_g.c create mode 100644 src/files/lang/pal-beta/sho_str_i.c create mode 100644 src/files/lang/pal-beta/sho_str_s.c create mode 100644 src/files/lang/pal-beta/siloE.c create mode 100644 src/files/lang/pal-beta/siloJ.c create mode 100644 src/files/lang/pal-beta/siloP.c create mode 100644 src/files/lang/pal-beta/silo_str_f.c create mode 100644 src/files/lang/pal-beta/silo_str_g.c create mode 100644 src/files/lang/pal-beta/silo_str_i.c create mode 100644 src/files/lang/pal-beta/silo_str_s.c create mode 100644 src/files/lang/pal-beta/statE.c create mode 100644 src/files/lang/pal-beta/statJ.c create mode 100644 src/files/lang/pal-beta/statP.c create mode 100644 src/files/lang/pal-beta/stat_str_f.c create mode 100644 src/files/lang/pal-beta/stat_str_g.c create mode 100644 src/files/lang/pal-beta/stat_str_i.c create mode 100644 src/files/lang/pal-beta/stat_str_s.c create mode 100644 src/files/lang/pal-beta/titleE.c create mode 100644 src/files/lang/pal-beta/titleJ.c create mode 100644 src/files/lang/pal-beta/titleP.c create mode 100644 src/files/lang/pal-beta/title_str_f.c create mode 100644 src/files/lang/pal-beta/title_str_g.c create mode 100644 src/files/lang/pal-beta/title_str_i.c create mode 100644 src/files/lang/pal-beta/title_str_s.c create mode 100644 src/files/lang/pal-beta/traE.c create mode 100644 src/files/lang/pal-beta/traJ.c create mode 100644 src/files/lang/pal-beta/traP.c create mode 100644 src/files/lang/pal-beta/tra_str_f.c create mode 100644 src/files/lang/pal-beta/tra_str_g.c create mode 100644 src/files/lang/pal-beta/tra_str_i.c create mode 100644 src/files/lang/pal-beta/tra_str_s.c create mode 100644 src/files/lang/pal-beta/uffE.c create mode 100644 src/files/lang/pal-beta/uffJ.c create mode 100644 src/files/lang/pal-beta/uffP.c create mode 100644 src/files/lang/pal-beta/uff_str_f.c create mode 100644 src/files/lang/pal-beta/uff_str_g.c create mode 100644 src/files/lang/pal-beta/uff_str_i.c create mode 100644 src/files/lang/pal-beta/uff_str_s.c create mode 100644 src/files/lang/pal-beta/waxE.c create mode 100644 src/files/lang/pal-beta/waxJ.c create mode 100644 src/files/lang/pal-beta/waxP.c create mode 100644 src/files/lang/pal-beta/wax_str_f.c create mode 100644 src/files/lang/pal-beta/wax_str_g.c create mode 100644 src/files/lang/pal-beta/wax_str_i.c create mode 100644 src/files/lang/pal-beta/wax_str_s.c create mode 100644 src/files/lang/pal-final/ameE.c create mode 100644 src/files/lang/pal-final/ameJ.c create mode 100644 src/files/lang/pal-final/ameP.c create mode 100644 src/files/lang/pal-final/ame_str_f.c create mode 100644 src/files/lang/pal-final/ame_str_g.c create mode 100644 src/files/lang/pal-final/ame_str_i.c create mode 100644 src/files/lang/pal-final/ame_str_s.c create mode 100644 src/files/lang/pal-final/archE.c create mode 100644 src/files/lang/pal-final/archJ.c create mode 100644 src/files/lang/pal-final/archP.c create mode 100644 src/files/lang/pal-final/arch_str_f.c create mode 100644 src/files/lang/pal-final/arch_str_g.c create mode 100644 src/files/lang/pal-final/arch_str_i.c create mode 100644 src/files/lang/pal-final/arch_str_s.c create mode 100644 src/files/lang/pal-final/arecE.c create mode 100644 src/files/lang/pal-final/arecJ.c create mode 100644 src/files/lang/pal-final/arecP.c create mode 100644 src/files/lang/pal-final/arec_str_f.c create mode 100644 src/files/lang/pal-final/arec_str_g.c create mode 100644 src/files/lang/pal-final/arec_str_i.c create mode 100644 src/files/lang/pal-final/arec_str_s.c create mode 100644 src/files/lang/pal-final/arkE.c create mode 100644 src/files/lang/pal-final/arkJ.c create mode 100644 src/files/lang/pal-final/arkP.c create mode 100644 src/files/lang/pal-final/ark_str_f.c create mode 100644 src/files/lang/pal-final/ark_str_g.c create mode 100644 src/files/lang/pal-final/ark_str_i.c create mode 100644 src/files/lang/pal-final/ark_str_s.c create mode 100644 src/files/lang/pal-final/ashE.c create mode 100644 src/files/lang/pal-final/ashJ.c create mode 100644 src/files/lang/pal-final/ashP.c create mode 100644 src/files/lang/pal-final/ash_str_f.c create mode 100644 src/files/lang/pal-final/ash_str_g.c create mode 100644 src/files/lang/pal-final/ash_str_i.c create mode 100644 src/files/lang/pal-final/ash_str_s.c create mode 100644 src/files/lang/pal-final/ateE.c create mode 100644 src/files/lang/pal-final/ateJ.c create mode 100644 src/files/lang/pal-final/ateP.c create mode 100644 src/files/lang/pal-final/ate_str_f.c create mode 100644 src/files/lang/pal-final/ate_str_g.c create mode 100644 src/files/lang/pal-final/ate_str_i.c create mode 100644 src/files/lang/pal-final/ate_str_s.c create mode 100644 src/files/lang/pal-final/aztE.c create mode 100644 src/files/lang/pal-final/aztJ.c create mode 100644 src/files/lang/pal-final/aztP.c create mode 100644 src/files/lang/pal-final/azt_str_f.c create mode 100644 src/files/lang/pal-final/azt_str_g.c create mode 100644 src/files/lang/pal-final/azt_str_i.c create mode 100644 src/files/lang/pal-final/azt_str_s.c create mode 100644 src/files/lang/pal-final/catE.c create mode 100644 src/files/lang/pal-final/catJ.c create mode 100644 src/files/lang/pal-final/catP.c create mode 100644 src/files/lang/pal-final/cat_str_f.c create mode 100644 src/files/lang/pal-final/cat_str_g.c create mode 100644 src/files/lang/pal-final/cat_str_i.c create mode 100644 src/files/lang/pal-final/cat_str_s.c create mode 100644 src/files/lang/pal-final/caveE.c create mode 100644 src/files/lang/pal-final/caveJ.c create mode 100644 src/files/lang/pal-final/caveP.c create mode 100644 src/files/lang/pal-final/cave_str_f.c create mode 100644 src/files/lang/pal-final/cave_str_g.c create mode 100644 src/files/lang/pal-final/cave_str_i.c create mode 100644 src/files/lang/pal-final/cave_str_s.c create mode 100644 src/files/lang/pal-final/cradE.c create mode 100644 src/files/lang/pal-final/cradJ.c create mode 100644 src/files/lang/pal-final/cradP.c create mode 100644 src/files/lang/pal-final/crad_str_f.c create mode 100644 src/files/lang/pal-final/crad_str_g.c create mode 100644 src/files/lang/pal-final/crad_str_i.c create mode 100644 src/files/lang/pal-final/crad_str_s.c create mode 100644 src/files/lang/pal-final/crypE.c create mode 100644 src/files/lang/pal-final/crypJ.c create mode 100644 src/files/lang/pal-final/crypP.c create mode 100644 src/files/lang/pal-final/cryp_str_f.c create mode 100644 src/files/lang/pal-final/cryp_str_g.c create mode 100644 src/files/lang/pal-final/cryp_str_i.c create mode 100644 src/files/lang/pal-final/cryp_str_s.c create mode 100644 src/files/lang/pal-final/damE.c create mode 100644 src/files/lang/pal-final/damJ.c create mode 100644 src/files/lang/pal-final/damP.c create mode 100644 src/files/lang/pal-final/dam_str_f.c create mode 100644 src/files/lang/pal-final/dam_str_g.c create mode 100644 src/files/lang/pal-final/dam_str_i.c create mode 100644 src/files/lang/pal-final/dam_str_s.c create mode 100644 src/files/lang/pal-final/depoE.c create mode 100644 src/files/lang/pal-final/depoJ.c create mode 100644 src/files/lang/pal-final/depoP.c create mode 100644 src/files/lang/pal-final/depo_str_f.c create mode 100644 src/files/lang/pal-final/depo_str_g.c create mode 100644 src/files/lang/pal-final/depo_str_i.c create mode 100644 src/files/lang/pal-final/depo_str_s.c create mode 100644 src/files/lang/pal-final/destE.c create mode 100644 src/files/lang/pal-final/destJ.c create mode 100644 src/files/lang/pal-final/destP.c create mode 100644 src/files/lang/pal-final/dest_str_f.c create mode 100644 src/files/lang/pal-final/dest_str_g.c create mode 100644 src/files/lang/pal-final/dest_str_i.c create mode 100644 src/files/lang/pal-final/dest_str_s.c create mode 100644 src/files/lang/pal-final/dishE.c create mode 100644 src/files/lang/pal-final/dishJ.c create mode 100644 src/files/lang/pal-final/dishP.c create mode 100644 src/files/lang/pal-final/dish_str_f.c create mode 100644 src/files/lang/pal-final/dish_str_g.c create mode 100644 src/files/lang/pal-final/dish_str_i.c create mode 100644 src/files/lang/pal-final/dish_str_s.c create mode 100644 src/files/lang/pal-final/earE.c create mode 100644 src/files/lang/pal-final/earJ.c create mode 100644 src/files/lang/pal-final/earP.c create mode 100644 src/files/lang/pal-final/ear_str_f.c create mode 100644 src/files/lang/pal-final/ear_str_g.c create mode 100644 src/files/lang/pal-final/ear_str_i.c create mode 100644 src/files/lang/pal-final/ear_str_s.c create mode 100644 src/files/lang/pal-final/eldE.c create mode 100644 src/files/lang/pal-final/eldJ.c create mode 100644 src/files/lang/pal-final/eldP.c create mode 100644 src/files/lang/pal-final/eld_str_f.c create mode 100644 src/files/lang/pal-final/eld_str_g.c create mode 100644 src/files/lang/pal-final/eld_str_i.c create mode 100644 src/files/lang/pal-final/eld_str_s.c create mode 100644 src/files/lang/pal-final/gunE.c create mode 100644 src/files/lang/pal-final/gunJ.c create mode 100644 src/files/lang/pal-final/gunP.c create mode 100644 src/files/lang/pal-final/gun_str_f.c create mode 100644 src/files/lang/pal-final/gun_str_g.c create mode 100644 src/files/lang/pal-final/gun_str_i.c create mode 100644 src/files/lang/pal-final/gun_str_s.c create mode 100644 src/files/lang/pal-final/impE.c create mode 100644 src/files/lang/pal-final/impJ.c create mode 100644 src/files/lang/pal-final/impP.c create mode 100644 src/files/lang/pal-final/imp_str_f.c create mode 100644 src/files/lang/pal-final/imp_str_g.c create mode 100644 src/files/lang/pal-final/imp_str_i.c create mode 100644 src/files/lang/pal-final/imp_str_s.c create mode 100644 src/files/lang/pal-final/junE.c create mode 100644 src/files/lang/pal-final/junJ.c create mode 100644 src/files/lang/pal-final/junP.c create mode 100644 src/files/lang/pal-final/jun_str_f.c create mode 100644 src/files/lang/pal-final/jun_str_g.c create mode 100644 src/files/lang/pal-final/jun_str_i.c create mode 100644 src/files/lang/pal-final/jun_str_s.c create mode 100644 src/files/lang/pal-final/lamE.c create mode 100644 src/files/lang/pal-final/lamJ.c create mode 100644 src/files/lang/pal-final/lamP.c create mode 100644 src/files/lang/pal-final/lam_str_f.c create mode 100644 src/files/lang/pal-final/lam_str_g.c create mode 100644 src/files/lang/pal-final/lam_str_i.c create mode 100644 src/files/lang/pal-final/lam_str_s.c create mode 100644 src/files/lang/pal-final/leeE.c create mode 100644 src/files/lang/pal-final/leeJ.c create mode 100644 src/files/lang/pal-final/leeP.c create mode 100644 src/files/lang/pal-final/lee_str_f.c create mode 100644 src/files/lang/pal-final/lee_str_g.c create mode 100644 src/files/lang/pal-final/lee_str_i.c create mode 100644 src/files/lang/pal-final/lee_str_s.c create mode 100644 src/files/lang/pal-final/lenE.c create mode 100644 src/files/lang/pal-final/lenJ.c create mode 100644 src/files/lang/pal-final/lenP.c create mode 100644 src/files/lang/pal-final/len_str_f.c create mode 100644 src/files/lang/pal-final/len_str_g.c create mode 100644 src/files/lang/pal-final/len_str_i.c create mode 100644 src/files/lang/pal-final/len_str_s.c create mode 100644 src/files/lang/pal-final/lipE.c create mode 100644 src/files/lang/pal-final/lipJ.c create mode 100644 src/files/lang/pal-final/lipP.c create mode 100644 src/files/lang/pal-final/lip_str_f.c create mode 100644 src/files/lang/pal-final/lip_str_g.c create mode 100644 src/files/lang/pal-final/lip_str_i.c create mode 100644 src/files/lang/pal-final/lip_str_s.c create mode 100644 src/files/lang/pal-final/lueE.c create mode 100644 src/files/lang/pal-final/lueJ.c create mode 100644 src/files/lang/pal-final/lueP.c create mode 100644 src/files/lang/pal-final/lue_str_f.c create mode 100644 src/files/lang/pal-final/lue_str_g.c create mode 100644 src/files/lang/pal-final/lue_str_i.c create mode 100644 src/files/lang/pal-final/lue_str_s.c create mode 100644 src/files/lang/pal-final/miscE.c create mode 100644 src/files/lang/pal-final/miscJ.c create mode 100644 src/files/lang/pal-final/miscP.c create mode 100644 src/files/lang/pal-final/misc_str_f.c create mode 100644 src/files/lang/pal-final/misc_str_g.c create mode 100644 src/files/lang/pal-final/misc_str_i.c create mode 100644 src/files/lang/pal-final/misc_str_s.c create mode 100644 src/files/lang/pal-final/mp10E.c create mode 100644 src/files/lang/pal-final/mp10J.c create mode 100644 src/files/lang/pal-final/mp10P.c create mode 100644 src/files/lang/pal-final/mp10_str_f.c create mode 100644 src/files/lang/pal-final/mp10_str_g.c create mode 100644 src/files/lang/pal-final/mp10_str_i.c create mode 100644 src/files/lang/pal-final/mp10_str_s.c create mode 100644 src/files/lang/pal-final/mp11E.c create mode 100644 src/files/lang/pal-final/mp11J.c create mode 100644 src/files/lang/pal-final/mp11P.c create mode 100644 src/files/lang/pal-final/mp11_str_f.c create mode 100644 src/files/lang/pal-final/mp11_str_g.c create mode 100644 src/files/lang/pal-final/mp11_str_i.c create mode 100644 src/files/lang/pal-final/mp11_str_s.c create mode 100644 src/files/lang/pal-final/mp12E.c create mode 100644 src/files/lang/pal-final/mp12J.c create mode 100644 src/files/lang/pal-final/mp12P.c create mode 100644 src/files/lang/pal-final/mp12_str_f.c create mode 100644 src/files/lang/pal-final/mp12_str_g.c create mode 100644 src/files/lang/pal-final/mp12_str_i.c create mode 100644 src/files/lang/pal-final/mp12_str_s.c create mode 100644 src/files/lang/pal-final/mp13E.c create mode 100644 src/files/lang/pal-final/mp13J.c create mode 100644 src/files/lang/pal-final/mp13P.c create mode 100644 src/files/lang/pal-final/mp13_str_f.c create mode 100644 src/files/lang/pal-final/mp13_str_g.c create mode 100644 src/files/lang/pal-final/mp13_str_i.c create mode 100644 src/files/lang/pal-final/mp13_str_s.c create mode 100644 src/files/lang/pal-final/mp14E.c create mode 100644 src/files/lang/pal-final/mp14J.c create mode 100644 src/files/lang/pal-final/mp14P.c create mode 100644 src/files/lang/pal-final/mp14_str_f.c create mode 100644 src/files/lang/pal-final/mp14_str_g.c create mode 100644 src/files/lang/pal-final/mp14_str_i.c create mode 100644 src/files/lang/pal-final/mp14_str_s.c create mode 100644 src/files/lang/pal-final/mp15E.c create mode 100644 src/files/lang/pal-final/mp15J.c create mode 100644 src/files/lang/pal-final/mp15P.c create mode 100644 src/files/lang/pal-final/mp15_str_f.c create mode 100644 src/files/lang/pal-final/mp15_str_g.c create mode 100644 src/files/lang/pal-final/mp15_str_i.c create mode 100644 src/files/lang/pal-final/mp15_str_s.c create mode 100644 src/files/lang/pal-final/mp16E.c create mode 100644 src/files/lang/pal-final/mp16J.c create mode 100644 src/files/lang/pal-final/mp16P.c create mode 100644 src/files/lang/pal-final/mp16_str_f.c create mode 100644 src/files/lang/pal-final/mp16_str_g.c create mode 100644 src/files/lang/pal-final/mp16_str_i.c create mode 100644 src/files/lang/pal-final/mp16_str_s.c create mode 100644 src/files/lang/pal-final/mp17E.c create mode 100644 src/files/lang/pal-final/mp17J.c create mode 100644 src/files/lang/pal-final/mp17P.c create mode 100644 src/files/lang/pal-final/mp17_str_f.c create mode 100644 src/files/lang/pal-final/mp17_str_g.c create mode 100644 src/files/lang/pal-final/mp17_str_i.c create mode 100644 src/files/lang/pal-final/mp17_str_s.c create mode 100644 src/files/lang/pal-final/mp18E.c create mode 100644 src/files/lang/pal-final/mp18J.c create mode 100644 src/files/lang/pal-final/mp18P.c create mode 100644 src/files/lang/pal-final/mp18_str_f.c create mode 100644 src/files/lang/pal-final/mp18_str_g.c create mode 100644 src/files/lang/pal-final/mp18_str_i.c create mode 100644 src/files/lang/pal-final/mp18_str_s.c create mode 100644 src/files/lang/pal-final/mp19E.c create mode 100644 src/files/lang/pal-final/mp19J.c create mode 100644 src/files/lang/pal-final/mp19P.c create mode 100644 src/files/lang/pal-final/mp19_str_f.c create mode 100644 src/files/lang/pal-final/mp19_str_g.c create mode 100644 src/files/lang/pal-final/mp19_str_i.c create mode 100644 src/files/lang/pal-final/mp19_str_s.c create mode 100644 src/files/lang/pal-final/mp1E.c create mode 100644 src/files/lang/pal-final/mp1J.c create mode 100644 src/files/lang/pal-final/mp1P.c create mode 100644 src/files/lang/pal-final/mp1_str_f.c create mode 100644 src/files/lang/pal-final/mp1_str_g.c create mode 100644 src/files/lang/pal-final/mp1_str_i.c create mode 100644 src/files/lang/pal-final/mp1_str_s.c create mode 100644 src/files/lang/pal-final/mp20E.c create mode 100644 src/files/lang/pal-final/mp20J.c create mode 100644 src/files/lang/pal-final/mp20P.c create mode 100644 src/files/lang/pal-final/mp20_str_f.c create mode 100644 src/files/lang/pal-final/mp20_str_g.c create mode 100644 src/files/lang/pal-final/mp20_str_i.c create mode 100644 src/files/lang/pal-final/mp20_str_s.c create mode 100644 src/files/lang/pal-final/mp2E.c create mode 100644 src/files/lang/pal-final/mp2J.c create mode 100644 src/files/lang/pal-final/mp2P.c create mode 100644 src/files/lang/pal-final/mp2_str_f.c create mode 100644 src/files/lang/pal-final/mp2_str_g.c create mode 100644 src/files/lang/pal-final/mp2_str_i.c create mode 100644 src/files/lang/pal-final/mp2_str_s.c create mode 100644 src/files/lang/pal-final/mp3E.c create mode 100644 src/files/lang/pal-final/mp3J.c create mode 100644 src/files/lang/pal-final/mp3P.c create mode 100644 src/files/lang/pal-final/mp3_str_f.c create mode 100644 src/files/lang/pal-final/mp3_str_g.c create mode 100644 src/files/lang/pal-final/mp3_str_i.c create mode 100644 src/files/lang/pal-final/mp3_str_s.c create mode 100644 src/files/lang/pal-final/mp4E.c create mode 100644 src/files/lang/pal-final/mp4J.c create mode 100644 src/files/lang/pal-final/mp4P.c create mode 100644 src/files/lang/pal-final/mp4_str_f.c create mode 100644 src/files/lang/pal-final/mp4_str_g.c create mode 100644 src/files/lang/pal-final/mp4_str_i.c create mode 100644 src/files/lang/pal-final/mp4_str_s.c create mode 100644 src/files/lang/pal-final/mp5E.c create mode 100644 src/files/lang/pal-final/mp5J.c create mode 100644 src/files/lang/pal-final/mp5P.c create mode 100644 src/files/lang/pal-final/mp5_str_f.c create mode 100644 src/files/lang/pal-final/mp5_str_g.c create mode 100644 src/files/lang/pal-final/mp5_str_i.c create mode 100644 src/files/lang/pal-final/mp5_str_s.c create mode 100644 src/files/lang/pal-final/mp6E.c create mode 100644 src/files/lang/pal-final/mp6J.c create mode 100644 src/files/lang/pal-final/mp6P.c create mode 100644 src/files/lang/pal-final/mp6_str_f.c create mode 100644 src/files/lang/pal-final/mp6_str_g.c create mode 100644 src/files/lang/pal-final/mp6_str_i.c create mode 100644 src/files/lang/pal-final/mp6_str_s.c create mode 100644 src/files/lang/pal-final/mp7E.c create mode 100644 src/files/lang/pal-final/mp7J.c create mode 100644 src/files/lang/pal-final/mp7P.c create mode 100644 src/files/lang/pal-final/mp7_str_f.c create mode 100644 src/files/lang/pal-final/mp7_str_g.c create mode 100644 src/files/lang/pal-final/mp7_str_i.c create mode 100644 src/files/lang/pal-final/mp7_str_s.c create mode 100644 src/files/lang/pal-final/mp8E.c create mode 100644 src/files/lang/pal-final/mp8J.c create mode 100644 src/files/lang/pal-final/mp8P.c create mode 100644 src/files/lang/pal-final/mp8_str_f.c create mode 100644 src/files/lang/pal-final/mp8_str_g.c create mode 100644 src/files/lang/pal-final/mp8_str_i.c create mode 100644 src/files/lang/pal-final/mp8_str_s.c create mode 100644 src/files/lang/pal-final/mp9E.c create mode 100644 src/files/lang/pal-final/mp9J.c create mode 100644 src/files/lang/pal-final/mp9P.c create mode 100644 src/files/lang/pal-final/mp9_str_f.c create mode 100644 src/files/lang/pal-final/mp9_str_g.c create mode 100644 src/files/lang/pal-final/mp9_str_i.c create mode 100644 src/files/lang/pal-final/mp9_str_s.c create mode 100644 src/files/lang/pal-final/mpmenuE.c create mode 100644 src/files/lang/pal-final/mpmenuJ.c create mode 100644 src/files/lang/pal-final/mpmenuP.c create mode 100644 src/files/lang/pal-final/mpmenu_str_f.c create mode 100644 src/files/lang/pal-final/mpmenu_str_g.c create mode 100644 src/files/lang/pal-final/mpmenu_str_i.c create mode 100644 src/files/lang/pal-final/mpmenu_str_s.c create mode 100644 src/files/lang/pal-final/mpweaponsE.c create mode 100644 src/files/lang/pal-final/mpweaponsJ.c create mode 100644 src/files/lang/pal-final/mpweaponsP.c create mode 100644 src/files/lang/pal-final/mpweapons_str_f.c create mode 100644 src/files/lang/pal-final/mpweapons_str_g.c create mode 100644 src/files/lang/pal-final/mpweapons_str_i.c create mode 100644 src/files/lang/pal-final/mpweapons_str_s.c create mode 100644 src/files/lang/pal-final/oatE.c create mode 100644 src/files/lang/pal-final/oatJ.c create mode 100644 src/files/lang/pal-final/oatP.c create mode 100644 src/files/lang/pal-final/oat_str_f.c create mode 100644 src/files/lang/pal-final/oat_str_g.c create mode 100644 src/files/lang/pal-final/oat_str_i.c create mode 100644 src/files/lang/pal-final/oat_str_s.c create mode 100644 src/files/lang/pal-final/oldE.c create mode 100644 src/files/lang/pal-final/oldJ.c create mode 100644 src/files/lang/pal-final/oldP.c create mode 100644 src/files/lang/pal-final/old_str_f.c create mode 100644 src/files/lang/pal-final/old_str_g.c create mode 100644 src/files/lang/pal-final/old_str_i.c create mode 100644 src/files/lang/pal-final/old_str_s.c create mode 100644 src/files/lang/pal-final/optionsE.c create mode 100644 src/files/lang/pal-final/optionsJ.c create mode 100644 src/files/lang/pal-final/optionsP.c create mode 100644 src/files/lang/pal-final/options_str_f.c create mode 100644 src/files/lang/pal-final/options_str_g.c create mode 100644 src/files/lang/pal-final/options_str_i.c create mode 100644 src/files/lang/pal-final/options_str_s.c create mode 100644 src/files/lang/pal-final/pamE.c create mode 100644 src/files/lang/pal-final/pamJ.c create mode 100644 src/files/lang/pal-final/pamP.c create mode 100644 src/files/lang/pal-final/pam_str_f.c create mode 100644 src/files/lang/pal-final/pam_str_g.c create mode 100644 src/files/lang/pal-final/pam_str_i.c create mode 100644 src/files/lang/pal-final/pam_str_s.c create mode 100644 src/files/lang/pal-final/peteE.c create mode 100644 src/files/lang/pal-final/peteJ.c create mode 100644 src/files/lang/pal-final/peteP.c create mode 100644 src/files/lang/pal-final/pete_str_f.c create mode 100644 src/files/lang/pal-final/pete_str_g.c create mode 100644 src/files/lang/pal-final/pete_str_i.c create mode 100644 src/files/lang/pal-final/pete_str_s.c create mode 100644 src/files/lang/pal-final/propobjE.c create mode 100644 src/files/lang/pal-final/propobjJ.c create mode 100644 src/files/lang/pal-final/propobjP.c create mode 100644 src/files/lang/pal-final/propobj_str_f.c create mode 100644 src/files/lang/pal-final/propobj_str_g.c create mode 100644 src/files/lang/pal-final/propobj_str_i.c create mode 100644 src/files/lang/pal-final/propobj_str_s.c create mode 100644 src/files/lang/pal-final/refE.c create mode 100644 src/files/lang/pal-final/refJ.c create mode 100644 src/files/lang/pal-final/refP.c create mode 100644 src/files/lang/pal-final/ref_str_f.c create mode 100644 src/files/lang/pal-final/ref_str_g.c create mode 100644 src/files/lang/pal-final/ref_str_i.c create mode 100644 src/files/lang/pal-final/ref_str_s.c create mode 100644 src/files/lang/pal-final/ritE.c create mode 100644 src/files/lang/pal-final/ritJ.c create mode 100644 src/files/lang/pal-final/ritP.c create mode 100644 src/files/lang/pal-final/rit_str_f.c create mode 100644 src/files/lang/pal-final/rit_str_g.c create mode 100644 src/files/lang/pal-final/rit_str_i.c create mode 100644 src/files/lang/pal-final/rit_str_s.c create mode 100644 src/files/lang/pal-final/runE.c create mode 100644 src/files/lang/pal-final/runJ.c create mode 100644 src/files/lang/pal-final/runP.c create mode 100644 src/files/lang/pal-final/run_str_f.c create mode 100644 src/files/lang/pal-final/run_str_g.c create mode 100644 src/files/lang/pal-final/run_str_i.c create mode 100644 src/files/lang/pal-final/run_str_s.c create mode 100644 src/files/lang/pal-final/sevE.c create mode 100644 src/files/lang/pal-final/sevJ.c create mode 100644 src/files/lang/pal-final/sevP.c create mode 100644 src/files/lang/pal-final/sev_str_f.c create mode 100644 src/files/lang/pal-final/sev_str_g.c create mode 100644 src/files/lang/pal-final/sev_str_i.c create mode 100644 src/files/lang/pal-final/sev_str_s.c create mode 100644 src/files/lang/pal-final/sevbE.c create mode 100644 src/files/lang/pal-final/sevbJ.c create mode 100644 src/files/lang/pal-final/sevbP.c create mode 100644 src/files/lang/pal-final/sevb_str_f.c create mode 100644 src/files/lang/pal-final/sevb_str_g.c create mode 100644 src/files/lang/pal-final/sevb_str_i.c create mode 100644 src/files/lang/pal-final/sevb_str_s.c create mode 100644 src/files/lang/pal-final/sevxE.c create mode 100644 src/files/lang/pal-final/sevxJ.c create mode 100644 src/files/lang/pal-final/sevxP.c create mode 100644 src/files/lang/pal-final/sevx_str_f.c create mode 100644 src/files/lang/pal-final/sevx_str_g.c create mode 100644 src/files/lang/pal-final/sevx_str_i.c create mode 100644 src/files/lang/pal-final/sevx_str_s.c create mode 100644 src/files/lang/pal-final/sevxbE.c create mode 100644 src/files/lang/pal-final/sevxbJ.c create mode 100644 src/files/lang/pal-final/sevxbP.c create mode 100644 src/files/lang/pal-final/sevxb_str_f.c create mode 100644 src/files/lang/pal-final/sevxb_str_g.c create mode 100644 src/files/lang/pal-final/sevxb_str_i.c create mode 100644 src/files/lang/pal-final/sevxb_str_s.c create mode 100644 src/files/lang/pal-final/shoE.c create mode 100644 src/files/lang/pal-final/shoJ.c create mode 100644 src/files/lang/pal-final/shoP.c create mode 100644 src/files/lang/pal-final/sho_str_f.c create mode 100644 src/files/lang/pal-final/sho_str_g.c create mode 100644 src/files/lang/pal-final/sho_str_i.c create mode 100644 src/files/lang/pal-final/sho_str_s.c create mode 100644 src/files/lang/pal-final/siloE.c create mode 100644 src/files/lang/pal-final/siloJ.c create mode 100644 src/files/lang/pal-final/siloP.c create mode 100644 src/files/lang/pal-final/silo_str_f.c create mode 100644 src/files/lang/pal-final/silo_str_g.c create mode 100644 src/files/lang/pal-final/silo_str_i.c create mode 100644 src/files/lang/pal-final/silo_str_s.c create mode 100644 src/files/lang/pal-final/statE.c create mode 100644 src/files/lang/pal-final/statJ.c create mode 100644 src/files/lang/pal-final/statP.c create mode 100644 src/files/lang/pal-final/stat_str_f.c create mode 100644 src/files/lang/pal-final/stat_str_g.c create mode 100644 src/files/lang/pal-final/stat_str_i.c create mode 100644 src/files/lang/pal-final/stat_str_s.c create mode 100644 src/files/lang/pal-final/titleE.c create mode 100644 src/files/lang/pal-final/titleJ.c create mode 100644 src/files/lang/pal-final/titleP.c create mode 100644 src/files/lang/pal-final/title_str_f.c create mode 100644 src/files/lang/pal-final/title_str_g.c create mode 100644 src/files/lang/pal-final/title_str_i.c create mode 100644 src/files/lang/pal-final/title_str_s.c create mode 100644 src/files/lang/pal-final/traE.c create mode 100644 src/files/lang/pal-final/traJ.c create mode 100644 src/files/lang/pal-final/traP.c create mode 100644 src/files/lang/pal-final/tra_str_f.c create mode 100644 src/files/lang/pal-final/tra_str_g.c create mode 100644 src/files/lang/pal-final/tra_str_i.c create mode 100644 src/files/lang/pal-final/tra_str_s.c create mode 100644 src/files/lang/pal-final/uffE.c create mode 100644 src/files/lang/pal-final/uffJ.c create mode 100644 src/files/lang/pal-final/uffP.c create mode 100644 src/files/lang/pal-final/uff_str_f.c create mode 100644 src/files/lang/pal-final/uff_str_g.c create mode 100644 src/files/lang/pal-final/uff_str_i.c create mode 100644 src/files/lang/pal-final/uff_str_s.c create mode 100644 src/files/lang/pal-final/waxE.c create mode 100644 src/files/lang/pal-final/waxJ.c create mode 100644 src/files/lang/pal-final/waxP.c create mode 100644 src/files/lang/pal-final/wax_str_f.c create mode 100644 src/files/lang/pal-final/wax_str_g.c create mode 100644 src/files/lang/pal-final/wax_str_i.c create mode 100644 src/files/lang/pal-final/wax_str_s.c diff --git a/Makefile b/Makefile index 1d55dd69c..ec88c2e49 100644 --- a/Makefile +++ b/Makefile @@ -67,7 +67,7 @@ CFLAGS := -DVERSION=$(VERSION) \ -I src/include \ -mips2 -C_FILES := $(shell find src -name '*.c') +C_FILES := $(shell find src/boot src/lib src/game src/inflate src/gvars -name '*.c') O_FILES := $(patsubst %.c, %.o, $(C_FILES)) ASSET_AUDIO_FILES := Arecep01M Arecep02M Arecep03M Arecep04M Arecep05M Arecep06M Arlguard1M Arltech01M Arltech02M Arltech03M Arltech04M Arltech05M Arltech06M Ascie2aM Ascie2bM Ascie2cM Ascie2dM Ascie2eM Ascie2fM Ascie2gM Ascie3aM Ascie3bM Ascie3cM Ascie3dM Ascie3eM Ascie3gM Ascien10aM Ascien2_aM Ascien3_aM Ascien4_aM Ascien5_aM Ascien6_aM Ascien7_aM Ascien9_aM AvilgrimM Awepgd01M Awepgd02M Awepgd03M Awepsc01M Awepsc02M Awepsc03M Aa51elv01M Aa51elv02M Aa51elv03M Aa51grd01M Aa51grd02M Aa51grd03M Aa51grd04M Aa51grd05M Aa51grd06M Aa51grd07M Aa51grd08M Aa51grd09M Aa51grd10M Aa51jo1M Aa51jo2M Aa51jo3M Aa51jo4M Aa51jo5M Aa51jo6M Aa51jon01M Aa51jon02M Aa51jon03M Aa51jon04M Aa51jon05M Aa51jon06M Aa51jon07M Aa51jon08M Aa51jon09M Aa51jon10M Aa51jon11M Aa51jon12M Aa51jon14M Aa51jon15M Aa51sci1M Aaf1jo01M Aaf1jo02M Aaf1jo03M Aaf1pr01M Aaf1pr02M Aaf1pr03M Aaf1pr04M Aaf1pr05M Aaf1pr06M Aaf1pr07M Aaf1pr08M Aaf1pr09M Aaf1pr10M Aaf1tr01M Aaf1tr02M Aaf1tr03M Aairbgd01M Aairbgd02M Aairbgd03M Aairbgd04M Aairbgd05M Aairbgd06M Aairbgd07M Aairbgd08M Aairbgd09M Aairbgd10M Aairbgd11M Aairbgd12M Aairbgd13M Aairbgd14M Aairbgd15M Aairbgd16M Aairstw01M Aairstw02M Aairstw03M Aassael01M Aassael02M Aassael03M Aassael04M Aassael05M Aassael06M Absewrk01M Absewrk02M Absewrk03M Absewrk04M Absewrk05M Acetael01M Achdroid1M Achdroid2M Acsec01M Acsec02M Acsec03M Acstan1M Acstan2M Adevr01M Adevr02M Adevr03M Adevr04M Adevr05M Adevr06M Adevr07M Adevr08M Adevr09M Adevr10M Adevr11M Adevr12M Aexec01M Aexec02M Aexec04M Aexec05M Aexec06M Aexec07M Aexec08M Aexec09M Aexec10M Aexec11M Aexec12M Aexec13M Aexec14M Ahelic01M Ahelic02M Ahelic03M Ahologd01M AholohopkM Ainvcar01M Ainvcar02M Ainvcar03M Ainvcar04M Ainvcar05M Ainvcar06M Ainvcar07M Ainvcar08M Ainvcar09M Ainvcar10M Ainvcar11M Ainvcar12M AinvfarrM AinvfemaM AinvfostM AinvgrimM AinvhopkM AinvmaleM Ajoexec01M Ajoexec02M Ajosci01M Ajosci02M Ajosci03M Alabacc1M Alabacc2M Alabacc3M Alabacc4M Alabacc5M Alabacc6M Alabtech1M Alabtech2M Alabtech3M Alabtech5M Alabtech6M Alabtech7M Alabtech8M Alabtech9M Aoffwrk01M Aoffwrk02M Aoffwrk03M Aoffwrk04M Am1_l1_aM Am1_l1_bM Am1_l1_cM Am1_l1_dM Am1_l2_aM Am1_l2_bM Am1_l2_cM Am1_l2_dM Am1_l3_aM Am1_l3_bM Am1_l3_cM Am1_l3_dM Am2_l1_aM Am2_l1_bM Am2_l1_cM Am2_l1_dM Am3_l1_aM Am3_l1_bM Am3_l1_cM Am3_l1_dM Am3_l2_aM Am3_l2_bM Am3_l2_cM Am3_l2_dM Am4_l1_aM Am4_l1_bM Am4_l1_cM Am4_l1_dM Am4_l2_aM Am4_l2_bM Am4_l2_cM Am4_l2_dM Am4_l3_aM Am4_l3_bM Am4_l3_cM Am4_l3_dM Am5_l1_aM Am5_l1_bM Am5_l1_cM Am5_l1_dM Am5_l2_aM Am5_l2_bM Am5_l2_cM Am5_l2_dM Am5_l3_aM Am5_l3_bM Am5_l3_cM Am5_l3_dM Am6_l1_aM Am6_l1_bM Am6_l1_cM Am6_l1_dM Am6_l2_aM Am6_l2_bM Am6_l2_cM Am6_l2_dM Am7_l1_aM Am7_l1_bM Am7_l1_cM Am7_l1_dM Am8_l1_aM Am8_l1_bM Am8_l1_cM Am8_l1_dM Am9_l1_aM Am9_l1_bM Am9_l1_cM Am9_l1_dM Ap1_01_joM Ap1_02_caM Ap1_03_joM Ap1_04_caM Ap1_05_joM Ap1_06_caM Ap1_07_joM Ap1_08_caM Ap2_01_joM Ap2_02_joM Ap2_03_drM Ap2_04_joM Ap2_05_joM Ap2_06_drM Ap2_07_drM Ap3_01_gdM Ap3_02_joM Ap3_03_joM Ap4_01_dvM Ap4_02_joM Ap4_03_dvM Ap4_04_joM Ap4_05_dvM Ap4_06_joM Ap4_07_blM Ap4_08_dvM Ap4_09_dvM Ap5_01_joM Ap5_02_joM Ap5_03_joM Ap6_01_joM Ap6_02_caM Ap6_03_joM Ap6_04_caM Ap6_05_joM Ap6_06_caM Ap7_01_caM Ap7_02_joM Ap7_03_caM Ap7_04_joM Ap8_01_dvM Ap8_02_blM Ap8_03_dvM Ap8_04_blM Ap8_06_blM Ap8_07_trM Ap8_08_dvM Ap8_09_trM Ap8_10_blM Ap9_01_joM Ap9_02_caM Ap9_03_joM Ap10_01_caM Ap10_02_caM Ap10_03_caM Ap10_04_caM Ap10_05_joM Ap10_06_caM Ap10_07_joM Ap10_08_caM Ap10_09_joM Ap11_01_jnM Ap11_02_joM Ap11_03_jnM Ap11_04_joM Ap11_05_jnM Ap11_06_joM Ap11_07_jnM Ap11_08_joM Ap12_01_jnM Ap12_02_joM Ap12_03_jnM Ap12_04_joM Ap12_05_jnM Ap12_06_joM Ap12_07_jnM Ap12_08_joM Ap12_09_jnM Ap12_10_joM Ap13_01_joM Ap13_02_suM Ap13_03_joM Ap13_04_suM Ap13_06_suM Ap14_03_suM Ap14_04_joM Ap14_05_suM Ap14_07_joM Ap15_01_elM Ap15_02_elM Ap15_03_joM Ap15_04_jnM Ap15_05_elM Ap15_06_joM Ap15_07_elM Ap15_08_joM Ap15_09_elM Ap15_10_joM Ap15_11_elM Ap16_01_joM Ap16_02_caM Ap16_04_caM Ap16_05_joM Ap16_06_caM Ap17_01_trM Ap17_02_prM Ap17_03_trM Ap17_04_prM Ap17_05_trM Ap17_06_trM Ap18_01_joM Ap18_02_elM Ap18_03_elM Ap18_04_joM Ap18_05_elM Ap19_01_caM Ap19_02_caM Ap19_03_joM Ap19_04_caM Ap19_05_joM Ap19_06_joM Ap20_01_joM Ap20_02_prM Ap20_03_joM Ap20_04_prM Ap20_05_joM Ap20_06_blM Ap20_07_trM Ap20_08_trM Ap21_01_elM Ap21_02_joM Ap21_03_elM Ap21_04_joM Ap22_01_elM Ap22_02_joM Ap22_03_elM Ap22_04_joM Ap23_01_joM Ap23_02_drM Ap23_03_joM Ap23_04_drM Ap23_05_joM Ap23_06_drM Ap23_07_joM Ap23_08_drM Ap24_01_caM Ap24_02_joM Ap24_03_caM Ap24_04_joM Ap24_05_caM Ap24_06_caM Ap24_07_joM Ap24_08_joM Ap25_01_joM Ap25_02_joM Ap26_01_joM Ap26_02_dvM Ap26_03_joM Ap26_04_dvM Ap26_05_dvM Ap26_06_joM Ap26_07_dvM Ap26_08_dvM Ap27_01_joM Ap27_02_elM Ap27_03_elM Ap27_04_joM Ap27_05_joM Ap27_06_elM Ap28_01_elM Ap28_02_joM Ap28_03_elM Ap28_04_joM Ap28_05_elM Ap28_06_joM Ap29_01_elM Ap29_02_joM Ap29_03_elM Ap29_04_joM Ap29_05_joM Ap29_06_elM Ap29_07_joM Ap29_08_elM Ap29_09_joM Ap29_10_elM Apelelv01M Apelgrd01M Ap29_11_joM Am3l2carrM Aelvcet01M Aelvcet02M Ajorep01M Ajorep02M Ajorep03M Ajorep04M Ajorpld01M Ajorpld02M Ajorpld03M Ajorpld04M Atrjo01M Atrgrim01M Atrgrim02M Atrcarr06M Atrcarr07M Atrcarr08M Atrcarr01M Atrcarr02M Atrcarr03M Atrcarr04M Atrcarr05M Atrcarr12M Abnblde01M Abncass01M Apelelv02M Avault2M Ap29_12_elM Ap14_09_joM Ap19_07_joM Ap19_08_joM Acicarr06M Acicarr11M Acifarr08M Acifarr12M Acifema01M Acifema04M Acifema07M Acifema08M Acifema09M Acifema14M Acifost08M Acifost12M Acigrim05M Acigrim06M Acigrim07M Acigrim08M Acigrim09M Acigrim10M Acihopk09M Acihopk11M Acimale02M Acimale03M Acimale07M Acimale09M Acimale11M Acimale13M Aciroge08M Aciroge12M Atrfost01M Atrfost02M Atrfost03M Atrcarr09M Atrcarr10M Atrcarr11M Acifarr01M Acifarr02M Acifarr03M Acigrim01M Acigrim03M Acigrim04M Acihopk01M Acihopk04M Acihopk06M Aciroge01M Aciroge02M Atrroge01M Acicarr07M Acicarr08M Ajoinst01M Ajoinst02M Ajoinst03M Ajoinst04M Ap25_03_joM Ap29_13_joM Ap29_14_joM Acicarr09M Acicarr10M Ap29_15_joM Ap16_03_joM Acarrbye02M Asaucerexp1M @@ -186,7 +186,7 @@ guns: $(ASSET_GUN_FILES) ################################################################################ # Lang files -$(B_DIR)/files/L%.elf: src/files/lang/%.o +$(B_DIR)/files/L%.elf: src/files/lang/$(ROMID)/%.o @mkdir -p $(B_DIR)/files/lang cp $< build/zero.tmp.o $(TOOLCHAIN)-ld -T ld/zero.ld -o $@ @@ -303,6 +303,9 @@ $(B_DIR)/files/%.o: $(B_DIR)/files/% $(TOOLCHAIN)-as -mabi=32 -mips2 -I src/include -EB -o $@ $(B_DIR)/file.s rm -f file.s +src/files/lang/%.o: src/files/lang/%.c + $(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) $< -o $@ -O2 + %.o: %.c /usr/bin/env python3 tools/asmpreproc/asm-processor.py -O2 $< | $(QEMU_IRIX) -silent -L $(IRIX_ROOT) $(IRIX_ROOT)/usr/bin/cc -c $(CFLAGS) tools/asmpreproc/include-stdin.c -o $@ -O2 /usr/bin/env python3 tools/asmpreproc/asm-processor.py -O2 $< --post-process $@ --assembler "$(TOOLCHAIN)-as -march=vr4300 -mabi=32" --asm-prelude tools/asmpreproc/prelude.s diff --git a/src/files/lang/ameE.c b/src/files/lang/jap-final/ameE.c similarity index 100% rename from src/files/lang/ameE.c rename to src/files/lang/jap-final/ameE.c diff --git a/src/files/lang/jap-final/ameJ.c b/src/files/lang/jap-final/ameJ.c new file mode 100644 index 000000000..4cc1f99ae --- /dev/null +++ b/src/files/lang/jap-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“€ƒdataDyne€„Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃãÓ‚§Ò†Š…Ô„ðæ€‚ä‚…ƒ…‚‹Ïʹ̃¸ƒ¹ÏƒÔƒƒÎ€ï€Ê€Û€Í€Ïð€Í€Ð€Ï€ä€ÂЀ׀߂„€…€Ö€Ë€ú€øÒ‚«Ï‚ª¿æ‚ÃÃâƒÏ€‚ªÍÅÌÜ‚¨»‚ŸÄÎÁÌÓÎàλ€ÂØÉ€‰‚„€ß†€Ñ€Ï„“Ò’€ú‚€È€×€ã悃‚‹‚ªÎÒ¿€¾Ä½Ì¾Áƒ‡ƒƒÜºâ€Â€ï€Ê€Û€Í€Ïƒ“Ò‚û‚üƒÑ΄®ƒ´Ó€€‡ƒ¸‚Ì‚ÍÒ„Ò‚ý„±Ï„ý‚²¸„”½ÐÃÍ€ˆð€Â€Ù‚„Š€Ö‚„Óƒçƒáƒî惨ÀÌ»â‚ýÒÙƒáƒÜóºâÃ͸‚èãλ߼πÂ\n\n|‚µ‚¶€‘€¾„ž†‹€Õ€ñ€ö‚é‚ê‚Í‚•¸‚ ‚¢Ï\n\nŒ€ø‚ŽÒ„ž†‹€Õ€ñ€öÒ…ƒ‚‚é‚ê‚Í‚•挀ø‡Ë‚ÔÒ‚½Ï†ˆ‚•ÄãÌ»â€Â€ž€œ€¦€î€Ñ€Ï¸‚ù´Ì‚Í‚•¸‚ ‚¢ÏÅ€„ž†‹€Õ€ñ€öÏ‚ªÜƒ¡àÎ»ß¼ÏÆâÒð€Â€ž€œ€¦€î€Ñ€Ï҃܃ݸ‚ȆŒÆâÉÛÏÓ€‚Í‚•σå…р݀ʀãÅÎÁÌÓÎàλ€ÂƒÜƒÝÓ€‘ƒ˜ƒ«ƒ¬ÎÒó€ƒèÒð€Â\n\n|‚µ‚¶€’€¾€ç€Ê€×€ù€Ü€…€Ö‚„¸‚ö‚ÝÇß\n\n‰‚„€ß†€Ñ€Ï„“Ò‚­ƒÞ…÷‚µƒîóºâ€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÓ€Œ€øÒ‚Œ„ù€Ó€÷€ÐÏ‚Ÿ‚öáÆâÉÛÒ€Ù‚„Š€Ö‚„¸€€ç€Ê€×€ù€ÜÏËÂÌ‚ÕÊ†Ž»Ì»â€ÂÃãÓ€€ö€Ñ€ë€…€ò€å€ß‚„‚Í‚•Ï€÷€Ï€×Å̾ဂۂÜÒ€ö€Ñ€ëƒ¤ƒÚ惑½âÍ€€Ö‚„惼ƒÜÏÎâ€ÂÎÒó‚Û‚Ü¿à€ç€Ê€×€ù€Ü€…€Ö‚„¸„ß¼ƒ“Ó‚àó‚×ÉíÏ€ƒµ‚ûÄÇÎÁÌÓÎàλ€Â\n\n|‚µ‚¶€“€¾ƒÔƒûÒ€ë€Å€Ñ€ø¸ƒÉ‚¦Çß\n\nЀ׀߂„€…€Ö€Ë€ú€øÒ‚´ƒéÓ€ƒÍ…؉‚„€ß†€Ñ€Ï‚ŽÒƒÉƒŸ‚¤…Ãóƒ½ÛàÌ»â€Â‚ÛÒ’€ú‚€È€×€ã¸„æ‚ÓÅÌ»âƒÔƒûæ€ÈҀ€â€Æ€Ï€þÏ‚Ÿ†‚ð€ÂƒÔƒû¸€Ô€ë€Æ€ÜØó„ã‚ÚÅ€’€ú‚€È€×€ã€…€ë€Å€Ñ€øÏ€Ð€×€Ý€ÜÄÇä€Â€Ð€×€Ý€ÜÅÉàÆèω‚„€ß€÷€Ï€Õ¸‚ù´Ì€€ë€Å€Ñ€ø¸‚£‚¤ÏƒÉ‚¦ÆâÒð€Â\n\n|‚µ‚¶€”€¾†ƒƒÏ„í€Û€Ü€â€ð¸‚ ‚¢Ï\n\n‚œ‚€ë€ú€Ð‚„Ҁ݀ր̀÷€â€Æ€…€ø‚„€ðφƒƒÏ„í€Û€Ü€â€ðÒ…ƒ‚‚é‚ê‚Í‚•æºâ€ÂÃãÏ€ž€œ€¦€î€Ñ€Ï¸ƒ‚Ò„÷…”π݀ʀãÅÌ€‰‚„€ß†€Ñ€ÏÒ†ƒƒÏƒ¤€ç€Ê€ã¸ƒ¼‚‚…¦ÄÇâÒð€ÂÃã󀌀ø‚–ÖÒ†ƒƒÏ„í€Û€Ü€â€ð怃…Ì‚ ‚¢ÍÎâðä¼€Â\n\n|‚µ‚¶€•€¾‚˜‡ÌÖÒ€Ó€ùŽ‚„€ß‚„Ï‚Àã\n\n‚˜‡Ìυă¯Äã̻⊀׀߂„€…€Ö€Ë€ú€øÒÍÃäÖ̓Ïì µ…¶Ò€Ó€ùŽ‚„€ß‚„¸„€Å‚ŸÆÒð€Â… ‚¹ÎƒŠƒçÓ‚ìà¿ÏÄã̻λ怂œ‚€ë€ú€Ð‚„Òôÿó‚ÉË¿âÓíð€Â\n\nEND\n", + /* 1*/ "€ø€Ú‚„€Ï€…€ß€û‚„\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“€ƒdataDyne€„Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃãÓ‚§Ò†Š…Ô„ðæ€‚ä‚…ƒ…‚‹Ïʹ̃¸ƒ¹ÏƒÔƒƒÎ€ï€Ê€Û€Í€Ïð€Í€Ð€Ï€ä€ÂЀ׀߂„€…€Ö€Ë€ú€øÒ‚«Ï‚ª¿æ‚ÃÃâƒÏ€‚ªÍÅÌÜ‚¨»‚ŸÄÎÁÌÓÎàλ€ÂØÉ€‰‚„€ß†€Ñ€Ï„“Ò’€ú‚€È€×€ã悃‚‹‚ªÎÒ¿€¾Ä½Ì¾Áƒ‡ƒƒÜºâ€Â€ï€Ê€Û€Í€Ïƒ“Ò‚û‚üƒÑ΄®ƒ´Ó€€‡ƒ¸‚Ì‚ÍÒ„Ò‚ý„±Ï„ý‚²¸„”½ÐÃÍ€ˆð€Â€Ù‚„Š€Ö‚„Óƒçƒáƒî惨ÀÌ»â‚ýÒÙƒáƒÜóºâÃ͸‚èãλ߼πÂ\n\n|‚µ‚¶€‘€¾„ž†‹€Õ€ñ€ö‚é‚ê‚Í‚•¸‚ ‚¢Ï\n\nŒ€ø‚ŽÒ„ž†‹€Õ€ñ€öÒ…ƒ‚‚é‚ê‚Í‚•挀ø‡Ë‚ÔÒ‚½Ï†ˆ‚•ÄãÌ»â€Â€ž€œ€¦€î€Ñ€Ï¸‚ù´Ì‚Í‚•¸‚ ‚¢ÏÅ€„ž†‹€Õ€ñ€öÏ‚ªÜƒ¡àÎ»ß¼ÏÆâÒð€Â€ž€œ€¦€î€Ñ€Ï҃܃ݸ‚ȆŒÆâÉÛÏÓ€‚Í‚•σå…р݀ʀãÅÎÁÌÓÎàλ€ÂƒÜƒÝÓ€‘ƒ˜ƒ«ƒ¬ÎÒó€ƒèÒð€Â\n\n|‚µ‚¶€’€¾€ç€Ê€×€ù€Ü€…€Ö‚„¸‚ö‚ÝÇß\n\n‰‚„€ß†€Ñ€Ï„“Ò‚­ƒÞ…÷‚µƒîóºâ€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÓ€Œ€øÒ‚Œ„ù€Ó€÷€ÐÏ‚Ÿ‚öáÆâÉÛÒ€Ù‚„Š€Ö‚„¸€€ç€Ê€×€ù€ÜÏËÂÌ‚ÕÊ†Ž»Ì»â€ÂÃãÓ€€ö€Ñ€ë€…€ò€å€ß‚„‚Í‚•Ï€÷€Ï€×Å̾ဂۂÜÒ€ö€Ñ€ëƒ¤ƒÚ惑½âÍ€€Ö‚„惼ƒÜÏÎâ€ÂÎÒó‚Û‚Ü¿à€ç€Ê€×€ù€Ü€…€Ö‚„¸„ß¼ƒ“Ó‚àó‚×ÉíÏ€ƒµ‚ûÄÇÎÁÌÓÎàλ€Â\n\n|‚µ‚¶€“€¾†ƒƒÏ„í€Û€Ü€â€ð¸‚ ‚¢Ï\n\n‚œ‚€ë€ú€Ð‚„Ҁ݀ր̀÷€â€Æ€…€ø‚„€ðφƒƒÏ„í€Û€Ü€â€ðÒ…ƒ‚‚é‚ê‚Í‚•æºâ€ÂÃãÏ€ž€œ€¦€î€Ñ€Ï¸ƒ‚Ò„÷…”π݀ʀãÅÌ€‰‚„€ß†€Ñ€ÏÒ†ƒƒÏƒ¤€ç€Ê€ã¸ƒ¼‚‚…¦ÄÇâÒð€ÂÃã󀌀ø‚–ÖÒ†ƒƒÏ„í€Û€Ü€â€ð怃…Ì‚ ‚¢ÍÎâðä¼€Â\n\n|‚µ‚¶€”€¾‚˜‡ÌÖÒ€Ó€ùŽ‚„€ß‚„Ï‚Àã\n\n‚˜‡Ìυă¯Äã̻⊀׀߂„€…€Ö€Ë€ú€øÒÍÃäÖ̓Ïì µ…¶Ò€Ó€ùŽ‚„€ß‚„¸„€Å‚ŸÆÒð€Â… ‚¹ÎƒŠƒçÓ‚ìà¿ÏÄã̻λ怂œ‚€ë€ú€Ð‚„Òôÿó‚ÉË¿âÓíð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“€ƒdataDyne€„Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃãÓ‚§Ò†Š…Ô„ðæ€‚ä‚…ƒ…‚‹Ïʹ̃¸ƒ¹ÏƒÔƒƒÎ€ï€Ê€Û€Í€Ïð€Í€Ð€Ï€ä€ÂЀ׀߂„€…€Ö€Ë€ú€øÒ‚«Ï‚ª¿æ‚ÃÃâƒÏ€‚ªÍÅÌÜ‚¨»‚ŸÄÎÁÌÓÎàλ€ÂØÉ€‰‚„€ß†€Ñ€Ï„“Ò’€ú‚€È€×€ã悃‚‹‚ªÎÒ¿€¾Ä½Ì¾Áƒ‡ƒƒÜºâ€Â€ï€Ê€Û€Í€Ïƒ“Ò‚û‚üƒÑ΄®ƒ´Ó€€‡ƒ¸‚Ì‚ÍÒ„Ò‚ý„±Ï„ý‚²¸„”½ÐÃÍ€ˆð€ÂÁãèãÜ‚ÛàÏ‚üłข״ÉáÅλ߼πÂ\n\n|‚µ‚¶€‘€¾‚˜‡ÌÖÒ€Ó€ùŽ‚„€ß‚„Ï‚Àã\n\n‚˜‡Ìυă¯Äã̻⊀׀߂„€…€Ö€Ë€ú€øÒÍÃäÖ̓Ïì µ…¶Ò€Ó€ùŽ‚„€ß‚„¸„€Å‚ŸÆÒð€Â… ‚¹ÎƒŠƒçÓ‚ìà¿ÏÄã̻λ怂œ‚€ë€ú€Ð‚„Òôÿó‚ÉË¿âÓíð€Â\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "‰‚„€ß†€Ñ€Ï\n„·„“‚…“„·‚€€Û€Õ€€€®€¬€š", + /* 10*/ "€’€€’€“†‘€˜†’€‘€•„¸€ƒ¦…ªƒ“‚ý€€’€¾€“€\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "€ç€Ê€×€ù€Ü\n", + /* 14*/ "€ç€Ê€×€ù€Ü\n", + /* 15*/ "€Õ€Ú€ÏŠ€öÒ€ç€Ê€×€ù€Ü¸‚ÝÏ‚öãÉ\n", + /* 16*/ "„ž†‹€Õ€ñ€ö‚é‚ê‚Í‚•¸‚ ‚¢Ï\n", + /* 17*/ "€ç€Ê€×€ù€Ü€…€Ö‚„¸‚ö‚ÝÇß\n", + /* 18*/ "ƒÔƒûÒ€ë€Å€Ñ€ø¸ƒÉ‚¦Çß\n", + /* 19*/ "†ƒƒÏ„í€Û€Ü€â€ð¸‚ ‚¢Ï\n", + /* 20*/ "‚˜‡ÌÖÒ€Ó€ùŽ‚„€ß‚„Ï‚Àã\n", + /* 21*/ "ºÎÉÓƒž€À€‚ƒ‚‹ÃÃ󂪸ÅÌ»âÒ€À\n", + /* 22*/ "€Ö€Ë‚„€´€ÃÒ†“€‚ขմÌâ倴\n", + /* 23*/ "Ã¹Î„à†“æ€ƒ”¸‚×ÌâåÂæÎ»å€Â\n", + /* 24*/ "ƒ”¸‚ƒ‚‹ƒžðÍ„ª´Ì»âÒ€À\n", + /* 25*/ "€ë€Ï€ÃÒŒ€øÒ‚‰ƒŽ¸€ä€ñâ¹ìµÎ»å߀Â\n", + /* 26*/ "¾Ñ滀ƒËÂÌ€´€´\n", + /* 27*/ "ƒ”æºÎÉÒƒüƒŠÎà€ÆèÃøƒöâåÑ€´\n", + /* 28*/ "€ž€œ€¦€î€Ñ€Ïæ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 29*/ "€ž€œ€¦€î€Ñ€Ïæ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 30*/ "‚µ‚¶‚ñ‚ò\n", + /* 31*/ "€€€‚µ‚¶‚ó‚ô€€€\n", + /* 32*/ "ƒ…ÌÒ‚µ‚¶¸‚ó‚ôÆâÃÍæóÀØÇ¹\n", + /* 33*/ "ÃÒ€ë€Å€Ñ€ø¸ƒ‘ŃöâÍÀæÀÉÎ\n", + /* 34*/ "ƒÔƒûæ‚ÙÄãÉ\n", + /* 35*/ "‚©åãɃÏဂªóÜÆâ߀´\n", + /* 36*/ "ƒËÂÌÁ〄тöƒîð€´\n", + /* 37*/ "ŵøáÆçð€Â\n", + /* 38*/ "ƒËÂÌ€ƒËÂÌ€´\n", + /* 39*/ "‚©åãɃÏဂªóÜÆâ߀´\n", + /* 40*/ "ကú€þ€Ñ€ÏÅÌ€Ž\n", + /* 41*/ "€¨€¤€€Ü€û‚„Џ‚ö‚‚ÅÉ€Ž\n", + /* 42*/ "€þ€Ê‹€Ñ€Š€×€ß‚„€…€Ö€Ë€ú€ø€´\n", + /* 43*/ "Ããæ‚­ƒ Ò‹€þð΀„ç„–áƒîÛ€´\n", + /* 44*/ "€ë€Å€Ñ€øÖҀЀ׀݀܃±„¶€½ƒÉ‚¦„ׄØ\n", + /* 45*/ "€ë€Å€Ñ€øÒƒÉ‚¦‚ó‚ô\n", + /* 46*/ "€Ð€×€Ý€Ü„Ú„Û€€Ü€û‚„Šæƒ‡ƒƒ\n", + /* 47*/ "Š€Ð€ú€Ê€×‚†‚ø\n", + /* 48*/ "€€¨€¡€´\n", + /* 49*/ "‰‚„€ß€÷€Ï€Õ惇ƒƒóÆ\n", + /* 50*/ "‚ë‚쀨€§\n", + /* 51*/ "‚ë‚쀨€Ÿ€Ÿ\n", + /* 52*/ "Ѐ׀߂„€…€Ö€Ë€ú€øÒ‚¤ƒŸ¸ƒ‘ƒöÆâ¹ð€Ž\n", + /* 53*/ "‚×Éλó€‚×Éλó€´\n", + /* 54*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 55*/ "„Ò‚ý„±æ‚ÙÄãÉ\n", + /* 56*/ "‚µ‚¶‚ñ‚ò\n€‚µ‚¶¸‚ó‚ôóÀØÇ¹\n", + /* 57*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΄±ƒ°æ‚ÙÄãÉ\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "€ž€œ€¦€î€Ñ€Ï\n", + /* 61*/ "€ž€œ€¦€î€Ñ€Ï\n", + /* 62*/ "€ž€œ€¦€î€Ñ€Ï¸‚ÝÏ‚öãÉ\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 66*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 67*/ "‰‚„€ß€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 68*/ "º¯€È¼ð€Â€‡„±…Ž€ˆÓÃÒ…ø\n€ý€Ý€ÑÏÅÌÜ¿Øå¹€Â\n", + /* 69*/ "»Ý€ƒ”Ò€Ô€ë€Æ€Ü҅ЃÀ¿à\n„¤…úÒ€ë€Å€Ñ€ø¸ƒ‘Ńöä¼€Â\n", + /* 70*/ "ƒ•Æè„ØÛâ߀€þ€ÊŠ‹€Ñ€Â\n", + /* 71*/ "Ä´Ä͂Ļ̀´\n", + /* 72*/ "ºÎÉҀ܀û‚„Šæƒ‡ƒƒÎÒ€Â\n‚£‚‚ÅÌÁãâåßÑ€´\n", + /* 73*/ "‚×Éλó€‚×Éλó€´\n", + /* 74*/ "€Ù€ç€×€Û€Í€Ï€Ó€ö‚„€¾…Ñ‚¾æ‚Å„–ãØÅÉ\n", + /* 75*/ "€Ù€ç€×€Û€Í€Ï€Ó€ö‚„€¾‚­ƒ ØóƒÉ‚¦óÀØÇ¹óÅÉ\n", + /* 76*/ "Œ€ø‚ŽÒ„ž†‹€Õ€ñ€ö悃ƒ“ƒÑÏ‚ ‚¢ÍδÉ\n", + /* 77*/ "Œ€ø‚–ÖÒ†ƒƒÏ„í€Û€Ü€â€ðæ‚ ‚¢ÏδÉ\n", + /* 78*/ "„ÿ…€€Ó€÷€ÐÖÒ€Ó€ùŽ‚„€ß‚„¸‚È‚É\n", + /* 79*/ "€ü‚„Š€î€Ï€´€ƒËÂÌÁ〴\n", + /* 80*/ "„ž†‹€Õ€ñ€ö‚é‚ê‚Í‚•¸‚ ‚¢ÏÆâÏÓ\n€ž€œ€¦€î€Ñ€Ï惇ƒƒ\n", + /* 81*/ "†ƒƒÏ„í€Û€Ü€â€ð¸‚ ‚¢ÏÆâÏÓ\n€ž€œ€¦€î€Ñ€Ï惇ƒƒóÆ\n", + /* 82*/ "†€ï‚„€À\n", + /* 83*/ "ƒ”σ†¿´Ì‚ªÍ»¼ƒÙƒ¬ÎÒ€´\n", + /* 84*/ "ƒ•󠆕Æâ߀Ž\n", + /* 85*/ "ƒ”æºÎÉÒƒüƒŠÎà€ÆèÃøƒöâåÑ€´\n", + /* 86*/ "ô¼¿€ƒËÂÌ€´\n", + /* 87*/ "‚×Éλó€´\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "€Õ€ð€Ü€Ñ\n", + /* 91*/ "€Õ€ð€Ü€Ñ\n", + /* 92*/ "€Õ€ð€Ü€Ñ¸‚ÝÏ‚öãÉ\n", + /* 93*/ "€Ü€Ö€Ë€ä‚„σêƒëºá\n„ž†‹€Õ€ñ€öÒ…ƒ‚‚é‚ê‚Í‚•Ó‚¼»ï\n", + /* 94*/ "€Õ€Ú€ÏŠ€öÒ€Ô€ë€Æ€ÜÓÃÒ€ë€ú€Ð‚„ð€Â\n", + /* 95*/ "€Ý€Ö€Ì€÷€â€Æ€…€ø‚„€ðÓÃÒ‚¼ÁÑ€Â\n", + /* 96*/ "‚˜‡ÌÖÒ€Ó€ùŽ‚„€ß‚„ÓÃÒ‚¼ÁÒÓíð\n", + /* 97*/ "„ž†‹€Õ€ñ€ö‚é‚ê‚Í‚•æ‚Ò„„ÅÉ\n", + /* 98*/ "€Ù€Ñ€á€÷´‚ÏÅÝæ´Ì€´\n", + /* 99*/ "€š€€’€€’€“†‘€ƒ¦…ªƒ“‚ý€’€’€‘€”€‰‚„€ß†€Ñ€Ï„·„“€€ø€Ú‚„€Ï€…€ß€û‚„\n", + /*100*/ "ó€ô¼ÅÌùÎσçÎÒ€À\n", + /*101*/ "ƒ•…½Š€×€ß‚„€…€Ö€Ë€ú€øÓ\n€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÏ¿ÂàãÌÅØ¼€Â\npƒŒÁƒËÂλ̀‰‚„€ß†€Ñ€Ï„“Ò\n‚ðƒœ¸„Åâ€à€Ë€Ï€Ü¸‚ñ¼€Â\n", + /*102*/ "Õ‚„¹€Â󀃅‚“‚×Ê‚ÙÅÌÜ»»Ò€À\n", + /*103*/ "ƒ¸‚Ì‚ÍÒ„±‚ý¸‚×´ÌÓÎàλͻ¼\n‚ä‚…Ò€ø‚„€ø¸‚èãÉÒ¿€À\np€ŽÜÊ乂̂̓ς݄冖ӻà¹ï€Â\n", + /*104*/ "€ß‚„€ÿ€Ê€ãÓôÃÏ»âÒ€À\n", + /*105*/ "ØíÓŒ€øÒ€‘‚½Øó‡ÌáâÒð€Â\npЀ׀߂„€…€Ö€Ë€ú€øÓŒ€øÒ‚˜‡ÌÒ\n„ÿ…€…Ï»âÍÒÃÍð¿à€Â\n", + /*106*/ "ô¼Ý´Ì‚Û¸‚Ƀ˜Âãõ»»Ò¿Åà€À\n", + /*107*/ "„“‚“€÷€Ü€ãÏÓ‚É‚ÓÉàλŀŽ\n…¼ƒƒ‹‚–Ó‚ªÜå¿à¹æ€ßäÅÁ…»Ú€Â\n", + /*108*/ "€¨€¤€€Ó€Ï€ß‚„ÅÉ\n", + /*109*/ "»€»Ø€ú€þ€Ñ€ÏÆâ߀Ž\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ameP.c b/src/files/lang/jap-final/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/jap-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_f.c b/src/files/lang/jap-final/ame_str_f.c new file mode 100644 index 000000000..adefe2c1c --- /dev/null +++ b/src/files/lang/jap-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être fixé sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte la clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Accéder aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est à l'ordre du jour d'une réunion, dans l'un des bureaux. Le dirigeant chargé du projet du Dr. Caroll sera présent. Suivez-le jusqu'à son bureau et accédez à ses fichiers, puis téléchargez-les grâce à votre récepteur.\n\n|Objectif 4: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, et elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être appliquée sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte sa clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais intérieur\n", + /* 17*/ "Obtenir collier-clé\n", + /* 18*/ "Télécharger fichiers\n", + /* 19*/ "Neutraliser relais extérieur\n", + /* 20*/ "Accéder au laboratoire\n", + /* 21*/ "Qui êtes-vous? Que faites-vous là?\n", + /* 22*/ "Attention! Elle est armée!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la sécurité.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal placée.\n", + /* 29*/ "Mine CME placée correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effacé.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion terminée...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale traître!\n", + /* 44*/ "Téléchargement en cours.\n", + /* 45*/ "Téléchargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte déverrouillée.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur télécharg. - Récepteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial détruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tué.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir récepteur.\n", + /* 64*/ "\n", + /* 65*/ "Récepteur\n", + /* 66*/ "Un récepteur\n", + /* 67*/ "Récepteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalité.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en même temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un problème de mot de passe, et vous \nallez le résoudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - téléchargement incomplet.\n", + /* 76*/ "Système de sécurité temporairement annulé.\n", + /* 77*/ "Communications extérieures coupées.\n", + /* 78*/ "Ascenseur du laboratoire localisé.\n", + /* 79*/ "Sécurité!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller sécurité.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me déranger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Pitié!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif - \nle relais de com intérieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est à \ncet étage.\n", + /* 95*/ "L'autre relais doit être dans la \nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit être dans \nle coin.\n", + /* 97*/ "Système de sécurité opérationnel.\n", + /* 98*/ "Bravo...ça ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauvé ce soir, \nses supérieurs conditionneront son \nesprit et nous ne pourrons découvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les éliminer?\n", + /*103*/ "Pas de bêtises: une clé de sécurité ne \nfonctionne que si le détenteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes armés...\n", + /*104*/ "Où se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninférieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnaître?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_g.c b/src/files/lang/jap-final/ame_str_g.c new file mode 100644 index 000000000..239a44f97 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird über Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der für Dr. Carolls Projekt verantwortlich zeichnet anwesend ist, findet in einem der Bürotrakte statt. Folgen Sie ihm in sein Büro, greifen Sie auf die Projektdaten zu und übertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Gerätes.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vries' Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vries' Halskette\n", + /* 15*/ "De Vries' Halskette aufgenommen\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlüssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schießen, dummes Kind!\n", + /* 24*/ "Du weißt wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "Wäre ich du, würde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM-Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM-Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollständig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMÖGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu löschen.\n", + /* 34*/ "Festplatte gelöscht\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verräter!\n", + /* 44*/ "Kopiervorgang gestartet\n", + /* 45*/ "Kopiervorgang abgeschlossen\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich\n", + /* 47*/ "Türverriegelung aufgehoben\n", + /* 48*/ "HÄH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Löschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schießen, nicht schießen!\n", + /* 54*/ "Wichtiges Objekt zerstört\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmöglich\n", + /* 57*/ "Wichtige Person neutralisiert\n", + /* 58*/ "Erlangen Sie ECM-Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM-Mine\n", + /* 61*/ "Eine ECM-Mine\n", + /* 62*/ "ECM-Mine aufgenommen\n", + /* 63*/ "Erlangen Sie das Data Uplink-Gerät.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Büro\naus initiieren und die entsprechenden Files löschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhören.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schießen, nicht schießen!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollständig\n", + /* 76*/ "Internes Sicherheitssystem temporär außer Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme außer Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stören?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "Wäre ich du, würde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schießen!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock für die internen Sicherheitssysteme muss in der Nähe sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Büro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstört!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So würden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie müssen vorsichtig sein, Joanna. \nCodeschlüssel nützen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlüssel seinen Wert. Bewaffnete Wachen sind natürlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfügen über kein Bildmaterial, und wir können \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glück, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_i.c b/src/files/lang/jap-final/ame_str_i.c new file mode 100644 index 000000000..9d8f54ff5 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collana\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Presa collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! È armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "È ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Farò quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Farò quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "Sì, sì! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizierò subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che può aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos'è tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli farà il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta è \nancora vivo; altrimenti si disattiverà. \nCerto, con le guardie armate \nè tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo né sue foto, né file \nufficiali. Tutto ciò che abbiamo è il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/jap-final/ame_str_s.c b/src/files/lang/jap-final/ame_str_s.c new file mode 100644 index 000000000..ecadad960 --- /dev/null +++ b/src/files/lang/jap-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll está siendo decidido en una reunión en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll está allí presente. Síguele a su oficina y accede a los ficheros de su proyecto, entonces mándanoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG División Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obtén el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-código\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "¿Quién eres tú y qué estás haciendo aquí?\n", + /* 22*/ "¡Cuidado! Tiene un arma.\n", + /* 23*/ "¡No me dispararás, tonta criatura!\n", + /* 24*/ "¿No sabes quién soy?\n", + /* 25*/ "Veamos cómo te las apañas con seguridad.\n", + /* 26*/ "¡¡¡¡POR FAVOR!!!! ¡No me mates!\n", + /* 27*/ "Si fuera tú, me marcharía... ¡AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIÓN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIÓN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "¡Haré lo que tú quieras!\n", + /* 36*/ "AYUDA. ¡Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "¡AYUDA, AYUDA!\n", + /* 39*/ "¡Haré lo que tú quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adiós, Dr. Caroll.\n", + /* 43*/ "¡Has procesado tu último error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contraseña.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "¡OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversación del Dr. Caroll...\n", + /* 53*/ "¡No dispares, no dispares!\n", + /* 54*/ "Objeto crítico de la misión destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIÓN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crítica para la misión.\n", + /* 58*/ "Obtén las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obtén el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "C. Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "Sí, sí, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezaré enseguida. Adiós.\n", + /* 71*/ "¡En marcha!\n", + /* 72*/ "Tengo un problema de contraseñas, y tú \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "¡No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexión terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... ¡Ayúdenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "¡Cómo te atreves a molestarme!\n", + /* 84*/ "¡Te vas a arrepentir de esta intrusión, chica!\n", + /* 85*/ "Si yo fuera tú, me iría... ¡YA!\n", + /* 86*/ "¡Por favor, no me mates!\n", + /* 87*/ "¡No dispares!\n", + /* 88*/ "Obtén la Cámara Espía.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "Cámara Espía\n", + /* 91*/ "Una Cámara Espía\n", + /* 92*/ "Cámara Espía obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno está cerca.\n", + /* 94*/ "Estás en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del sótano debe de estar por \naquí en algún lugar.\n", + /* 97*/ "El sistema de seguridad está activo de nuevo.\n", + /* 98*/ "¡Vándalo! ¡Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "¿Por qué tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavará el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "¿Son todos prescindibles?\n", + /*103*/ "¡No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves código sólo funcionan cuando el \npropietario está vivo... Si les matas, la llave \nes inútil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "¿Dónde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estará en el laboratorio de \ninvestigación en algún lugar del subsuelo.\n", + /*106*/ "¿Cómo le reconoceré?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/archE.c b/src/files/lang/jap-final/archE.c similarity index 100% rename from src/files/lang/archE.c rename to src/files/lang/jap-final/archE.c diff --git a/src/files/lang/archJ.c b/src/files/lang/jap-final/archJ.c similarity index 100% rename from src/files/lang/archJ.c rename to src/files/lang/jap-final/archJ.c diff --git a/src/files/lang/archP.c b/src/files/lang/jap-final/archP.c similarity index 100% rename from src/files/lang/archP.c rename to src/files/lang/jap-final/archP.c diff --git a/src/files/lang/arch_str_f.c b/src/files/lang/jap-final/arch_str_f.c similarity index 100% rename from src/files/lang/arch_str_f.c rename to src/files/lang/jap-final/arch_str_f.c diff --git a/src/files/lang/arch_str_g.c b/src/files/lang/jap-final/arch_str_g.c similarity index 100% rename from src/files/lang/arch_str_g.c rename to src/files/lang/jap-final/arch_str_g.c diff --git a/src/files/lang/arch_str_i.c b/src/files/lang/jap-final/arch_str_i.c similarity index 100% rename from src/files/lang/arch_str_i.c rename to src/files/lang/jap-final/arch_str_i.c diff --git a/src/files/lang/arch_str_s.c b/src/files/lang/jap-final/arch_str_s.c similarity index 100% rename from src/files/lang/arch_str_s.c rename to src/files/lang/jap-final/arch_str_s.c diff --git a/src/files/lang/arecE.c b/src/files/lang/jap-final/arecE.c similarity index 100% rename from src/files/lang/arecE.c rename to src/files/lang/jap-final/arecE.c diff --git a/src/files/lang/arecJ.c b/src/files/lang/jap-final/arecJ.c similarity index 100% rename from src/files/lang/arecJ.c rename to src/files/lang/jap-final/arecJ.c diff --git a/src/files/lang/arecP.c b/src/files/lang/jap-final/arecP.c similarity index 100% rename from src/files/lang/arecP.c rename to src/files/lang/jap-final/arecP.c diff --git a/src/files/lang/arec_str_f.c b/src/files/lang/jap-final/arec_str_f.c similarity index 100% rename from src/files/lang/arec_str_f.c rename to src/files/lang/jap-final/arec_str_f.c diff --git a/src/files/lang/arec_str_g.c b/src/files/lang/jap-final/arec_str_g.c similarity index 100% rename from src/files/lang/arec_str_g.c rename to src/files/lang/jap-final/arec_str_g.c diff --git a/src/files/lang/arec_str_i.c b/src/files/lang/jap-final/arec_str_i.c similarity index 100% rename from src/files/lang/arec_str_i.c rename to src/files/lang/jap-final/arec_str_i.c diff --git a/src/files/lang/arec_str_s.c b/src/files/lang/jap-final/arec_str_s.c similarity index 100% rename from src/files/lang/arec_str_s.c rename to src/files/lang/jap-final/arec_str_s.c diff --git a/src/files/lang/arkE.c b/src/files/lang/jap-final/arkE.c similarity index 100% rename from src/files/lang/arkE.c rename to src/files/lang/jap-final/arkE.c diff --git a/src/files/lang/jap-final/arkJ.c b/src/files/lang/jap-final/arkJ.c new file mode 100644 index 000000000..22f282cf5 --- /dev/null +++ b/src/files/lang/jap-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ð€ö‚„€ðæÎဂ‰‚Š‚‹‚Œ‚Ò‰‚„€ß†€Ñ€ÏŒ€ø‚Ž‚ÏӇ˂‚‘‚’‚“æ‚”‚•ÄãÌ»â€ÂŒ€øÒ‚–Ü‚—Ò‚˜‡Ë‚‚™Ï‚š‚›ÄãÌ»âÒ󀂜‚¿àÒ‚ž‚ŸÓ‚ ‚¡‚¢óºâ€Â‚£‚¤Ò‚¥‚¦‚‚™Ó€‚§ÍЀ׀߂„€…€Ö€Ë€ú€ø¸€ì€÷”‚„€ã󂨂ŸÆâÃÍÏδ̻â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€‚©¼ØóÜλ怂ªßáÜØí€Š€×€ß‚„€…€Ö€Ë€ú€øÒ‚«¸‚¬âÃÍæ‚­‚®‚¯ð€Â€Õ€Ú€ÏŠ€ö͉‚„€ß†€Ñ€ÏÓ‚°‚‚¸ËÁÅÌ‚§ÉÊÒ‚ž‚Ÿ¸‚±‚²Æâð伀‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾ƒä€‘€Ó€ùŽ‚„€ß‚„Ï‚Àá‚ÁÛ\n\n‚œ‚‚»‚¼Ò‚·‚¸¸‚¹‚ºÅÌ€‡ËÒ‚½ÖÍ‚¾Áƒä€‘€Ó€ùŽ‚„€ß‚„Ï€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚¿Ï‚Àá‚ÁÛ€Â\n\n|‚µ‚¶€’€¾ƒä€’€Ó€ùŽ‚„€ß‚„¸‚‚ÂÄ\n\nŒ€øÒƒä€’€Ó€ùŽ‚„€ß¸‚Ä¿ÎÁÄÇâ€Ù€î€ÏŠæ€€Ô€ë€Æ€Ü€ë€ú€Ð‚„Ò€‘‚ƇÌÒ‚½Ïºâ€©€œ¿à‚ŸÄãÌ»âÒ¸‚¹‚ÇÅɀƒ䀒€Ó€ùŽ‚„€ß‚„¸‚‚ÂÄÄÇâÉÛ€ÈÒ€©€œ¸‚È‚ÉÅÌ€€Ù€î€ÏЏ‚Ê‚ËÇ߀Â\n\n|‚µ‚¶€“€¾€í‹‚„€Ù’€ß‚„¸‚×Ê‚ØÍÇ\n\nŒ€øÒ‚Ðḉ‚„€ß†€Ñ€ÏҀ틂„€Ù’€ß‚„æ‚Ñ‚ÒÅ‚§Éʸ‚Ö´Ì»â€ÂÃ㸂×Ê‚ØÍÆÒð€ÂÝàÎÂãõ€ÝàãâðÂð€Â\n\n|‚µ‚¶€”€¾‰€Æ€ü‚„Џƒ…Ì‚ÙÇ\n\n‚§ÉÊæ€ì€÷”‚„€ãÖ‚ÚÁ‚Å‚€€Õ€Ú€ÏŠ€öæ‚Û‚ÜÒ‰€Æ€ü‚„Џ‚Ý‚”ÅÉÓíð€Â‚§ÉÊæ‚Û‚ÜขÞÂâÒÓ×͹ô‚ ‚¡‚¢ÎÒó€‚ßÅ»‚à‚ׂ‘Ò‚á‚â¸ÅÌÁã€Â\n\n|‚µ‚¶€•€¾‚ž‚ŸÒÉÛ€ì€÷”‚„€ãÏ‚ãã\n\n€ì€÷”‚„€ãÏ‚ÚÂõ€‚ä‚…Ò‚¥‚¦‚‚™æ‚æÏ‚ç´Ì»âÓíð€ÂЀ׀߂„€…€Ö€Ë€ú€ø¸‚èãâÎ߀Â\n\nEND\n", + /* 1*/ "€ø€Ú‚„€Ï€ß€û‚„\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ð€ö‚„€ðæÎဂ‰‚Š‚‹‚Œ‚Ò‰‚„€ß†€Ñ€ÏŒ€ø‚Ž‚ÏӇ˂‚‘‚’‚“æ‚”‚•ÄãÌ»â€ÂŒ€øÒ‚–Ü‚—Ò‚˜‡Ë‚‚™Ï‚š‚›ÄãÌ»âÒ󀂜‚¿àÒ‚ž‚ŸÓ‚ ‚¡‚¢óºâ€Â‚£‚¤Ò‚¥‚¦‚‚™Ó€‚§ÍЀ׀߂„€…€Ö€Ë€ú€ø¸€ì€÷”‚„€ã󂨂ŸÆâÃÍÏδ̻â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€‚©¼ØóÜλ怂ªßáÜØí€Š€×€ß‚„€…€Ö€Ë€ú€øÒ‚«¸‚¬âÃÍæ‚­‚®‚¯ð€Â€Õ€Ú€ÏŠ€ö͉‚„€ß†€Ñ€ÏÓ‚°‚‚¸ËÁÅÌ‚§ÉÊÒ‚ž‚Ÿ¸‚±‚²Æâð伀‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾ƒä€‘€Ó€ùŽ‚„€ß‚„Ï‚Àá‚ÁÛ\n\n‚œ‚‚»‚¼Ò‚·‚¸¸‚¹‚ºÅÌ€‡ËÒ‚½ÖÍ‚¾Áƒä€‘€Ó€ùŽ‚„€ß‚„Ï€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚¿Ï‚Àá‚ÁÛ€Â\n\n|‚µ‚¶€’€¾€í‹‚„€Ù’€ß‚„¸‚×Ê‚ØÍÇ\n\nŒ€øÒ‚Ðḉ‚„€ß†€Ñ€ÏҀ틂„€Ù’€ß‚„æ‚Ñ‚ÒÅ‚§Éʸ‚Ö´Ì»â€ÂÃ㸂×Ê‚ØÍÆÒð€ÂÝàÎÂãõ€ÝàãâðÂð€Â\n\n|‚µ‚¶€“€¾‰€Æ€ü‚„Џƒ…Ì‚ÙÇ\n\n‚§ÉÊæ€ì€÷”‚„€ãÖ‚ÚÁ‚Å‚€€Õ€Ú€ÏŠ€öæ‚Û‚ÜÒ‰€Æ€ü‚„Џ‚Ý‚”ÅÉÓíð€Â‚§ÉÊæ‚Û‚ÜขÞÂâÒÓ×͹ô‚ ‚¡‚¢ÎÒó€‚ßÅ»‚à‚ׂ‘Ò‚á‚â¸ÅÌÁã€Â\n\n|‚µ‚¶€”€¾‚ž‚ŸÒÉÛ€ì€÷”‚„€ãÏ‚ãã\n\n€ì€÷”‚„€ãÏ‚ÚÂõ€‚ä‚…Ò‚¥‚¦‚‚™æ‚æÏ‚ç´Ì»âÓíð€ÂЀ׀߂„€…€Ö€Ë€ú€ø¸‚èãâÎ߀Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ð€ö‚„€ðæÎဂ‰‚Š‚‹‚Œ‚Ò‰‚„€ß†€Ñ€ÏŒ€ø‚Ž‚ÏӇ˂‚‘‚’‚“æ‚”‚•ÄãÌ»â€ÂŒ€øÒ‚–Ü‚—Ò‚˜‡Ë‚‚™Ï‚š‚›ÄãÌ»âÒ󀂜‚¿àÒ‚ž‚ŸÓ‚ ‚¡‚¢óºâ€Â‚£‚¤Ò‚¥‚¦‚‚™Ó€‚§ÍЀ׀߂„€…€Ö€Ë€ú€ø¸€ì€÷”‚„€ã󂨂ŸÆâÃÍÏδ̻â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€‚©¼ØóÜλ怂ªßáÜØí€Š€×€ß‚„€…€Ö€Ë€ú€øÒ‚«¸‚¬âÃÍæ‚­‚®‚¯ð€Â€Õ€Ú€ÏŠ€ö͉‚„€ß†€Ñ€ÏÓ‚°‚‚¸ËÁÅÌ‚§ÉÊÒ‚ž‚Ÿ¸‚±‚²Æâð伀‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾ƒä€‘€Ó€ùŽ‚„€ß‚„Ï‚Àá‚ÁÛ\n\n‚œ‚‚»‚¼Ò‚·‚¸¸‚¹‚ºÅÌ€‡ËÒ‚½ÖÍ‚¾Áƒä€‘€Ó€ùŽ‚„€ß‚„Ï€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚¿Ï‚Àá‚ÁÛ€Â\n\n|‚µ‚¶€’€¾‰€Æ€ü‚„Џƒ…Ì‚ÙÇ\n\n‚§ÉÊæ€ì€÷”‚„€ãÖ‚ÚÁ‚Å‚€€Õ€Ú€ÏŠ€öæ‚Û‚ÜÒ‰€Æ€ü‚„Џ‚Ý‚”ÅÉÓíð€Â‚§ÉÊæ‚Û‚ÜขÞÂâÒÓ×͹ô‚ ‚¡‚¢ÎÒó€‚ßÅ»‚à‚ׂ‘Ò‚á‚â¸ÅÌÁã€Â\n\n|‚µ‚¶€“€¾‚ž‚ŸÒÉÛ€ì€÷”‚„€ãÏ‚ãã\n\n€ì€÷”‚„€ãÏ‚ÚÂõ€‚ä‚…Ò‚¥‚¦‚‚™æ‚æÏ‚ç´Ì»âÓíð€ÂЀ׀߂„€…€Ö€Ë€ú€ø¸‚èãâÎ߀Â\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "ƒä€‘€Ó€ùŽ‚„€ß‚„Ï‚Àá‚ÁÛ\n", + /* 10*/ "ƒä€’€Ó€ùŽ‚„€ß‚„¸‚‚ÂÄ\n", + /* 11*/ "€í‹‚„€Ù’€ß‚„¸‚×Ê‚ØÍÇ\n", + /* 12*/ "‰€Æ€ü‚„Џƒ…Ì‚ÙÇ\n", + /* 13*/ "‚ž‚ŸÒÉÛ€ì€÷”‚„€ãÏ‚ãã\n", + /* 14*/ "€Ó€ùŽ‚„€ß‚„‚é‚ê€Û€Ü€â€ðπЀ׀݀܂€Ž\n", + /* 15*/ "‚ë‚쀨€§\n", + /* 16*/ "Ѐ׀߂„€…€Ö€Ë€ú€øæ‚ÙÄãÉ€´\n", + /* 17*/ "Ѐ׀߂„€…€Ö€Ë€ú€øæ‚í‚×Äã̻‴\n", + /* 18*/ "Ѐ׀߂„€…€Ö€Ë€ú€øæ†€ñ‚„‚¸‚îÂÉ€´\n", + /* 19*/ "º¯†€ñð€Ž€ºÒ‚܀ܼÈÃÏ»â\n", + /* 20*/ "í»÷¹‚ï‚ðÎÃÍõ¿áÅÌÁãâìµÎ»Ò€Ž\n", + /* 21*/ "¾ÝÆÙÎÄ»€†‚„€×ʵ¹€Â\n", + /* 22*/ "‚ë‚쀨€§\n", + /* 23*/ "‚ë‚쀨€Ÿ€Ÿ\n", + /* 24*/ "‚µ‚¶‚ñ‚ò\n", + /* 25*/ "‚µ‚¶‚ó‚ô\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 30*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 31*/ "€ä€Ñ€ã€Ð€Ñ¸‚ÝÏ‚öãÉ\n", + /* 32*/ "ØÉ‚¤´ÉåÑ€¾‚÷€à€Ë€Ï€´\n", + /* 33*/ "ƒä€‘€Ó€ùŽ‚„€ß‚„ÖҀЀ׀݀܂ó‚ô\n", + /* 34*/ "ƒä€’€Ó€ùŽ‚„€ß‚„Ò€ú€Ê€×悆‚øÄãÉ\n", + /* 35*/ "€í‹‚„€Ù’€ß‚„҂΂ςó‚ô\n", + /* 36*/ "€Õ€Ú€ÏŠ€öÒ‰€Æ‚„€ü‚„Џƒ…Ì‚ÙÅÉ\n", + /* 37*/ "ȼݴ̂ù¼¹ìµÎ»ðä€À\n", + /* 38*/ "»Ý€Ããó»»¹ðî€Â\n", + /* 39*/ "‚úÇ߀‚û‚ü‚ý‚þ´Ìâ߀Â\n", + /* 40*/ "‚€Ë€îÆâδ̀´\n", + /* 41*/ "‚ªóÜ»»¿àƒŒÁÅ䀴\n", + /* 42*/ "€Ð€û€û€Ü¼‚݃€ãð€Ž\n", + /* 43*/ "ºÒ‚Ü€ÈÃÏ»â\n", + /* 44*/ "˿ؽ䀴\n", + /* 45*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "€Õ€ð€Ü€Ñ\n", + /* 49*/ "€Õ€ð€Ü€Ñ\n", + /* 50*/ "€Õ€ð€Ü€Ñ¸‚ÝÏ‚öãÉ\n", + /* 51*/ "‚œ‚Ó‚óƒ…Ï€ú€Ê€×ÄãÌ»âï€Â\nƒä€‘€Ó€ùŽ‚„€ß‚„Ö̓†¿¼Òð€´\n", + /* 52*/ "ÈÒ€ì€÷Ó‚Î‚ÏÆâÒð€Â\n‚¥‚¦‚‚™æÝàãÌÅØ¼ï€´\n", + /* 53*/ "ƒ…Áƒ‰éƒŠæÎ»ß¼Ñ€Ž\n", + /* 54*/ "Ãニ‡Ë‚¥‚¦‚‚™¸‚çÉÇâ΀Â\nƒŒÁ€ì€÷”‚„€ãÖƒèÒð€´\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "€Õ‚„Š€Ö‚„\n", + /* 58*/ "€Õ‚„Š€Ö‚„\n", + /* 59*/ "€Õ€Ú€ÏŠ€öÒ€Ô€ë€Æ€ÜÒ\n€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 60*/ "€Ð€ö‚„€ð¸€´€€ó€áæƒÉ\n", + /* 61*/ "ƒ‘ƒ’Òƒ“‚ý߀´\n", + /* 62*/ "ÃãÓ€‚ƒ‚‹€Ž\n", + /* 63*/ "ôÃϾ‚Ÿ¿Â¿Åà€À\n", + /* 64*/ "ƒ”Ï‚ª¿ƒˆ€€Ô‹€Ú€î€À\n", + /* 65*/ "ÈÒ€š€¢¸ƒ•Æèƒ–Å΀´\n‚ª¸Å̻⿀忴ÌâÒ¿»€´\n", + /* 66*/ "‚ª¸´Ì€À\n‚ž‚ŸÆâðÂ߀Â\n", + /* 67*/ "ܼ€‘‚Ò‚©¼å€ƒ–ÅÎÄ»€´\nÈÅÌ€ƒ”Ò‡Ìóƒ™ÁÍ»»å€Ž\n", + /* 68*/ "ƒš»åÑ€ƒ»óâÒ€Â\n", + /* 69*/ "ºÒ€š€¢¸ƒ‡íƒ›áƒ–ÆÒð€Â\nºãæÎÁÌÓ‚ðƒœæ‚·ØÎ»ï€´\n", + /* 70*/ "å¿´Ìâ倴\n", + /* 71*/ "ƒžÏƒŸ¸Æãõ»»¿€å¿´Ìâå€Â\n€Ž€ï€Ü€ß‚„€…€Ö€Ë€÷€Ï€ã€Ï߀Â\n", + /* 72*/ "ÃÒ€ë€ú€Ð‚„Ò€Ó€ùŽ‚„€ß‚„ÒŠ€ÐÓ€ú€Ê€×ÄãÌ»ØÆ€Â\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/arkP.c b/src/files/lang/jap-final/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/jap-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_f.c b/src/files/lang/jap-final/ark_str_f.c new file mode 100644 index 000000000..6451563d5 --- /dev/null +++ b/src/files/lang/jap-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Réactiver l'ascenseur\n\nNous avons détecté la commande d'arrêt de fonctionnement de l'ascenseur donnée par un PC des bureaux inférieurs. Trouvez ce terminal et modifiez la commande pour réactiver l'ascenseur.\n\n|Objectif 3: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous interdire l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 5: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 4: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 3: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Accéder à l'ascenseur du hall\n", + /* 10*/ "Réactiver l'ascenseur du bureau\n", + /* 11*/ "Détruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour à l'héliport avec Dr. Caroll\n", + /* 14*/ "Accès paramètres ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommagé!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous êtes une sacrée peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning hélico.\n", + /* 27*/ "Obtenir Vue nocturne.\n", + /* 28*/ "Cassandra De Vries: \n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne\n", + /* 31*/ "Vue nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne éliminé.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme ça!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais dépêchez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voilà...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial détruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouillé le rez-de-chaussée - \nallez à l'ascenseur!\n", + /* 52*/ "Il faut détruire cet hélico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez à l'héliport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut mère-grand?\n", + /* 65*/ "Remettez-moi le sapiens immédiatement! Vous ne \nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la dernière fois: rendez ce qui \nm'appartient et je vous offre un poste.\n", + /* 68*/ "Désolée! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'opération en dépend.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi à qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable à cet étage.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_g.c b/src/files/lang/jap-final/ark_str_g.c new file mode 100644 index 000000000..33daba87e --- /dev/null +++ b/src/files/lang/jap-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Bürotrakt. Sie müssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Büro-Aufzug!\n", + /* 11*/ "Zerstören Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries' Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzüge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll wurde zerstört!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde beschädigt!\n", + /* 19*/ "Zu spät! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig lästig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät\n", + /* 31*/ "Nachtsichtgerät aufgenommen\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten\n", + /* 34*/ "Tür zum Büro-Aufzug entriegelt\n", + /* 35*/ "dataDyne-Gunship eliminiert\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hör auf mich zu nerven.\n", + /* 41*/ "Würdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu spät!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstört\n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kümmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurück zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Büro-Schlüsselkarte\n", + /* 58*/ "Büro-Schlüsselkarte\n", + /* 59*/ "Cassandras Büro-Schlüsselkarte aufgenommen\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas für dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurück! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurück, und Sie\nkönnten vielleicht in Zukunft für mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie müssen uns das Ding zurückbringen. Wir können \nsonst nicht fortfahren.\n", + /* 70*/ "Das weiß ich!\n", + /* 71*/ "Ich weiß auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstüren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_i.c b/src/files/lang/jap-final/ark_str_i.c new file mode 100644 index 000000000..d725498c6 --- /dev/null +++ b/src/files/lang/jap-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll è stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll è ferito!\n", + /* 19*/ "Troppo tardi! È già qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa così, idiota!\n", + /* 38*/ "Sì, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \nVa all'ascensore!\n", + /* 52*/ "Bisogna tirar giù quella cannoniera \no abbatterà la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \nTorna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: è qui!\n", + /* 61*/ "Ma chiudi il becco!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Ho da fare!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon è possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \ncon Carrington!\n", + /* 72*/ "La porta dell'ascensore è fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/ark_str_s.c b/src/files/lang/jap-final/ark_str_s.c new file mode 100644 index 000000000..2c90413ec --- /dev/null +++ b/src/files/lang/jap-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el único ascensor accesible enviada a un PC situado en el piso de oficinas más bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestíbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicóptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "¡LUCES ENCENDIDAS!\n", + /* 16*/ "¡El Dr. Caroll ha muerto!\n", + /* 17*/ "¡Están atacando al Dr. Caroll!\n", + /* 18*/ "¡El Dr. Caroll ha sido dañado!\n", + /* 19*/ "¡Demasiado tarde! Ella está aquí...\n", + /* 20*/ "Estás empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIÓN FALLADA\n", + /* 25*/ "MISIÓN CUMPLIDA\n", + /* 26*/ "Aviso del Helicóptero va aquí.\n", + /* 27*/ "Obtén Visión Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "V. Nocturna\n", + /* 30*/ "Visión Nocturna\n", + /* 31*/ "Visión Nocturna obtenida.\n", + /* 32*/ "¡Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestíbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicóptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "Así no es como va.\n", + /* 38*/ "Sí, así es.\n", + /* 39*/ "Dámelo. Lo estás haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "¡Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella está aquí...\n", + /* 44*/ "¡Cogedla!\n", + /* 45*/ "Objeto crítico de la misión destruido. \n", + /* 46*/ "Obtén la Cámara Espía.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Cámara Espía\n", + /* 49*/ "Una Cámara Espía\n", + /* 50*/ "Cámara Espía obtenida.\n", + /* 51*/ "Han cerrado la planta baja. \n¡Ve al ascensor!\n", + /* 52*/ "¡Necesitamos acabar con ese helicóptero, \no derribará la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obtén la llave magnética alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave de la oficina\n", + /* 58*/ "Llave magnética de la oficina\n", + /* 59*/ "Llave magnética de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: ¡ella está aquí!\n", + /* 61*/ "¡Luces fuera!\n", + /* 62*/ "¿Qué dem...?\n", + /* 63*/ "¿Vas a alguna parte?\n", + /* 64*/ "¿Puedo hacer algo por ti, anciana?\n", + /* 65*/ "¡Devuelve nuestra IA inmediatamente! No sabes \nlo que estás haciendo.\n", + /* 66*/ "Sí lo sé. Me largo.\n", + /* 67*/ "¡Otra oportunidad! Devuélvelo, y podrás \ntrabajar para mí.\n", + /* 68*/ "¡Lo siento! ¿Lo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "¡Ya lo sé!\n", + /* 71*/ "También sé con quién hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ashE.c b/src/files/lang/jap-final/ashE.c similarity index 100% rename from src/files/lang/ashE.c rename to src/files/lang/jap-final/ashE.c diff --git a/src/files/lang/ashJ.c b/src/files/lang/jap-final/ashJ.c similarity index 100% rename from src/files/lang/ashJ.c rename to src/files/lang/jap-final/ashJ.c diff --git a/src/files/lang/ashP.c b/src/files/lang/jap-final/ashP.c similarity index 100% rename from src/files/lang/ashP.c rename to src/files/lang/jap-final/ashP.c diff --git a/src/files/lang/ash_str_f.c b/src/files/lang/jap-final/ash_str_f.c similarity index 100% rename from src/files/lang/ash_str_f.c rename to src/files/lang/jap-final/ash_str_f.c diff --git a/src/files/lang/ash_str_g.c b/src/files/lang/jap-final/ash_str_g.c similarity index 100% rename from src/files/lang/ash_str_g.c rename to src/files/lang/jap-final/ash_str_g.c diff --git a/src/files/lang/ash_str_i.c b/src/files/lang/jap-final/ash_str_i.c similarity index 100% rename from src/files/lang/ash_str_i.c rename to src/files/lang/jap-final/ash_str_i.c diff --git a/src/files/lang/ash_str_s.c b/src/files/lang/jap-final/ash_str_s.c similarity index 100% rename from src/files/lang/ash_str_s.c rename to src/files/lang/jap-final/ash_str_s.c diff --git a/src/files/lang/ateE.c b/src/files/lang/jap-final/ateE.c similarity index 100% rename from src/files/lang/ateE.c rename to src/files/lang/jap-final/ateE.c diff --git a/src/files/lang/jap-final/ateJ.c b/src/files/lang/jap-final/ateJ.c new file mode 100644 index 000000000..848667c89 --- /dev/null +++ b/src/files/lang/jap-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nÃãæ‚­ƒ Ò€â€Ü€ãÍÎâ€Â€í€ú€þ€ö€ðƒ¡ƒ¢Ò€Û€ï€Ì€ö€Ï€ã¸‚ÙÇ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Òƒ£‚¢¸ƒ¤ìÌ»â€Í€Ð€Ï€ä€Â€ã€ù‚„€å€Ï€þóƒ¥Éƒ…ÌÒƒ¦ƒ§¸ƒ¨¿ÅÌ€€â€Ü€ãσ›áƒ©¹óÁã€Â‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒ¸‚ÙÇ\n\n‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒÒ€Û€ï€Ì€ö€Ï€ã¸‚ÙÆÒð€Â€Û€ï€Ì€ö€Ï€ãÒ€ùŽ€øÓƒªƒ«ƒ¬ð怃­ƒ®Óƒ¯ƒ°ðï€Â\n\n|‚µ‚¶€’€¾‚€Í€ä€Ú€Ï¸‚ÙÇ\n\nƒ•ƒ¬Ó€‚£‚¤ó€ã€Ê’Òƒ±ƒ²Ò‚€Í€ä€Ú€ÏÒ€Û€ï€Ì€ö€Ï€ã想‚Ýð€Â€Ù€Ñ€áÓ‚®ãɀـϋ€Ê€ã‚¢‚‚¸‚ÕÊ€ƒ­ƒ®Å̻ₗ҂ ƒ´¸ËÁÒæƒ¥ƒ´ð€Âƒµ¸ËÂä€Â\n\n|‚µ‚¶€“€¾€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ï¸‚ÙÇ\n\nƒ¶ƒ·Ò€Ó€÷‚„€ã¸‚ÙÆÒð€ÂÃÒ€Û€ï€Ì€ö€Ï€ãÓ€ƒ¸ƒ¹Ï‚݃º»ƒ³‚Ýðï€ÂÃø€×€÷€ÐóÀãõ€Ü¼‚ªÜƒ»ãâÜÒÓƒ¼»ðä¼€Â\n\nEND\n", + /* 1*/ "€ø€Ú‚„€Ï€…€ß€û‚„\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nÃãæ‚­ƒ Ò€â€Ü€ãÍÎâ€Â€í€ú€þ€ö€ðƒ¡ƒ¢Ò€Û€ï€Ì€ö€Ï€ã¸‚ÙÇ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Òƒ£‚¢¸ƒ¤ìÌ»â€Í€Ð€Ï€ä€Â€ã€ù‚„€å€Ï€þóƒ¥Éƒ…ÌÒƒ¦ƒ§¸ƒ¨¿ÅÌ€€â€Ü€ãσ›áƒ©¹óÁã€Â‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒ¸‚ÙÇ\n\n‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒÒ€Û€ï€Ì€ö€Ï€ã¸‚ÙÆÒð€Â€Û€ï€Ì€ö€Ï€ãÒ€ùŽ€øÓƒªƒ«ƒ¬ð怃­ƒ®Óƒ¯ƒ°ðï€Â\n\n|‚µ‚¶€’€¾‚€Í€ä€Ú€Ï¸‚ÙÇ\n\nƒ•ƒ¬Ó€‚£‚¤ó€ã€Ê’Òƒ±ƒ²Ò‚€Í€ä€Ú€ÏÒ€Û€ï€Ì€ö€Ï€ã想‚Ýð€Â€Ù€Ñ€áÓ‚®ãɀـϋ€Ê€ã‚¢‚‚¸‚ÕÊ€ƒ­ƒ®Å̻ₗ҂ ƒ´¸ËÁÒæƒ¥ƒ´ð€Âƒµ¸ËÂä€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nÃãæ‚­ƒ Ò€â€Ü€ãÍÎâ€Â€í€ú€þ€ö€ðƒ¡ƒ¢Ò€Û€ï€Ì€ö€Ï€ã¸‚ÙÇ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Òƒ£‚¢¸ƒ¤ìÌ»â€Í€Ð€Ï€ä€Â€ã€ù‚„€å€Ï€þóƒ¥Éƒ…ÌÒƒ¦ƒ§¸ƒ¨¿ÅÌ€€â€Ü€ãσ›áƒ©¹óÁã€Â‚³‚´¸»Òâ€Â\n\n|‚µ‚¶€‘€¾‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒ¸‚ÙÇ\n\n‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒÒ€Û€ï€Ì€ö€Ï€ã¸‚ÙÆÒð€Â€Û€ï€Ì€ö€Ï€ãÒ€ùŽ€øÓƒªƒ«ƒ¬ð怃­ƒ®Óƒ¯ƒ°ðï€Â\n\nEND\n", + /* 4*/ "‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒ¸‚ÙÇ\n", + /* 5*/ "‚€Í€ä€Ú€Ï¸‚ÙÇ\n", + /* 6*/ "€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ï¸‚ÙÇ\n", + /* 7*/ "ƒ½‚’\n", + /* 8*/ "‚—¸‚ÙÇ\n", + /* 9*/ "€¨€¤€´€‚§Òƒ¾Êð€´\n", + /* 10*/ "€¨€¤€´€‚§Òƒ¾Êð€´\n", + /* 11*/ "€¨€¤€´€‚§Òƒ¾Êð€´\n", + /* 12*/ "‚—Ò€ùŽ€ø€¾€Ó‚„‚€È€Ï€ã€ƒ€Ñ‚„‚‚„€„\n", + /* 13*/ "‚—Ò€ùŽ€ø€¾€ÐŠ‹€Ï€Ü€ã€ƒ€è‚„€î€ø€„\n", + /* 14*/ "‚—Ò€ùŽ€ø€¾‚„€ë€È€×€ã€ƒ€é‚„Š€„\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ateP.c b/src/files/lang/jap-final/ateP.c similarity index 100% rename from src/files/lang/ateP.c rename to src/files/lang/jap-final/ateP.c diff --git a/src/files/lang/jap-final/ate_str_f.c b/src/files/lang/jap-final/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/jap-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent expérimenté du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez être fière de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 10*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 11*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_g.c b/src/files/lang/jap-final/ate_str_g.c new file mode 100644 index 000000000..7eafe8c92 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines äußerst gefährlichen Regierungsagenten. Der Simulant ist ein überdurchschnittlich erfahrener Kämpfer. Wenn Sie diesen Test bestehen, dürfen Sie zu Recht stolz auf sich sein.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\nENDE\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUELL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Sie waren zu schnell für ihn!\n", + /* 10*/ "Sie waren zu schnell für ihn!\n", + /* 11*/ "Sie waren zu schnell für ihn!\n", + /* 12*/ "Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_i.c b/src/files/lang/jap-final/ate_str_i.c new file mode 100644 index 000000000..a8db21ab9 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante è un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilità avversario: AGENTE\n", + /* 13*/ "Livello abilità avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilità avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/ate_str_s.c b/src/files/lang/jap-final/ate_str_s.c new file mode 100644 index 000000000..77a8a0666 --- /dev/null +++ b/src/files/lang/jap-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulación de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podrás estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardián de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 10*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 11*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/aztE.c b/src/files/lang/jap-final/aztE.c similarity index 100% rename from src/files/lang/aztE.c rename to src/files/lang/jap-final/aztE.c diff --git a/src/files/lang/jap-final/aztJ.c b/src/files/lang/jap-final/aztJ.c new file mode 100644 index 000000000..a58cb47d8 --- /dev/null +++ b/src/files/lang/jap-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ó€øŒ€ÜÒƒ½‚°Òƒ¿‚‚ÒƒÀ€€“ËÒƒÁ‚ÚƒÂæ€Ð€ö€Ü€Õ‡ËƒÃóƒÄƒÅÅɀƒƃǃÈÒ‚Ú‚ÔÓ忴̻λ€ÂØÉ€‚±‚²ƒÉƒÊ惺Á‚ÈÇàãÌ»âÉÛ€‚ä‚…Ò‚¨ƒË‚™æƒÌ‚ØƒÍƒŠ¸‚È‚ÉóÀλó»âÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€ƒÍƒ“ƒÎó‚䂅҃σ¤‚݃ÐÓ€ÃÒ‚ƒ‚ÔƒÑ΀â€Ö€Ü€ã€ñ€Ê€Ý‚„‚€…€Û€Ü€â€ððÂð€Â‚§æ‚±‚²ƒÉƒÊ҂ȃ¤ƒÒ¸ƒ›á‚øÁÃÍæóÀãõ€‚ä‚…ÓƒÍƒŠ¸‚¹‚ÇÅ€ƒË¸‚¦âÃÍæóÀâ€ÂſŀƒÆƒÇƒÈ¸‚È‚ÉÅ€ÈÒƒÓƒ…¸‚¹‚ºÆâÃÍæ€ƒ•‚Ò‚­ÜƒÔƒƒÎ‚µ‚¶ð€Â\n\n|‚µ‚¶€‘€¾ƒÆƒÇƒÈ€ò€å€ß‚„¸‚ÒƒÕÇß\n\nÃÒ‚Í‚•Ó‚û½íƒÆƒÇƒÈ҃փ׃؃ÙÍ€÷€Ï€×Å̾á€Ããó‚Û҃փ׃؃ٸ€à€È€Ê€×ÆâÃÍæóÀâ€ÂƒÆƒÇƒÈÒƒÓƒ…¸‚¹‚ÇÆâÉÛ󇃃ð€Â\n\n|‚µ‚¶€’€¾€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤Çß\n\n‚ä‚…Ò‚¨ƒË‚™æ‚Ú‚ÄÅÝÆ»ß¼Ï€‚ž‚Ÿ”€ÊЏ…‰ƒÛÅÌ€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤ÄÇ̾ÁÒð€Â‚±‚²ƒÉƒÊ¸‚óƒ…σ›á‚øÁØóÓºØáƒÜƒÝæÎ»¿ÜÅãλæ€Â\n\n|‚µ‚¶€“€¾‚±‚²ƒÉƒÊ҂ȃ¤ƒÒ¸‚΂ÏÇß\n\nƒÞƒß‚¢Î‚ȃ¤‚Í‚•¿à€ÃÒ€Ó€÷€Ð‚ƒ‚‹Ï‚ðáÅãλ×ôÒ‚±‚²ƒÉƒÊæƒàゟ̻â€Â‡ËƒÃÏ»â‚ä‚…ÒƒÁ‚Ú‚‚™ßáÜ€‚˜‡ËÏ»â‚§Ò‚Ôæƒáƒâςȃ¤ƒÒ¸ËÀÍÛâÃÍæóÀâóºä¼€Â‚ȂɃãƒä€ƒåÊÏÈ҂ȃ¤ƒÒ¸‚Î‚ÏÆâÒð€ÂÃãó‚ä‚…Ò‚¨ƒË‚™æ‚§ÉÊ҃惊ƒç¸ËÀÍÛ€ƒËÂσ†¿½âÓíð€Â\n\n|‚µ‚¶€”€¾ƒÆƒÇƒÈÒ€×€ú‚„€Ï¸‚ÙÇ\n\nƒÆƒÇƒÈ€ò€å€ß‚„ÏÓ€’ËÒƒ¨ƒéƒêƒë悹‚ÇóÀâ€ÂËØá€ƒÆƒÇƒÈÒ€×€ú‚„€ÏæÈÒƒìáÏ»âÍ»¼ÃÍÏÎâ€Â€å€Ý€ò€è¸‚É‚Î´Ì‚ÙÆÒð€Â\n\n|‚µ‚¶€•€¾ƒÆƒÇƒÈ¸‚È‚ÉÅ‚¨ƒËÇß\n\nÃãÓ‚­ÜƒÞ»’€ö€Ñ€Ô€÷€â€ÆÒ‚µ‚¶ð€ÂƒÆƒÇƒÈÒƒÓƒ…Ó€‚ªßáÜ‚®‚¯Äãâ€Â‚§Ó‚¨ƒñ‚™æƒòƒóÆâ¿€ƒôƒõæ‚óƒ…σöâØóƒÆƒÇƒÈ¸€ü‚„ŠÅÎÁÌÓÎàλ€Â\n\nEND\n", + /* 1*/ "ƒÌ‚؃̓Š\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ó€øŒ€ÜÒƒ½‚°Òƒ¿‚‚ÒƒÀ€€“ËÒƒÁ‚ÚƒÂæ€Ð€ö€Ü€Õ‡ËƒÃóƒÄƒÅÅɀƒƃǃÈÒ‚Ú‚ÔÓ忴̻λ€ÂØÉ€‚±‚²ƒÉƒÊ惺Á‚ÈÇàãÌ»âÉÛ€‚ä‚…Ò‚¨ƒË‚™æƒÌ‚ØƒÍƒŠ¸‚È‚ÉóÀλó»âÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€ƒÍƒ“ƒÎó‚䂅҃σ¤‚݃ÐÓ€ÃÒ‚ƒ‚ÔƒÑ΀â€Ö€Ü€ã€ñ€Ê€Ý‚„‚€…€Û€Ü€â€ððÂð€Â‚§æ‚±‚²ƒÉƒÊ҂ȃ¤ƒÒ¸ƒ›á‚øÁÃÍæóÀãõ€‚ä‚…ÓƒÍƒŠ¸‚¹‚ÇÅ€ƒË¸‚¦âÃÍæóÀâ€ÂſŀƒÆƒÇƒÈ¸‚È‚ÉÅ€ÈÒƒÓƒ…¸‚¹‚ºÆâÃÍæ€ƒ•‚Ò‚­ÜƒÔƒƒÎ‚µ‚¶ð€Â\n\n|‚µ‚¶€‘€¾ƒÆƒÇƒÈ€ò€å€ß‚„¸‚ÒƒÕÇß\n\nÃÒ‚Í‚•Ó‚û½íƒÆƒÇƒÈ҃փ׃؃ÙÍ€÷€Ï€×Å̾á€Ããó‚Û҃փ׃؃ٸ€à€È€Ê€×ÆâÃÍæóÀâ€ÂƒÆƒÇƒÈÒƒÓƒ…¸‚¹‚ÇÆâÉÛ󇃃ð€Â\n\n|‚µ‚¶€’€¾€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤Çß\n\n‚ä‚…Ò‚¨ƒË‚™æ‚Ú‚ÄÅÝÆ»ß¼Ï€‚ž‚Ÿ”€ÊЏ…‰ƒÛÅÌ€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤ÄÇ̾ÁÒð€Â‚±‚²ƒÉƒÊ¸‚óƒ…σ›á‚øÁØóÓºØáƒÜƒÝæÎ»¿ÜÅãλæ€Â\n\n|‚µ‚¶€“€¾ƒÆƒÇƒÈÒ€×€ú‚„€Ï¸‚ÙÇ\n\nƒÆƒÇƒÈ€ò€å€ß‚„ÏÓ€’ËÒƒ¨ƒéƒêƒë悹‚ÇóÀâ€ÂËØá€ƒÆƒÇƒÈÒ€×€ú‚„€ÏæÈÒƒìáÏ»âÍ»¼ÃÍÏÎâ€Â€å€Ý€ò€è¸‚É‚Î´Ì‚ÙÆÒð€Â\n\n|‚µ‚¶€”€¾ƒÆƒÇƒÈ¸‚È‚ÉÅ‚¨ƒËÇß\n\nÃãÓ‚­ÜƒÞ»’€ö€Ñ€Ô€÷€â€ÆÒ‚µ‚¶ð€ÂƒÆƒÇƒÈÒƒÓƒ…Ó€‚ªßáÜ‚®‚¯Äãâ€Â‚§Ó‚¨ƒñ‚™æƒòƒóÆâ¿€ƒôƒõæ‚óƒ…σöâØóƒÆƒÇƒÈ¸€ü‚„ŠÅÎÁÌÓÎàλ€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ó€øŒ€ÜÒƒ½‚°Òƒ¿‚‚ÒƒÀ€€“ËÒƒÁ‚ÚƒÂæ€Ð€ö€Ü€Õ‡ËƒÃóƒÄƒÅÅɀƒƃǃÈÒ‚Ú‚ÔÓ忴̻λ€ÂØÉ€‚±‚²ƒÉƒÊ惺Á‚ÈÇàãÌ»âÉÛ€‚ä‚…Ò‚¨ƒË‚™æƒÌ‚ØƒÍƒŠ¸‚È‚ÉóÀλó»âÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚€Í€Ð€Ï€ä€ƒÍƒ“ƒÎó‚䂅҃σ¤‚݃ÐÓ€ÃÒ‚ƒ‚ÔƒÑ΀â€Ö€Ü€ã€ñ€Ê€Ý‚„‚€…€Û€Ü€â€ððÂð€Â‚§æ‚±‚²ƒÉƒÊ҂ȃ¤ƒÒ¸ƒ›á‚øÁÃÍæóÀãõ€‚ä‚…ÓƒÍƒŠ¸‚¹‚ÇÅ€ƒË¸‚¦âÃÍæóÀâ€ÂſŀƒÆƒÇƒÈ¸‚È‚ÉÅ€ÈÒƒÓƒ…¸‚¹‚ºÆâÃÍæ€ƒ•‚Ò‚­ÜƒÔƒƒÎ‚µ‚¶ð€Â\n\n|‚µ‚¶€‘€¾€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤Çß\n\n‚ä‚…Ò‚¨ƒË‚™æ‚Ú‚ÄÅÝÆ»ß¼Ï€‚ž‚Ÿ”€ÊЏ…‰ƒÛÅÌ€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤ÄÇ̾ÁÒð€Â‚±‚²ƒÉƒÊ¸‚óƒ…σ›á‚øÁØóÓºØáƒÜƒÝæÎ»¿ÜÅãλæ€Â\n\n|‚µ‚¶€’€¾ƒÆƒÇƒÈÒ€×€ú‚„€Ï¸‚ÙÇ\n\nƒÆƒÇƒÈ€ò€å€ß‚„ÏÓ€’ËÒƒ¨ƒéƒêƒë悹‚ÇóÀâ€ÂËØá€ƒÆƒÇƒÈÒ€×€ú‚„€ÏæÈÒƒìáÏ»âÍ»¼ÃÍÏÎâ€Â€å€Ý€ò€è¸‚É‚Î´Ì‚ÙÆÒð€Â\n\n|‚µ‚¶€“€¾ƒÆƒÇƒÈ¸‚È‚ÉÅ‚¨ƒËÇß\n\nÃãÓ‚­ÜƒÞ»’€ö€Ñ€Ô€÷€â€ÆÒ‚µ‚¶ð€ÂƒÆƒÇƒÈÒƒÓƒ…Ó€‚ªßáÜ‚®‚¯Äãâ€Â‚§Ó‚¨ƒñ‚™æƒòƒóÆâ¿€ƒôƒõæ‚óƒ…σöâØóƒÆƒÇƒÈ¸€ü‚„ŠÅÎÁÌÓÎàλ€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ƒÆƒÇƒÈ€ò€å€ß‚„¸‚ÒƒÕÇß\n", + /* 6*/ "€¬€¨€¬ƒ¤ƒÚ¸‚ȃ¤Çß\n", + /* 7*/ "‚±‚²ƒÉƒÊ҂ȃ¤ƒÒ¸‚΂ÏÇß\n", + /* 8*/ "ƒÆƒÇƒÈÒ€×€ú‚„€Ï¸‚ÙÇ\n", + /* 9*/ "ƒÆƒÇƒÈ¸‚È‚ÉÅ‚¨ƒËÇß\n", + /* 10*/ "ºãÓ‚ž‚Ÿ”€ÊŠð倴\n", + /* 11*/ "€¬€¨€¬ƒ¤ƒÚ҂ȃ¤‚Í‚•æ‚ϺâÓíðå€Â\n", + /* 12*/ "‚±‚²ƒÉƒÊӀހºÒƒù¿à‚ŸÌ»âÒÑ€Â\n", + /* 13*/ "€Ó€øŒ€Ü€Ž€‚ÛæƒÆƒÇƒÈÒƒú‚Ù¸‚ÉÌÁãâåÑ€Â\n", + /* 14*/ "€¬€¨€¬ƒ¤ƒÚ҂ȃ¤‚ó‚ô\n", + /* 15*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "ƒÆƒÇƒÈ€ò€å€ß‚„\n", + /* 20*/ "ƒÆƒÇƒÈ€ò€å€ß‚„¸‚ÝÏ‚öãÉ\n", + /* 21*/ "‚±‚²ƒÉƒÊ҂ȃ¤ƒÒæ‚΂ÏÄãÉ\n", + /* 22*/ "ƒÆƒÇƒÈæ‚ÙÄãÉ\n", + /* 23*/ "ƒÆƒÇƒÈÒ€×€ú‚„€Ïæ‚ÙãÉ\n", + /* 24*/ "€Ð‹€õ€ƒÆƒÇƒÈ€´\n", + /* 25*/ "ƒÆƒÇƒÈ您‚ŸÄãÉ\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 29*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 30*/ "€ä€Ñ€ã€Ð€Ñ¸‚ÝÏ‚öãÉ\n", + /* 31*/ "Ã㸂մ̻ÁÍ»»€À´ÍƒûσüË߀´\n", + /* 32*/ "€Ò€Ç€Ç€Ž\n", + /* 33*/ "€Ð€Å€Å€€Ò€Ç€Ç€Ž\n", + /* 34*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×€ƒëƒýÇ߀´\n", + /* 35*/ "ƒþý⿀€Ó‚„‚€È€Ï€ã€…†‚„€×€´\n", + /* 36*/ "ÃÊà€Ó‚„‚€È€Ï€ã€…†‚„€×€Ž\n", + /* 37*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×€ƒëƒýÇ߀´\n", + /* 38*/ "ƒÏƒ¤æ‚±‚²ÄãÌ»âÙÉ»€Ž\n‚¼ÁÏ‚ª¿ºâÒ¿Åà€Â\n", + /* 39*/ "€Ó€øŒ€ÜÓƒ¼„¿Åà€Ž\nȼȼ€ƒÆƒÇƒÈ¸„€ÄÎÀµ€Â\n", + /* 40*/ "„‚„ƒÓô¼€À€ƒÆƒÇƒÈ€Â\n", + /* 41*/ "¿Îá€î€ÛÏδÉ߀Â\nſŀã€ù€Ï€ãÛ€Ž\np€ó€áæ„…„†„‡óºâÃÍÓ\nƒ¿àƒµò»Ì»Éæ€ÃÃØóÍÓ€Ž\n", + /* 42*/ "€ã€ù€Ï€ãÉÊæƒ‡‚°Ïδ̻â\n€‡“€ö‚€Ê€×€’€ˆÍÓ‚ªÎÒ€À\n", + /* 43*/ "ƒ¶ƒ·Ò„‰„Š„€„‹„Œð€Â\np‚­„‰„Šó„„ŽƒÛ„æ‚Ú½â\n„„‘„’‚ƒÒƒùð€Â\np»´É»€ó€áàÓ‚ªæ„—ƒÑιð€À\n", + /* 44*/ "€ã€ù€Ï€ã¸€„¤»ËÛÎÀµ€Â\nóÜ€ôÃÏ»âÒ¿Åà€Ž\n", + /* 45*/ "€ã€ù€Ï€ã€ØÉÅÁì´É΀´\n¾ƒÒ߼΀ó€áÏ€ÜÓ݃ˆÓƒ¼»€Â\n", + /* 46*/ "Ý´ÌÙÝæã€ÃÒ„™„š€ó€ú‚„€´\n", + /* 47*/ "€§€¨€´€´€´€´\n", +}; diff --git a/src/files/lang/jap-final/aztP.c b/src/files/lang/jap-final/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/jap-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_f.c b/src/files/lang/jap-final/azt_str_f.c new file mode 100644 index 000000000..cd43a5d4f --- /dev/null +++ b/src/files/lang/jap-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Désactiver appareil brouillage\n\nUn système ennemi sophistiqué inonde le secteur d'un brouillage CME impénétrable. Vous pourrez déterminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouvé, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 5: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 4: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 3: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Récupérer scanner médical présidentiel\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Désactiver appareil brouillage\n", + /* 8*/ "Eliminer le clone du Président\n", + /* 9*/ "Trouver et sauver le Président\n", + /* 10*/ "Voilà le point d'évacuation. \n", + /* 11*/ "Le signal peut venir de là. \n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau. \n", + /* 13*/ "Elvis... Il pourra protéger le Président.\n", + /* 14*/ "Signal de détresse activé.\n", + /* 15*/ "Objet crucial détruit.\n", + /* 16*/ "Obtenir le scanner présidentiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner présidentiel\n", + /* 20*/ "Scanner présidentiel obtenu.\n", + /* 21*/ "Appareil de brouillage désactivé.\n", + /* 22*/ "Le Président a été abattu.\n", + /* 23*/ "Clone présidentiel éliminé.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Président sauvé.\n", + /* 26*/ "Obtenir Vue nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vue nocturne\n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne obtenue.\n", + /* 31*/ "Prends ceci. Cela te sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, répondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-être de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne santé. Sans oublier le Président...\n", + /* 40*/ "Comment vous sentez-vous, M. le Président?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journée. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement américain. Un modèle unique pouvant mener des expériences à de grandes profondeurs. Trent a formulé une demande de prêt au nom de la dataDyne Corporation. J'ai refusé.\n", + /* 44*/ "Trent devra répondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez échoué, Easton. Vous êtes un élément corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est ça oui. Pétasse suédoise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_g.c b/src/files/lang/jap-final/azt_str_g.c new file mode 100644 index 000000000..948911bfc --- /dev/null +++ b/src/files/lang/jap-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Deaktivieren Sie den ECM-Generator!\n\nEin High-Tech ECM-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des Dämpfungs-Signals ausfindig zu machen, als unsere Luft-Aufklärer. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann können wir Sie orten und Ihnen zu Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|2. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Präsidenten-Klon!\n", + /* 9*/ "Orten und retten Sie den Präsidenten!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das Dämpfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Präsidenten zu beschützen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstört\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen\n", + /* 21*/ "ECM-Generator deaktiviert\n", + /* 22*/ ".\n", + /* 23*/ "Präsidenten-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Der Präsident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtgerät\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät aufgenommen\n", + /* 31*/ "Nimm das; es wird sich als nützlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestört... Das Signal kommt von dort drüben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Präsidenten retten.\n", + /* 40*/ "Wie fühlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht länger von Nutzen.\n", + /* 46*/ "Versuch's nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_i.c b/src/files/lang/jap-final/azt_str_i.c new file mode 100644 index 000000000..d09b617ee --- /dev/null +++ b/src/files/lang/jap-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere più facile localizzarla e disattivarla. Fatto ciò potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si può mandare un segnale da lì!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Può proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente è stato ucciso.\n", + /* 23*/ "Il clone del Presidente è stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente è stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sarà utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C'è qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorrà un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo sì che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos'è il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "È un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondità oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi più!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/jap-final/azt_str_s.c b/src/files/lang/jap-final/azt_str_s.c new file mode 100644 index 000000000..4ae153923 --- /dev/null +++ b/src/files/lang/jap-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo está inundando el área con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra más efectivamente de lo que nuestros aviones espía están haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posición y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar escáner médico del Presidente\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "Apagar la señal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ahí está la cápsula de escape.\n", + /* 11*/ "Quizá haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... Él será capaz de proteger al Presidente.\n", + /* 14*/ "Señal de socorro activada.\n", + /* 15*/ "Objeto crítico de la misión destruido.\n", + /* 16*/ "Obtén el Escáner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Escáner Presidencial\n", + /* 20*/ "Escáner Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "¡Ahora ya no podrás salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obtén Visión Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "V. Nocturna\n", + /* 29*/ "Visión Nocturna\n", + /* 30*/ "Visón Nocturna obtenida.\n", + /* 31*/ "Toma esto, ¡lo encontrarás muy útil!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "¡Agente Dark! ¡Informe, por favor!\n", + /* 35*/ "¡Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "¡Agente Dark! ¡Por favor, responda!\n", + /* 38*/ "Algo está bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis está bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "¿Cómo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo así. Sabía que era ambicioso, sí, pero esto...\n", + /* 42*/ "Sólo una cosa, señor. ¿Qué es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navío de investigación de profundidad del gobierno norteamericano, único en su clase... El único barco capaz de dirigir una operación a gran escala a profundidad extrema. Trent quería que se lo prestara a la Corporación dataDyne, pero rehusé.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "¡Inténtalo, mamarracho escandinavo!\n", + /* 47*/ "¡¡¡Noooooooo!!!\n", +}; diff --git a/src/files/lang/catE.c b/src/files/lang/jap-final/catE.c similarity index 100% rename from src/files/lang/catE.c rename to src/files/lang/jap-final/catE.c diff --git a/src/files/lang/catJ.c b/src/files/lang/jap-final/catJ.c similarity index 100% rename from src/files/lang/catJ.c rename to src/files/lang/jap-final/catJ.c diff --git a/src/files/lang/catP.c b/src/files/lang/jap-final/catP.c similarity index 100% rename from src/files/lang/catP.c rename to src/files/lang/jap-final/catP.c diff --git a/src/files/lang/cat_str_f.c b/src/files/lang/jap-final/cat_str_f.c similarity index 100% rename from src/files/lang/cat_str_f.c rename to src/files/lang/jap-final/cat_str_f.c diff --git a/src/files/lang/cat_str_g.c b/src/files/lang/jap-final/cat_str_g.c similarity index 100% rename from src/files/lang/cat_str_g.c rename to src/files/lang/jap-final/cat_str_g.c diff --git a/src/files/lang/cat_str_i.c b/src/files/lang/jap-final/cat_str_i.c similarity index 100% rename from src/files/lang/cat_str_i.c rename to src/files/lang/jap-final/cat_str_i.c diff --git a/src/files/lang/cat_str_s.c b/src/files/lang/jap-final/cat_str_s.c similarity index 100% rename from src/files/lang/cat_str_s.c rename to src/files/lang/jap-final/cat_str_s.c diff --git a/src/files/lang/caveE.c b/src/files/lang/jap-final/caveE.c similarity index 100% rename from src/files/lang/caveE.c rename to src/files/lang/jap-final/caveE.c diff --git a/src/files/lang/jap-final/caveJ.c b/src/files/lang/jap-final/caveJ.c new file mode 100644 index 000000000..e1dafa37b --- /dev/null +++ b/src/files/lang/jap-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Û€Õ€Ò€ï‚„€â€Æ€Ï€þϻɇɻ„›Ò„œÓ€„„ž„Ÿ„ „¡„¢Ò€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ïð€Â€ó€áӃƃǃÈÒ„Š‚–„£„¤Ò„¥ƒŽÒÉÛπЀö€Ü€Õ҃Ħ„§‚˜ÖÍ„¨‚ÄÅÌ»â€ÂºÒƒ“Ҁ€â€Æ€Ï€þÏßãõ€€ó€áàÓÃÃ¿àƒÆƒÇƒÈÖÒ‚ „©Î‚ÄÀ¸€Ü€ß‚„€ãÄÇâÜÒÍ„ªåãâ€ÂÈ㸄«„¬ÇÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ•‚ÒÓ„­Ï„®ƒ´æƒ‡ƒƒð€Í€Ð€Ï€ä€ÂƒÃ„¦„§‚˜ÏÓ€€ã€ù€Ï€ãÉÊÒ„…„¯ÏÓ‚ªÒ‚„°Üλ„±ÜÉÁĹƒ™»Ì»â€ÂºÁØóÜ€ã€ù€Ï€ãÒ„²‚¼Í€€ï‚„€â€Æ€Ï€þϻɂ ƒµ„³Î„™„š„œðÂæ€ƒ•‚ÒÒ„´ƒÑð€ÂóÀâð„µÁ‚Ê‚ÍÅÌ»É‚Ôæ€ƒ±„¶Ò‚¡‚¢ƒßÓƒÞÁÎâðä¼€Â\n\n|‚µ‚¶€‘€¾€Ü€à€Ì€û‚„‰€ÜςʂÍÇß\n\n„·„¸‚Ÿ‚鮉ĮƒÇƒÈ„¹ƒˆƒÂҀ܀à€Ì€û‚„‰€Üæ€ØÜÎÁ€Ø‚„€ø€Õ‚„óÈÊàσòƒóÆâ€Â‚Û‚ÜÒ‹€Ê€þÒ‚ÏÓ€ô€å€ë€É‚„€ðæºâÓíð€Â‚Û‚ÜÍÈÒ€ü‚„Š€î€ÏÏÓ„º´ÌÜເ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€Èãó‚Ê‚ÍÅÌ„§‚˜Ö‚öâÒð€Â‚Û‚ÜÉÊÓ€ã€ù€Ï€ãÒ„…„¯ÍÓ‚ªÒ‚„°Üλ„±ÉÊÎÒó€ÁãèãÜ‚àó‚×´ÉáÅλ߼πÂ\n\n|‚µ‚¶€’€¾‚ÍƒŽ„»¸„¼Ù‚ÁÛ\n\n‚Ì„½ÎôÒ„¾Å»‚Õʃ°ó‚§Ò‚Ê‚Íæ‚É‚Îàãλ߼π‚ÍƒŽ„»¸ÎâøÁƒŒÁ‚«¿à‚–ÅÌ€‚Ý„¿ƒ°„¼Ù‚ÁÙƒˆÒ€Ù€ÏŽ€ÐÏÒÇâÒð€ÂÍáº½í€‚ÍƒŽ„»¸ƒÕ„ÁóÀâ€Ø‚„€Ü¸ÄæÆƒ‡ƒƒæºâ΀Â\n\n|‚µ‚¶€“€¾‚Ý„¿ƒ°„„‹€Û€Ü€â€ð¸„–ã\n\n‚Ê‚ÍÏßᄱÓðØÆÃÍæóÀâð伿„¿ƒ°ÏÓƒÿÒ‚ü„Ãæƒ‡ƒƒÍÎâ€Â‚§Ò„ÄÂÉ‚ÍƒŽ„»¿à‚Ì„½Îôæ„€„ÅÄããõ€ÆèπЀö‚„€ðæÎင§‚˜Ó€ú€Ê€×ÄãÌÅØ¼óºä¼€Â‚Ý„¿ƒ°„„‹€Û€Ü€â€ðҀ܀рʀขȂÉÅ€Ã㸀¨€Ÿ€ŸÏÇ߀Â\n\n|‚µ‚¶€”€¾€ë€ö€Ñ€ã€…’€ö€Ï¸‚ö‚ÝÇß\n\nƒÆƒÇƒÈ„¹ƒˆƒÂ҄ƄDŽȂ¸„Éæ„§‚˜Ò„™„ÊÏ‚º‚éÄãÌ»â€Â‚§æÃ㸂ö‚ÝÆãõ€€ÑÍ»¼ÍÀÏ€ÈÒ‰‚„€ß¸ÜÍÏ€Ó€øŒ€Ü¸ÈÊàσ†¿åÇâÃÍæóÀâ€Â\n\n|‚µ‚¶€•€¾ƒÆƒÇƒÈ„¹ƒˆƒÂτ˂ÀÇß\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÒ„Ì„ÍÏ€‚ÀჀãÎ»ß¼ÏÆâÒð€Â‚Ê‚ÍÒƒÜƒÝæØðƒáƒÜóºãõ€€Û€Ë€ã€ø¸‚ù´Ì„Ë‚ÀóÀâÓíð€ÂÈãæ†€ñÎƒŠ„ÎÓ€‚ª¿ƒÿ҂Ԅϸ„н⃇ƒƒæºâðä¼€Â\n\nEND\n", + /* 1*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ€ß‚„€ï€ä€ø€€Ð€ö€Ü€ÕƒÃ„¦„§‚˜€\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Û€Õ€Ò€ï‚„€â€Æ€Ï€þϻɇɻ„›Ò„œÓ€„„ž„Ÿ„ „¡„¢Ò€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ïð€Â€ó€áӃƃǃÈÒ„Š‚–„£„¤Ò„¥ƒŽÒÉÛπЀö€Ü€Õ҃Ħ„§‚˜ÖÍ„¨‚ÄÅÌ»â€ÂºÒƒ“Ҁ€â€Æ€Ï€þÏßãõ€€ó€áàÓÃÃ¿àƒÆƒÇƒÈÖÒ‚ „©Î‚ÄÀ¸€Ü€ß‚„€ãÄÇâÜÒÍ„ªåãâ€ÂÈ㸄«„¬ÇÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ•‚ÒÓ„­Ï„®ƒ´æƒ‡ƒƒð€Í€Ð€Ï€ä€ÂƒÃ„¦„§‚˜ÏÓ€€ã€ù€Ï€ãÉÊÒ„…„¯ÏÓ‚ªÒ‚„°Üλ„±ÜÉÁĹƒ™»Ì»â€ÂºÁØóÜ€ã€ù€Ï€ãÒ„²‚¼Í€€ï‚„€â€Æ€Ï€þϻɂ ƒµ„³Î„™„š„œðÂæ€ƒ•‚ÒÒ„´ƒÑð€ÂóÀâð„µÁ‚Ê‚ÍÅÌ»É‚Ôæ€ƒ±„¶Ò‚¡‚¢ƒßÓƒÞÁÎâðä¼€Â\n\n|‚µ‚¶€‘€¾€Ü€à€Ì€û‚„‰€ÜςʂÍÇß\n\n„·„¸‚Ÿ‚鮉ĮƒÇƒÈ„¹ƒˆƒÂҀ܀à€Ì€û‚„‰€Üæ€ØÜÎÁ€Ø‚„€ø€Õ‚„óÈÊàσòƒóÆâ€Â‚Û‚ÜÒ‹€Ê€þÒ‚ÏÓ€ô€å€ë€É‚„€ðæºâÓíð€Â‚Û‚ÜÍÈÒ€ü‚„Š€î€ÏÏÓ„º´ÌÜເ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€Èãó‚Ê‚ÍÅÌ„§‚˜Ö‚öâÒð€Â‚Û‚ÜÉÊÓ€ã€ù€Ï€ãÒ„…„¯ÍÓ‚ªÒ‚„°Üλ„±ÉÊÎÒó€ÁãèãÜ‚àó‚×´ÉáÅλ߼πÂ\n\n|‚µ‚¶€’€¾‚ÍƒŽ„»¸„¼Ù‚ÁÛ\n\n‚Ì„½ÎôÒ„¾Å»‚Õʃ°ó‚§Ò‚Ê‚Íæ‚É‚Îàãλ߼π‚ÍƒŽ„»¸ÎâøÁƒŒÁ‚«¿à‚–ÅÌ€‚Ý„¿ƒ°„¼Ù‚ÁÙƒˆÒ€Ù€ÏŽ€ÐÏÒÇâÒð€ÂÍáº½í€‚ÍƒŽ„»¸ƒÕ„ÁóÀâ€Ø‚„€Ü¸ÄæÆƒ‡ƒƒæºâ΀Â\n\n|‚µ‚¶€“€¾‚Ý„¿ƒ°„„‹€Û€Ü€â€ð¸„–ã\n\n‚Ê‚ÍÏßᄱÓðØÆÃÍæóÀâð伿„¿ƒ°ÏÓƒÿÒ‚ü„Ãæƒ‡ƒƒÍÎâ€Â‚§Ò„ÄÂÉ‚ÍƒŽ„»¿à‚Ì„½Îôæ„€„ÅÄããõ€ÆèπЀö‚„€ðæÎင§‚˜Ó€ú€Ê€×ÄãÌÅØ¼óºä¼€Â‚Ý„¿ƒ°„„‹€Û€Ü€â€ðҀ܀рʀขȂÉÅ€Ã㸀¨€Ÿ€ŸÏÇ߀Â\n\n|‚µ‚¶€”€¾ƒÆƒÇƒÈ„¹ƒˆƒÂτ˂ÀÇß\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÒ„Ì„ÍÏ€‚ÀჀãÎ»ß¼ÏÆâÒð€Â‚Ê‚ÍÒƒÜƒÝæØðƒáƒÜóºãõ€€Û€Ë€ã€ø¸‚ù´Ì„Ë‚ÀóÀâÓíð€ÂÈãæ†€ñÎƒŠ„ÎÓ€‚ª¿ƒÿ҂Ԅϸ„н⃇ƒƒæºâðä¼€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Û€Õ€Ò€ï‚„€â€Æ€Ï€þϻɇɻ„›Ò„œÓ€„„ž„Ÿ„ „¡„¢Ò€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ïð€Â€ó€áӃƃǃÈÒ„Š‚–„£„¤Ò„¥ƒŽÒÉÛπЀö€Ü€Õ҃Ħ„§‚˜ÖÍ„¨‚ÄÅÌ»â€ÂºÒƒ“Ҁ€â€Æ€Ï€þÏßãõ€€ó€áàÓÃÃ¿àƒÆƒÇƒÈÖÒ‚ „©Î‚ÄÀ¸€Ü€ß‚„€ãÄÇâÜÒÍ„ªåãâ€ÂÈ㸄«„¬ÇÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ•‚ÒÓ„­Ï„®ƒ´æƒ‡ƒƒð€Í€Ð€Ï€ä€ÂƒÃ„¦„§‚˜ÏÓ€€ã€ù€Ï€ãÉÊÒ„…„¯ÏÓ‚ªÒ‚„°Üλ„±ÜÉÁĹƒ™»Ì»â€ÂºÁØóÜ€ã€ù€Ï€ãÒ„²‚¼Í€€ï‚„€â€Æ€Ï€þϻɂ ƒµ„³Î„™„š„œðÂæ€ƒ•‚ÒÒ„´ƒÑð€ÂóÀâð„µÁ‚Ê‚ÍÅÌ»É‚Ôæ€ƒ±„¶Ò‚¡‚¢ƒßÓƒÞÁÎâðä¼€Â\n\n|‚µ‚¶€‘€¾€Ü€à€Ì€û‚„‰€ÜςʂÍÇß\n\n„·„¸‚Ÿ‚鮉ĮƒÇƒÈ„¹ƒˆƒÂҀ܀à€Ì€û‚„‰€Üæ€ØÜÎÁ€Ø‚„€ø€Õ‚„óÈÊàσòƒóÆâ€Â‚Û‚ÜÒ‹€Ê€þÒ‚ÏÓ€ô€å€ë€É‚„€ðæºâÓíð€Â‚Û‚ÜÍÈÒ€ü‚„Š€î€ÏÏÓ„º´ÌÜເ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€Èãó‚Ê‚ÍÅÌ„§‚˜Ö‚öâÒð€Â‚Û‚ÜÉÊÓ€ã€ù€Ï€ãÒ„…„¯ÍÓ‚ªÒ‚„°Üλ„±ÉÊÎÒó€ÁãèãÜ‚àó‚×´ÉáÅλ߼πÂ\n\n|‚µ‚¶€’€¾‚Ý„¿ƒ°„„‹€Û€Ü€â€ð¸„–ã\n\n‚Ê‚ÍÏßᄱÓðØÆÃÍæóÀâð伿‚Ý„¿ƒ°ÏÓƒÿÒ‚ü„Ãæƒ‡ƒƒÍÎâ€Â‚§Ò‚ÕË‚ÍƒŽ„»¿à‚Ì„½Îôæ„€„ÅÄããõ€ÆèπЀö‚„€ðæÎင§‚˜Ó€ú€Ê€×ÄãÌÅØ¼óºä¼€Â‚Ý„¿ƒ°„„‹€Û€Ü€â€ðҀ܀рʀขȂÉÅ€Ã㸀¨€Ÿ€ŸÏÇ߀Â\n\n|‚µ‚¶€“€¾ƒÆƒÇƒÈ„¹ƒˆƒÂτ˂ÀÇß\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÒ„Ì„ÍÏ€‚ÀჀãÎ»ß¼ÏÆâÒð€Â‚Ê‚ÍÒƒÜƒÝæØðƒáƒÜóºãõ€€Û€Ë€ã€ø¸‚ù´Ì„Ë‚ÀóÀâÓíð€ÂÈãæ†€ñÎƒŠ„ÎÓ€‚ª¿ƒÿ҂Ԅϸ„н⃇ƒƒæºâðä¼€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "€Ü€à€Ì€û‚„‰€ÜςʂÍÇß\n", + /* 6*/ "‚ÍƒŽ„»¸„¼Ù‚ÁÛ\n", + /* 7*/ "‚Ý„¿ƒ°„„‹€Û€Ü€â€ð¸„–ã\n", + /* 8*/ "€ë€ö€Ñ€ã€…’€ö€Ï¸‚ö‚ÝÇß\n", + /* 9*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂτ˂ÀÇß\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /* 13*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /* 14*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸‚ÝÏ‚öãÉ\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "€ô€å€ë€É‚„€ð\n", + /* 18*/ "€ô€å€ë€É‚„€ð\n", + /* 19*/ "€Ü€à€Ì€û‚„‰€ÜÒ€ô€å€ë€É‚„€ð¸‚ÝÏ‚öãÉ\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "€ë€ö€Ñ€ã’€ö€Ï\n", + /* 23*/ "€ë€ö€Ñ€ã’€ö€Ï\n", + /* 24*/ "€ë€ö€Ñ€ã’€ö€Ï¸‚ÝÏ‚öãÉ\n", + /* 25*/ "€Ö€Ë‚„€´€„Ñ‚öƒî߀´\n", + /* 26*/ "„Ò‚ý„±æ‚ÙÄãÉ\n", + /* 27*/ "‚ÛӃƄӄԀÀ\n", + /* 28*/ "ƒË¸„Õ¹óÁâ\n", + /* 29*/ "ùÏÊÓ€Â\n", + /* 30*/ "ƒÁ‚ÚƒÂÖÒ‚ÚÀ‚ÔÓê„Ö„ÅÑ€Â\n", + /* 31*/ "ÈÒ‚Ì„½ÓÃÃó‚–Å̇ÌÄ»€Â\n", + /* 32*/ "‚ªÌÃÍ€´€´€´\n", + /* 33*/ "‚Ì„½ÎôÒ‚ÕÊÃÙÓƒ¯„¬ÄãÌ»ØÆ€´\n", + /* 34*/ "€¨€¤€‚‰ƒŽƒ¸„Õ÷å\n", + /* 35*/ "€Û€Ü€â€ðҀۀˀʀㆀҀτׄØ\n", + /* 36*/ "‚Ý„¿ƒ°„„‹€Û€Ü€â€ðæ€Û€Ë€Ê€ã†€Ò€ÏÄãÉ\n", + /* 37*/ "‚Ì„½æ„€„ÅÄãÉ\n", + /* 38*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸„ÄÂÉ\n", + /* 39*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€ÜÒ‚ÍƒŽ„»æ„€„ÅÄãÉ\n", + /* 40*/ "¾»€Ãà€ÂÃÃÓ‚„°ƒîƒ‹‚–ƒüÊ‚öჯ„¬ð\n", + /* 41*/ "ιð€À€€Ô€î€Ó„Ù„±¿€À\n", + /* 42*/ "¾»€ÈãÓ€Ô€ùҀЀ߀ʀۀ̀؂„€Üðï€Â\n", + /* 43*/ "¾ƒÓ‚‰ƒŽƒ¸„Õ¹óÁ ԀùæÃ»ËÒƒ³‚ݸÆâ€Ž\n", + /* 44*/ "ÃÊà€’‚½ð€Â„Ñ‚öƒî¸‚È‚ÉÅÉ€Ž\n", + /* 45*/ "€ù‚„‚„€þ€÷€ÊŠ€Û€Ü€â€ðÖÒ€Ð€×€Ý€Üæ„Ú„ÛÄãÉ\n", + /* 46*/ "€ù‚„‚„€þ€÷€ÊŠ€Û€Ü€â€ðæ€Ô‚„‹‚„€ú‚„ŠÅÉ\n", + /* 47*/ "‚ƒüÒ„±ÉÊæ„ÜÁ€ý€Ý€ÑÏδÉ\n", + /* 48*/ "º»Ëà¿à„™„ʸ‚¬´ÌÁ『\n", + /* 49*/ "€ô€å€ë€É‚„€ðó‚Ê‚ÍÅÉ\n", + /* 50*/ "€à€Ë€Ï€Üð€´€€Ü€à€Ì€û‚„‰€ÜÒ‹€Ê€þ¸\n„ß´Ì€€ô€å€ë€É‚„€ð¸‚ö‚ÝÆâÒð€Â\n", + /* 51*/ "ÈҀ؂„€Ü¸‚ù´Ì‚§Ò‚ÍƒŽ„»¸„¼Ù‚ÁÚÒð\n", + /* 52*/ "ÃҀЀ߀ʀۀ̀؂„€ÜÓ€ÃÒØØóÓ„¬ÛàãÌÅØ¼ï\n", + /* 53*/ "ºãæƒÆƒÇƒÈ„¹ƒˆÒ€Ó€Ð€ë€É‚„€Ü€û€Ï€À\n„ª´Éßá„àÄ»ÒÑ€Â\n", + /* 54*/ "€Ð€Ñ€áค¬ÛÌÁ〴€À´Í„™„ʸ‚Ö´Ìâ¹ð€Ž\n", + /* 55*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×€€Ü€ß€Ï‹€Ñ€¨€¤€Â\n„§‚˜Ò‚ö‚€€€Ø‚„€ø€Õ‚„ƒòƒó‚˜ƒÎ¸‚¹‚Ç€Â\n", + /* 56*/ "»»ï€‚€Í€Ð€Ï€ä€Â€Ø‚„€ø€Õ‚„Ó\nƒ•È´Êσ†¿´Ì»â€Â\np€Ü€à€Ì€û‚„‰€Üæ‚À´ÉÒ¸\n‚ä‚…Ò€Ü€Ñæ‚¹‚ÇÅÉ€Â\npƒÃ„¦„§‚˜Ò„ã‚Ü‚ƒ…öð€Â\nÁô»ß¼ð怎\n", + /* 57*/ "„§‚˜Ò„±‚ýÓ€ƒ¼‚„°ÎÒó\n‚״ʵ†€ñιóÅ·€Â\npÍÃä󀄄ž„ŸÒ€ó€áàÓô¼ÎÒ€À\n", + /* 58*/ "€ã€ù€Ï€ãæôÒƒ«ƒ¬Ò„±‚ýÏØó\n‚ðƒœ¸„ä½Ì»âÒ¿Ó‚ ‚ìð€Â\npðæ€€ã€ù€Ï€ãÒ‚¼ÁÏ»â„ã‚Ó\n‚ÛÒ‚ðƒœÏ„åå´Ì»âÓíð€Â\np„¹ƒˆƒÂÏ‚ÀဇŽÒ„è„錉€Ô¸\nƒÆƒÇƒÈÏ‚ÉÇâÒð€Â\n", + /* 59*/ "ÈÅÌ€ƒÆƒÇƒÈ¸‚¬ã´ÌÃÍÑ€Â\n€ã€ù€Ï€ãÒ‚ðƒœÓ‚ª¿€å¿´É€À\npºÍ€ºÒ€ï‚„€â€Æ€Ï€þσæÉ\n€ú€ÏŠ€ì€Ð‚„Ò„œÓ‚ªƒî€À\n", + /* 60*/ "Øð„î„ï҃Ђ½ÎÒ󀂩¼ÒÓ\nÝÛ̾ü€Â€þ€ÊŠ€ö€Ê€×€Â\n", + /* 61*/ "€Ó€ùŽ‚„€ß‚„„ð„¬€‚‰ƒŽ€Û€Ü€â€ðƒÛ‚Ä‚\n", + /* 62*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΄±ƒ°æ‚ÙÄãÉ\n", + /* 63*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 64*/ "„§‚˜ÖÒ‚·‚ö‚ó‚ô\n", + /* 65*/ "€é€Ñ‚€Ë€Ê€×æ»â\n", + /* 66*/ "‚Ý„¿ƒ°„¼Ù‚ÁÙƒˆÒ€Ù€ÏŽ€Ðæ„ð„¬ÅÉ\n", + /* 67*/ "‚ÍƒŽ„»Ò„¼Ù‚ÁÙæóÀØÇ¹\n", +}; diff --git a/src/files/lang/jap-final/caveP.c b/src/files/lang/jap-final/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/jap-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_f.c b/src/files/lang/jap-final/cave_str_f.c new file mode 100644 index 000000000..f1707e59d --- /dev/null +++ b/src/files/lang/jap-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol\n\nLe plan de vol de l'Air Force One est gardé dans un coffre de la base. Dérobez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme sera donnée et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'équipement\n", + /* 7*/ "Leurrer le système de détection\n", + /* 8*/ "Obtenir le plan de vol\n", + /* 9*/ "Monter à bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'hôtesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'hôtesse obtenu.\n", + /* 20*/ "Obtenir plans de vol.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour. \n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie. \n", + /* 32*/ "...??? Oh, mon Dieu! \n", + /* 33*/ "Les armes sont interdites dans la base. \n", + /* 34*/ "J'appelle la sécurité.\n", + /* 35*/ "Coupure système initialisée... \n", + /* 36*/ "Systèmes sécurité coupés. \n", + /* 37*/ "Armement détecté.\n", + /* 38*/ "Valise déposée.\n", + /* 39*/ "Valise scannée.\n", + /* 40*/ "Vous, là! Cette zone est interdite. \n", + /* 41*/ "Vous êtes nouvelle ou quoi?\n", + /* 42*/ "Hé! Ma valise! \n", + /* 43*/ "Appelle la sécurité... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Accès grilles laser refusé.\n", + /* 46*/ "Système grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Empêchez-les d'avoir le coffre...\n", + /* 49*/ "Costume revêtu.\n", + /* 50*/ "Vite! Attrapez le sac de l'hôtesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre équipement. \n", + /* 52*/ "Cette caisse se fera arrêter si vous n'intervenez pas. \n", + /* 53*/ "C'est ça Air Force One, hein? ... C'est assez \npetit en fait.\n", + /* 54*/ "Arrêtez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entrée principale de la base. J'aperçois aussi le point d'arrivée du téléphérique.\n", + /* 56*/ "Excellent, Joanna. Ce téléphérique est votre billet d'entrée. Notre contact a repéré une hôtesse montant à bord il y a une minute. Elle est escortée par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font pas partie de l'opération de Trent et que je ne dois pas les abattre même sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis néanmoins persuadé que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois à bord et présentez-les au Président.\n", + /* 59*/ "Et le protéger de ses ravisseurs. Avez-vous une théorie sur les plans de Trent et sur ce type blond?\n", + /* 60*/ "Que de vagues soupçons. Concentrez-vous plutôt sur la mission. Bonne chance. Carrington, terminé.\n", + /* 61*/ "Ascenseur inactif - système sécurité actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial détruit.\n", + /* 64*/ "Entrée de la base sécurisée.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coupé.\n", + /* 67*/ "Equipement ne peut être enregistré.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_g.c b/src/files/lang/jap-final/cave_str_g.c new file mode 100644 index 000000000..e141b3fcf --- /dev/null +++ b/src/files/lang/jap-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpläne aus dem Safe!\n\nDie Route, welche für die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pläne in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamität dient er als Ihre Verstärkung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRÄSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrüstung ein!\n", + /* 7*/ "Unterminieren Sie die Überwachung!\n", + /* 8*/ "Entwenden Sie die Flugpläne!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpläne aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpläne\n", + /* 23*/ "Flugpläne\n", + /* 24*/ "Flugpläne aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schönen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie müssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "Überwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurück!\n", + /* 43*/ "Du holst die Security - Ich kümmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert\n", + /* 46*/ "Lasermatrix-System wurde überladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde angelegt.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess! \n", + /* 51*/ "Verbergen Sie Ihre Ausrüstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. In der Bahn befindet sich etwas, dass Sie brauchen. Unser Beobachter hat uns mitgeteilt, dass ein Crew-Mitglied vor einer Minute die Bahn betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA-Agenten?\n", + /* 58*/ "Ich weiß nicht, wie weit diese Verschwörung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenüber absolut loyal sind. Sie müssen einen Beweis gegen Trent erbringen und diesen dem Präsidenten vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschützen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten könnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glück! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person eliminiert\n", + /* 63*/ "Wichtiges Objekt zerstört\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir übernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrüstung kann nicht überprüft werden.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_i.c b/src/files/lang/jap-final/cave_str_i.c new file mode 100644 index 000000000..fe24377c7 --- /dev/null +++ b/src/files/lang/jap-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C'è un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamerò la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza è stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia è stata depositata.\n", + /* 39*/ "La valigia è stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area è vietato.\n", + /* 41*/ "È la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedrò io con loro!\n", + /* 44*/ "Di sopra... c'è un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verrà fermata.\n", + /* 53*/ "Così quello è l'Air Force One? Mhm... \n più piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta è il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. È scortata da una squadra della base aerea. È superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui si sia diffusa la cospirazione all'interno dell'NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "Sììì e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base è stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non può essere depositata.\n", +}; diff --git a/src/files/lang/jap-final/cave_str_s.c b/src/files/lang/jap-final/cave_str_s.c new file mode 100644 index 000000000..918ac4808 --- /dev/null +++ b/src/files/lang/jap-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One está guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AÉREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener planes v. de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obtén la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obtén los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "¿Está bien?\n", + /* 28*/ "Iré para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aquí.\n", + /* 31*/ "Deberás dejar ese arma aquí.\n", + /* 32*/ "¡Oh, Dios mío!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisaré a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, tú: ésta es un área restringida.\n", + /* 41*/ "¿Eres nueva por aquí?\n", + /* 42*/ "Hey. Devuélveme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de láser denegado.\n", + /* 46*/ "Sistema de rejilla de láser sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "¡Ésta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta será detenida a menos que hagas algo.\n", + /* 53*/ "¿Así que ese es el Air Force One? ... Huh, es más \npequeño de lo que pensaba.\n", + /* 54*/ "Detenlos: están accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posición. Puedo ver la entrada principal de la base, y distingo el punto de llegada del teleférico.\n", + /* 56*/ "Excelente, Joanna. Ese teleférico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulación entrar hace un minuto. Está siendo escoltada por tropas de la base aérea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequeña trama de Trent. Y que no puedo dispararles aunque ellos me disparen a mí. ¿Qué pasa con los agentes de la ANS?\n", + /* 58*/ "No sé cuán lejos ha llegado la conspiración a través de la ANS, pero podría apostar a que los hombres que Trent ha situado por aquí son leales a su plan y a él mismo. Debes encontrar evidencias de la traición de Trent en el Air Force One y enseñárselas al Presidente.\n", + /* 59*/ "Sí, y protegerle de sus secuestradores. ¿Tienes alguna idea sobre de qué puede tratar el plan de Trent, y qué pasa con esos chicos rubios?\n", + /* 60*/ "Sólo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crítico de la misión eliminado.\n", + /* 63*/ "Objeto crítico de la misión destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "¡¡Nos ocupamos nosotros!!\n", + /* 66*/ "El teleférico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/cradE.c b/src/files/lang/jap-final/cradE.c similarity index 100% rename from src/files/lang/cradE.c rename to src/files/lang/jap-final/cradE.c diff --git a/src/files/lang/cradJ.c b/src/files/lang/jap-final/cradJ.c similarity index 100% rename from src/files/lang/cradJ.c rename to src/files/lang/jap-final/cradJ.c diff --git a/src/files/lang/cradP.c b/src/files/lang/jap-final/cradP.c similarity index 100% rename from src/files/lang/cradP.c rename to src/files/lang/jap-final/cradP.c diff --git a/src/files/lang/crad_str_f.c b/src/files/lang/jap-final/crad_str_f.c similarity index 100% rename from src/files/lang/crad_str_f.c rename to src/files/lang/jap-final/crad_str_f.c diff --git a/src/files/lang/crad_str_g.c b/src/files/lang/jap-final/crad_str_g.c similarity index 100% rename from src/files/lang/crad_str_g.c rename to src/files/lang/jap-final/crad_str_g.c diff --git a/src/files/lang/crad_str_i.c b/src/files/lang/jap-final/crad_str_i.c similarity index 100% rename from src/files/lang/crad_str_i.c rename to src/files/lang/jap-final/crad_str_i.c diff --git a/src/files/lang/crad_str_s.c b/src/files/lang/jap-final/crad_str_s.c similarity index 100% rename from src/files/lang/crad_str_s.c rename to src/files/lang/jap-final/crad_str_s.c diff --git a/src/files/lang/crypE.c b/src/files/lang/jap-final/crypE.c similarity index 100% rename from src/files/lang/crypE.c rename to src/files/lang/jap-final/crypE.c diff --git a/src/files/lang/crypJ.c b/src/files/lang/jap-final/crypJ.c similarity index 100% rename from src/files/lang/crypJ.c rename to src/files/lang/jap-final/crypJ.c diff --git a/src/files/lang/crypP.c b/src/files/lang/jap-final/crypP.c similarity index 100% rename from src/files/lang/crypP.c rename to src/files/lang/jap-final/crypP.c diff --git a/src/files/lang/cryp_str_f.c b/src/files/lang/jap-final/cryp_str_f.c similarity index 100% rename from src/files/lang/cryp_str_f.c rename to src/files/lang/jap-final/cryp_str_f.c diff --git a/src/files/lang/cryp_str_g.c b/src/files/lang/jap-final/cryp_str_g.c similarity index 100% rename from src/files/lang/cryp_str_g.c rename to src/files/lang/jap-final/cryp_str_g.c diff --git a/src/files/lang/cryp_str_i.c b/src/files/lang/jap-final/cryp_str_i.c similarity index 100% rename from src/files/lang/cryp_str_i.c rename to src/files/lang/jap-final/cryp_str_i.c diff --git a/src/files/lang/cryp_str_s.c b/src/files/lang/jap-final/cryp_str_s.c similarity index 100% rename from src/files/lang/cryp_str_s.c rename to src/files/lang/jap-final/cryp_str_s.c diff --git a/src/files/lang/damE.c b/src/files/lang/jap-final/damE.c similarity index 100% rename from src/files/lang/damE.c rename to src/files/lang/jap-final/damE.c diff --git a/src/files/lang/jap-final/damJ.c b/src/files/lang/jap-final/damJ.c new file mode 100644 index 000000000..7fd367192 --- /dev/null +++ b/src/files/lang/jap-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚—Ü¿ÎáºÇ´Ì»âß¼ó€Ë»Ï€Û‚„‚€Ë€Ê€×Í»¼„ñ„òÏóɀ“€ö‚€Ê€×€’ÍÈÒ„óƒù¸‚À´ƒ›á€„ô„õ„öóÅÀáÏ„„ŽƒÛ„¸‚Ú´Ì»â€Â‰‚„€ß†€Ñ€ÏÍÈÒ‚ƒ„³ôÜÓ€„‰„Šó‚ª¿ƒÔƒƒÎ‚¿„÷’€ú‚€È€×€ã¸‚Ú´Ì»âß¼ð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃÒƒº‚Ú΂ÄÀ¿à€€ó€áàÏÍ´Ì„Š„øƒÛ„æÍÌ܃ԃƒóºâÍ»½âð伀€ó€áàÒƒÛ„¸óÀâ„ùႱ‚²Ç߀ÂÉðÅ€ƒ¸‚‘‚’‚“Ò„ý‚²¸‚­„à„ùÏÍ»¼€‚£‚¤Ò‚û‚üÒ€ø‚„€ø¸‚èãλ߼πÂ\n\n|‚µ‚¶€‘€¾„óƒùÒ€ñ€Ñ€ÏƒÉƒÒ¸„–ã\n\n€ñ€Ñ€ÏƒÉƒÒ¸„–ãõ€„óƒùæƒÍ‚ÚÒ”‚€Û€Í€Ï¿àƒàÄãâðä¼€ÂÈãÏßáƒùÒ‚ë‚ìÜ‚ƒ‚ƒ‘½ÌÅØ¼Òðæ€Ž€Â€±€Ü€Ö€Ë€Ï¸‚ù´Ì€ƒÉƒÒҀ܀рʀค€ÆÒð€ÂƒÛ‚ÄÅÌ»â€Ü€Ñ€Ê€à¸ƒ…Ì„–ãõ‚¼ÁϺâ€ñ€Ñ€Ï€Ü€Ñ€Ê€àÒ€é€Ê€àæ„×ÁÓíð€Â\n\n|‚µ‚¶€’€¾„ÿ…€‰‚„€ß¸‚¹‚ºÇß\n\n‰‚„€ß†€Ñ€ÏæÃÒ’€ú‚€È€×€ãϾ»Ì…ƒÛÉ„ì„íÓ€ƒ…Ì‚ö‚ÝÆâƒ‡ƒƒæºâ€Â„ÿ…€…¸„€ÅÌ€ÈÃÏ»â€Ü€ß€Ê€ëÉʸ€‡ƒµ‚û€ˆÄÇ€‚ÛàÒ„ÿ…€‰‚„€ß¸‚¹‚ºÆâÒð€Â‚ä‚…Óƒ ×ô‚Ûฃ›á„‚øâ„Æ„Çð€Â\n\n|‚µ‚¶€“€¾€ €©€¬Íƒ—‚Ä‚´‚Ú‚Í‚•¸„–ã\n\n€ €©€¬€äŒ€Û€Ü€â€ð̓ùÒƒ—‚Ä‚´‚Ú‚Í‚•¸„–ãõ€„óƒùÓ€ø‚„€ã¿à‚–ãÌ€ºÌÜÎÁ‚ÄÀ‚ŸÆð伀…‹‚Ô𸄖´ÌÜ‚—Ò„„ŽƒÛ„¸‚±‚²ÆâÃÍÓóÀλ€Â„Ò‚ý„±¸‚É¿ÂÉƒŠ„Î€Áãèã܃ô‚²¸„”½Î»ß¼ÏÆâÒð€Â\n\n|‚µ‚¶€”€¾€ð‚„€Ï’‚„€ø€…€÷€ë€ã¸‚ÂÄ\n\nÃã󀄉„Š„€„‹„Œ€‡“€ö‚€Ê€×€’€ˆÒƒ—‚Ä…Œ……‰ƒÛæ‚¡‚¢ÏÎâ€Â‚§ÉÊÒ‚Ú‚ÄÒÉÛÏ€Ã㸂ÂÄÅ̾ÁÒð€ÂÃãҀـπã€ú‚„€ø€ç€øÓƒä€’…Ž„Á„ÊϺâ€Â\n\n|‚µ‚¶€•€¾€Ó€øŒ€ÜÍ‚¿Ï„„ŽÇß\n\n€Ó€øŒ€Ü¸‚È‚ÉÅ€‚¿Ï€ð‚„€Ï’‚„€øÏ‚ã´Ì“€ö‚€Ê€×€’óÒ„„ޏ„ØÛÌÁã€Â\n\nEND\n", + /* 1*/ "€Ý€ß€Ï€Û€Ê’\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚—Ü¿ÎáºÇ´Ì»âß¼ó€Ë»Ï€Û‚„‚€Ë€Ê€×Í»¼„ñ„òÏóɀ“€ö‚€Ê€×€’ÍÈÒ„óƒù¸‚À´ƒ›á€„ô„õ„öóÅÀáÏ„„ŽƒÛ„¸‚Ú´Ì»â€Â‰‚„€ß†€Ñ€ÏÍÈÒ‚ƒ„³ôÜÓ€„‰„Šó‚ª¿ƒÔƒƒÎ‚¿„÷’€ú‚€È€×€ã¸‚Ú´Ì»âß¼ð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃÒƒº‚Ú΂ÄÀ¿à€€ó€áàÏÍ´Ì„Š„øƒÛ„æÍÌ܃ԃƒóºâÍ»½âð伀€ó€áàÒƒÛ„¸óÀâ„ùႱ‚²Ç߀ÂÉðÅ€ƒ¸‚‘‚’‚“Ò„ý‚²¸‚­„à„ùÏÍ»¼€‚£‚¤Ò‚û‚üÒ€ø‚„€ø¸‚èãλ߼πÂ\n\n|‚µ‚¶€‘€¾„óƒùÒ€ñ€Ñ€ÏƒÉƒÒ¸„–ã\n\n€ñ€Ñ€ÏƒÉƒÒ¸„–ãõ€„óƒùæƒÍ‚ÚÒ”‚€Û€Í€Ï¿àƒàÄãâðä¼€ÂÈãÏßáƒùÒ‚ë‚ìÜ‚ƒ‚ƒ‘½ÌÅØ¼Òðæ€Ž€Â€±€Ü€Ö€Ë€Ï¸‚ù´Ì€ƒÉƒÒҀ܀рʀค€ÆÒð€ÂƒÛ‚ÄÅÌ»â€Ü€Ñ€Ê€à¸ƒ…Ì„–ãõ‚¼ÁϺâ€ñ€Ñ€Ï€Ü€Ñ€Ê€àÒ€é€Ê€àæ„×ÁÓíð€Â\n\n|‚µ‚¶€’€¾€ €©€¬Íƒ—‚Ä‚´‚Ú‚Í‚•¸„–ã\n\n€ €©€¬€äŒ€Û€Ü€â€ð̓ùÒƒ—‚Ä‚´‚Ú‚Í‚•¸„–ãõ€„óƒùÓ€ø‚„€ã¿à‚–ãÌ€ºÌÜÎÁ‚ÄÀ‚ŸÆð伀…‹‚Ô𸄖´ÌÜ‚—Ò„„ŽƒÛ„¸‚±‚²ÆâÃÍÓóÀλ€Â„Ò‚ý„±¸‚É¿ÂÉƒŠ„Î€Áãèã܃ô‚²¸„”½Î»ß¼ÏÆâÒð€Â\n\n|‚µ‚¶€“€¾€ð‚„€Ï’‚„€ø€…€÷€ë€ã¸‚ÂÄ\n\nÃã󀄉„Š„€„‹„Œ€‡“€ö‚€Ê€×€’€ˆÒƒ—‚Ä…Œ……‰ƒÛæ‚¡‚¢ÏÎâ€Â‚§ÉÊÒ‚Ú‚ÄÒÉÛÏ€Ã㸂ÂÄÅ̾ÁÒð€ÂÃãҀـπã€ú‚„€ø€ç€øÓƒä€’…Ž„Á„ÊϺâ€Â\n\n|‚µ‚¶€”€¾€Ó€øŒ€ÜÍ‚¿Ï„„ŽÇß\n\n€Ó€øŒ€Ü¸‚È‚ÉÅ€‚¿Ï€ð‚„€Ï’‚„€øÏ‚ã´Ì“€ö‚€Ê€×€’óÒ„„ޏ„ØÛÌÁã€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚—Ü¿ÎáºÇ´Ì»âß¼ó€Ë»Ï€Û‚„‚€Ë€Ê€×Í»¼„ñ„òÏóɀ“€ö‚€Ê€×€’ÍÈÒ„óƒù¸‚À´ƒ›á€„ô„õ„öóÅÀáÏ„„ŽƒÛ„¸‚Ú´Ì»â€Â‰‚„€ß†€Ñ€ÏÍÈÒ‚ƒ„³ôÜÓ€„‰„Šó‚ª¿ƒÔƒƒÎ‚¿„÷’€ú‚€È€×€ã¸‚Ú´Ì»âß¼ð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nÃÒƒº‚Ú΂ÄÀ¿à€€ó€áàÏÍ´Ì„Š„øƒÛ„æÍÌ܃ԃƒóºâÍ»½âð伀€ó€áàÒƒÛ„¸óÀâ„ùႱ‚²Ç߀ÂÉðÅ€ƒ¸‚‘‚’‚“Ò„ý‚²¸‚­„à„ùÏÍ»¼€‚£‚¤Ò‚û‚üÒ€ø‚„€ø¸‚èãλ߼πÂ\n\n|‚µ‚¶€‘€¾„óƒùÒ€ñ€Ñ€ÏƒÉƒÒ¸„–ã\n\n€ñ€Ñ€ÏƒÉƒÒ¸„–ãõ€„óƒùæƒÍ‚ÚÒ”‚€Û€Í€Ï¿àƒàÄãâðä¼€ÂÈãÏßáƒùÒ‚ë‚ìÜ‚ƒ‚ƒ‘½ÌÅØ¼Òðæ€Ž€Â€±€Ü€Ö€Ë€Ï¸‚ù´Ì€ƒÉƒÒҀ܀рʀค€ÆÒð€ÂƒÛ‚ÄÅÌ»â€Ü€Ñ€Ê€à¸ƒ…Ì„–ãõ‚¼ÁϺâ€ñ€Ñ€Ï€Ü€Ñ€Ê€àÒ€é€Ê€àæ„×ÁÓíð€Â\n\n|‚µ‚¶€’€¾€ €©€¬Íƒ—‚Ä‚´‚Ú‚Í‚•¸„–ã\n\n€ €©€¬€äŒ€Û€Ü€â€ð̓ùÒƒ—‚Ä‚´‚Ú‚Í‚•¸„–ãõ€„óƒùÓ€ø‚„€ã¿à‚–ãÌ€ºÌÜÎÁ‚ÄÀ‚ŸÆð伀…‹‚Ô𸄖´ÌÜ‚—Ò„„ŽƒÛ„¸‚±‚²ÆâÃÍÓóÀλ€Â„Ò‚ý„±¸‚É¿ÂÉƒŠ„Î€Áãèã܃ô‚²¸„”½Î»ß¼ÏÆâÒð€Â\n\n|‚µ‚¶€“€¾€Ó€øŒ€ÜÍ‚¿Ï„„ŽÇß\n\n€Ó€øŒ€Ü¸‚È‚ÉÅ€‚¿Ï€ð‚„€Ï’‚„€øÏ‚ã´Ì“€ö‚€Ê€×€’óÒ„„ޏ„ØÛÌÁã€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "€ €©€¬Íƒ—‚Ä‚´‚Ú‚Í‚•¸„–ã\n", + /* 6*/ "„óƒùÒ€ñ€Ñ€ÏƒÉƒÒ¸„–ã\n", + /* 7*/ "„ÿ…€‰‚„€ß¸‚¹‚ºÇß\n", + /* 8*/ "€ð‚„€Ï’‚„€ø€…€÷€ë€ã¸‚ÂÄ\n", + /* 9*/ "€Ó€øŒ€ÜÍ‚¿Ï„„ŽÇß\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "ÃÃæÀ´Íƒ—‚Ä…Œ……‰ƒÛ¸‚Ú¼ƒŠƒçÑ€Â\n", + /* 12*/ "ƒ—‚Ä‚´‚ÚÍ€ €©€¬æÎÂáµ\nÃÒ„óƒùÜÉðß¼ðÂÑ€€é€Ê€é€´\n", + /* 13*/ "€ñ€Ñ€ÏƒÉƒÒ¸„–ãõ»»ÒÑ€Ž\n", + /* 14*/ "ƒ—‚Ä‚´‚Ú‚Í‚•怨€Ÿ€ŸÄãÉ\n", + /* 15*/ "€ €©€¬€Û€Ü€â€ð怨€Ÿ€ŸÄãÉ\n", + /* 16*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 17*/ "ƒÉƒÒÒ€ñ€Ñ€Ï€Ü€Ñ€Ê€àÒ€é€Ê€àæ„×»É\n", + /* 18*/ "€ñ€Ñ€Ï€Ü€Ñ€Ê€à怨€Ÿ€ŸÄãÉ\n", + /* 19*/ "„„ŽƒÛ„€Ù€Ï€ã€ú‚„€ø€Ý€Ï€ß‚„¸‚È‚ÉÅÉ\n", + /* 20*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΄±ƒ°æ‚ÙÄãÉ\n", + /* 21*/ "ƒ…ÌÒ„ÿ…€‰‚„€ß¸‚¹‚ºÅÉ\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "„ÿ…€‰‚„€ß\n", + /* 25*/ "„ÿ…€‰‚„€ß\n", + /* 26*/ "„ÿ…€‰‚„€ß¸‚ÝÏ‚öãÉ\n", + /* 27*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΄±ƒ°æ‚ÙÄãÉ\n", + /* 28*/ "€÷€ë€ãÒŠ€Ð€ú€Ê€×æ„׿ãÉ\n", + /* 29*/ "€÷€ë€ãæ‚ÂÄÄãÉ\n", + /* 30*/ "€Ô“€ù‚„€Û€Í€Ï„Ú„Û€…Ž„Á„ÊÒŠ€Ðæ…Ø´ÉØØóÆ\n", + /* 31*/ "€ñ€Ñ€Ï€Ü€Ñ€Ê€àÒ€ú€Ê€×‚†‚øæ€÷€Ý€Ê€ãÄãÉ\n", + /* 32*/ "‚€Í€Ð€Ï€ä€‚¯Ï‚Ú´ÌÁã€Â€ï‚„Ó\n„Š‚¸„ɸ„€ÅÌÁâ€Âƒ ó„΃àÅß¼€´\n", + /* 33*/ "€Ó€øŒ€Üæ‚ÙÄãÉ\n", + /* 34*/ "‚€Í€Ð€Ï€ä€ƒ€»ß€Â€€Õ€ò€€Ï€´\nƒŒÁù΀úƒù¿à‚ž‚ŸÅß¼€Â\n", + /* 35*/ "„Ò‚ý„±æ‚ÙÄãÉ\n", + /* 36*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 37*/ "€Ð€ö‚„€ðæ‚ÂÄÄãÉ\n", + /* 38*/ "€Ð€ö‚„€ðæ„ð„¬ÅÉ\n", + /* 39*/ "ß‚„Å€„óƒùóÒ€ó€áàÒƒÛ„¸\n‚€Ë€îóÀÉ΀ƒ•ƒ¬Ó„Š‚ðÑ€Â\n", + /* 40*/ "ƒ¶ƒ·æ‚Óƒú€ÃÒƒù¸\n‚ùåλÃ͸»Òâå€Â\n", + /* 41*/ "€ï‚„Éʴ̃º…’Îҿ΀À\n", + /* 42*/ "€§€¨€Ž\n", + /* 43*/ "Ä´ÄÍÈҀ܀рʀค–´Ì€´\n", + /* 44*/ "ôÊҀ܀рʀàÜ„–âÒ߀´\n", + /* 45*/ "å¿´É߀Ýâ߀Ž\n", + /* 46*/ "‚×ÉλóÁ『\n", + /* 47*/ "ÃÒ„ç„–áƒî€´\n", +}; diff --git a/src/files/lang/jap-final/damP.c b/src/files/lang/jap-final/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/jap-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/jap-final/dam_str_f.c b/src/files/lang/jap-final/dam_str_f.c new file mode 100644 index 000000000..60a0d73cf --- /dev/null +++ b/src/files/lang/jap-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Sécuriser labos et données de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. Sécurisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Désactiver GPS et Auto-pilote\n", + /* 6*/ "Désactiver source d'énergie principale\n", + /* 7*/ "Sécuriser labos et données de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \ndérivera... Parfait!\n", + /* 11*/ "Le sous-marin doit être contrôlé d'ici. \n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'éloignera de la station. \n", + /* 13*/ "Ils ne pourront plus continuer l'opération \nsans énergie.\n", + /* 14*/ "Système auto-pilote désactivé.\n", + /* 15*/ "Système GPS désactivé.\n", + /* 16*/ "Objet crucial détruit.\n", + /* 17*/ "Porte de commande d'arrêt du réacteur ouverte.\n", + /* 18*/ "Réacteur désactivé.\n", + /* 19*/ "Centre de contrôle de plongée localisé.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Données de recherche sécurisées.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur déverrouillée.\n", + /* 29*/ "Ascenseur activé.\n", + /* 30*/ "Opération refusée - portes du hangar fermées.\n", + /* 31*/ "Séquence de déverrouillage réinitialisée.\n", + /* 32*/ "Vas-y. Je sécurise le périmètre. \nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a été abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi... \nOn décampe.\n", + /* 35*/ "Des civils ont été abattus.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Alarme activée.\n", + /* 38*/ "Alarme désactivée.\n", + /* 39*/ "Bien. L'opération de plongée a été annulée à la surface. \nIl est temps de piquer une tête.\n", + /* 40*/ "J'espère que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est allé un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "Débranche ce truc.\n", + /* 44*/ "Eteins-moi ça.\n", + /* 45*/ "Je vais l'éteindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/jap-final/dam_str_g.c b/src/files/lang/jap-final/dam_str_g.c new file mode 100644 index 000000000..e7a389244 --- /dev/null +++ b/src/files/lang/jap-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungen!\n\nWir wollen sämtliche Informationen, die dataDyne bis dato über dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker außer Gefecht. Vergessen Sie nicht, dass wir sie später noch verhören wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator außer Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flüchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr völlig \nnavigationsunfähig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert\n", + /* 15*/ "GPS-System wurde deaktiviert\n", + /* 16*/ "Wichtiges Objekt wurde zerstört\n", + /* 17*/ "Reaktor-Kontrollkonsole geöffnet\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstür wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzulässige Operation - Die Hangartüren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gelände. \nWir treffen uns später.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschüssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfläche unterbrochen.\nZeit für ein wenig Badevergnügen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so mädchenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verräter.\n", +}; diff --git a/src/files/lang/jap-final/dam_str_i.c b/src/files/lang/jap-final/dam_str_i.c new file mode 100644 index 000000000..e137b03de --- /dev/null +++ b/src/files/lang/jap-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano lì: li interrogheremo più tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andrà alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontanerà dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco è stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis è stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va là!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/jap-final/dam_str_s.c b/src/files/lang/jap-final/dam_str_s.c new file mode 100644 index 000000000..0bc7da93e --- /dev/null +++ b/src/files/lang/jap-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigación\n\nQueremos cualquier información que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los científicos y técnicos que allí trabajan; queremos interrogarles más tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto automático\n", + /* 6*/ "Desactivar fuente primaria de energía\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave irá \na la deriva... ¡Perfecto!\n", + /* 11*/ "Desde aquí se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto automático y el GPS, la nave \ndeambulará fuera de la estación.\n", + /* 13*/ "No podrán realizar ninguna operación \nsin energía.\n", + /* 14*/ "El sistema de piloto automático ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crítico de la misión destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crítico de la misión.\n", + /* 21*/ "Datos de investigación asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos\n", + /* 25*/ "Un disco de datos de investigación\n", + /* 26*/ "Disco de datos de investigación obtenido.\n", + /* 27*/ "Ha muerto personal crítico de la misión.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operación denegada: puertas del hangar todavía cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos más tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ¿Por qué has tardado tanto? Sígueme. \nSalgamos de esta vieja bañera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operación de buceo ha sido desbaratada en la superficie. \nEs la hora del baño.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "¿Piensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagaré.\n", + /* 46*/ "Por favor, no me hagas daño.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/depoE.c b/src/files/lang/jap-final/depoE.c similarity index 100% rename from src/files/lang/depoE.c rename to src/files/lang/jap-final/depoE.c diff --git a/src/files/lang/jap-final/depoJ.c b/src/files/lang/jap-final/depoJ.c new file mode 100644 index 000000000..d01278d32 --- /dev/null +++ b/src/files/lang/jap-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•„·„“Œ€øÏ„Ñ‚öÅÉà€Œ€øÒ‚…“Ö̓†¿½€Âôÿó€ï‚„€â€Æ€Ï€þæ‚ÚåãÌ»âÓíð€Â€ï‚„€â€Æ€Ï€þÒ…”„ƒ¸ƒ¡ƒ¢ÍÅÌ…•…–Å€óÀâðƒŒÁŒ€ø¿à‚ž‚ŸÇ߀Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ €•Œ€øÓŒ€øƒ…‚‹¸€Õ‹‚„Æâ€Ð€ö‚„€ð€…€Û€Ü€â€ð¸‚̓ŽÅÌ»â€Â‚§¸‚È‚ÉÅÉ‚‰ƒŽƒÓ€€Ð€ö‚„€ð¸ƒÛ‚ÄÅß¼ÍÆâÒ󄮃´ÆâÒð€Â€Ð€ö‚„€ðæÎãõ€€ï‚„€â€Æ€Ï€þÓƒ‡í‚„¬ÏÎâðä¼€Âȴ̀ȴ͂·ÚÒð€‚€Í€Ð€Ï€ä€Â\n\n|‚µ‚¶€‘€¾ƒÏƒ¤‚±‚²€Û€Ü€â€ð¸€¨€Ÿ€ŸÏ\n\n…—Ò€ü€ù‚„‚Ò€Ó€÷€ÐϺâ‚Í‚•怀Հð€Ü€Ñæ…•…–ÅÉ„ì„í҃ɂ¦¸‚±éÌ»â€ÂÈ㸀¨€Ÿ€ŸÏÆãõ€€Õ€ð€Ü€ÑÒƒ¡ƒ¢¸€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ö‚¦âÃÍæ‚¡‚¢ÍÎâÒð€Â\n\n|‚µ‚¶€’€¾€ù‚„‚„€þ€÷€ÊЏ€¨€Ÿ€ŸÏ\n\n€ €•Œ€øÒƒÉƒÒ€þ€÷€ÊЏ„‚„‹ÅÉÍÃ䀀ù‚„‚„€þ€÷€ÊŠÒ€ç€Ê€ã€û‚„€×æ…˜áÛèàÄãÌ»âÃÍæ‚È‚áÅɀ€ù‚„‚„Ó€€ï‚„€â€Æ€Ï€þ€ø‚„€ðÖÒ„Ñ‚ö¸„žè߼ς”‚•ÄãÌ»âæ€ƒ…ÌҀ܀рʀ฀¨€Ÿ€ŸÏÅÌÅØ½õ€…™Ó„×Ââ€Â\n\n|‚µ‚¶€“€¾€ï‚„€â€Æ€Ï€þ¸…•…–Çß\n\n€Õ€ð€Ü€Ñ¸‚ù½õ€€Õ€Ú€ÏŠ€öÉÊσµò¿ãλ߼π€ï‚„€â€Æ€Ï€þ¸…•…–óÀâÓíð€Â\n\n|‚µ‚¶€”€¾„±…ŽÒ‹€Ê€×€Ð€Ê’¸‚ö‚Ý\n\nЀ׀߂„€…€Ö€Ë€ú€ø¿àÒ„ƒÒ„ã…œÏßâÍ€€ €•Œ€øÒ„™„ÊÒ‚Ï€‹€Ê€×€Ð€Ê’ÄãÉ€‚ÛÒ€‡„±…Ž€ˆæ‚º‚éÄãÌ»âÍÒÃÍð€Â‚ä‚…æÃ㸂҃ÕóÀãõ€ƒ•Ó‚ñåãÉÍ„ªåã‿ËÌÒŠ€×€ß‚„€…€Ö€Ë€ú€øÒ„±…ޏ‚Ò„„ÆâÃÍæóÀâÒð€Â\n\n|‚µ‚¶€•€¾Œ€ø¿à‚ž‚ŸÇß\n\n€Ý€Ê€ãÅ̾»É€÷€ò‚„€ã…£…¤¸‚Ã…£Åƒ¸ƒ¹‚€¸‚Î‚ÏÆâÒð€ÂôÒ‚½Òƒ¸ƒ¹‚€Ï€Ý€Ê€ãÅÉ¿ßÁ„ª»‚ŸÆÒð€Â\n\nEND\n", + /* 1*/ "€ €•Œ€ø\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•„·„“Œ€øÏ„Ñ‚öÅÉà€Œ€øÒ‚…“Ö̓†¿½€Âôÿó€ï‚„€â€Æ€Ï€þæ‚ÚåãÌ»âÓíð€Â€ï‚„€â€Æ€Ï€þÒ…”„ƒ¸ƒ¡ƒ¢ÍÅÌ…•…–Å€óÀâðƒŒÁŒ€ø¿à‚ž‚ŸÇ߀Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ €•Œ€øÓŒ€øƒ…‚‹¸€Õ‹‚„Æâ€Ð€ö‚„€ð€…€Û€Ü€â€ð¸‚̓ŽÅÌ»â€Â‚§¸‚È‚ÉÅÉ‚‰ƒŽƒÓ€€Ð€ö‚„€ð¸ƒÛ‚ÄÅß¼ÍÆâÒ󄮃´ÆâÒð€Â€Ð€ö‚„€ðæÎãõ€€ï‚„€â€Æ€Ï€þÓƒ‡í‚„¬ÏÎâðä¼€Âȴ̀ȴ͂·ÚÒð€‚€Í€Ð€Ï€ä€Â\n\n|‚µ‚¶€‘€¾€ù‚„‚„€þ€÷€ÊЏ€¨€Ÿ€ŸÏ\n\n€ €•Œ€øÒƒÉƒÒ€þ€÷€ÊЏ„‚„‹ÅÉÍÃ䀀ù‚„‚„€þ€÷€ÊŠÒ€ç€Ê€ã€û‚„€×æ…˜áÛèàÄãÌ»âÃÍæ‚È‚áÅɀ€ù‚„‚„Ó€€ï‚„€â€Æ€Ï€þ€ø‚„€ðÖÒ„Ñ‚ö¸„žè߼ς”‚•ÄãÌ»âæ€ƒ…ÌҀ܀рʀ฀¨€Ÿ€ŸÏÅÌÅØ½õ€…™Ó„×Ââ€Â\n\n|‚µ‚¶€’€¾€ï‚„€â€Æ€Ï€þ¸…•…–Çß\n\n€Õ€ð€Ü€Ñ¸‚ù½õ€€Õ€Ú€ÏŠ€öÉÊσµò¿ãλ߼π€ï‚„€â€Æ€Ï€þ¸…•…–óÀâÓíð€Â\n\n|‚µ‚¶€“€¾„±…ŽÒ‹€Ê€×€Ð€Ê’¸‚ö‚Ý\n\nЀ׀߂„€…€Ö€Ë€ú€ø¿àÒ„ƒÒ„ã…œÏßâÍ€€ €•Œ€øÒ„™„ÊÒ‚Ï€‹€Ê€×€Ð€Ê’ÄãÉ€‚ÛÒ€‡„±…Ž€ˆæ‚º‚éÄãÌ»âÍÒÃÍð€Â‚ä‚…æÃ㸂҃ÕóÀãõ€ƒ•Ó‚ñåãÉÍ„ªåã‿ËÌÒŠ€×€ß‚„€…€Ö€Ë€ú€øÒ„±…ޏ‚Ò„„ÆâÃÍæóÀâÒð€Â\n\n|‚µ‚¶€”€¾Œ€ø¿à‚ž‚ŸÇß\n\n€Ý€Ê€ãÅ̾»É€÷€ò‚„€ã…£…¤¸‚Ã…£Åƒ¸ƒ¹‚€¸‚Î‚ÏÆâÒð€ÂôÒ‚½Òƒ¸ƒ¹‚€Ï€Ý€Ê€ãÅÉ¿ßÁ„ª»‚ŸÆÒð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•„·„“Œ€øÏ„Ñ‚öÅÉà€Œ€øÒ‚…“Ö̓†¿½€Âôÿó€ï‚„€â€Æ€Ï€þæ‚ÚåãÌ»âÓíð€Â€ï‚„€â€Æ€Ï€þÒ…”„ƒ¸ƒ¡ƒ¢ÍÅÌ…•…–Å€óÀâðƒŒÁŒ€ø¿à‚ž‚ŸÇ߀Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ €•Œ€øÓŒ€øƒ…‚‹¸€Õ‹‚„Æâ€Ð€ö‚„€ð€…€Û€Ü€â€ð¸‚̓ŽÅÌ»â€Â‚§¸‚È‚ÉÅÉ‚‰ƒŽƒÓ€€Ð€ö‚„€ð¸ƒÛ‚ÄÅß¼ÍÆâÒ󄮃´ÆâÒð€Â€Ð€ö‚„€ðæÎãõ€€ï‚„€â€Æ€Ï€þÓƒ‡í‚„¬ÏÎâðä¼€Âȴ̀ȴ͂·ÚÒð€‚€Í€Ð€Ï€ä€Â\n\n|‚µ‚¶€‘€¾€ï‚„€â€Æ€Ï€þ¸…•…–Çß\n\n€Õ€ð€Ü€Ñ¸‚ù½õ€€Õ€Ú€ÏŠ€öÉÊσµò¿ãλ߼π€ï‚„€â€Æ€Ï€þ¸…•…–óÀâÓíð€Â\n\n|‚µ‚¶€’€¾„±…ŽÒ‹€Ê€×€Ð€Ê’¸‚ö‚Ý\n\nЀ׀߂„€…€Ö€Ë€ú€ø¿àÒ„ƒÒ„ã…œÏßâÍ€€ €•Œ€øÒ„™„ÊÒ‚Ï€‹€Ê€×€Ð€Ê’ÄãÉ€‚ÛÒ€‡„±…Ž€ˆæ‚º‚éÄãÌ»âÍÒÃÍð€Â‚ä‚…æÃ㸂҃ÕóÀãõ€ƒ•Ó‚ñåãÉÍ„ªåã‿ËÌÒŠ€×€ß‚„€…€Ö€Ë€ú€øÒ„±…ޏ‚Ò„„ÆâÃÍæóÀâÒð€Â\n\n|‚µ‚¶€“€¾Œ€ø¿à‚ž‚ŸÇß\n\n…£‚ÎÄãɃ¸ƒ¹‚€¸‚ÉË€ÈÃ¿à‚ž‚ŸÆâÒð€Â\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "ƒÏƒ¤‚±‚²€Û€Ü€â€ð¸€¨€Ÿ€ŸÏ\n", + /* 10*/ "€ù‚„‚„€þ€÷€ÊЏ€¨€Ÿ€ŸÏ\n", + /* 11*/ "€ï‚„€â€Æ€Ï€þ¸…•…–Çß\n", + /* 12*/ "„±…ŽÒ‹€Ê€×€Ð€Ê’¸‚ö‚Ý\n", + /* 13*/ "Œ€ø¿à‚ž‚ŸÇß\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "€¥ª€‘€Õ‚„Š€Ö‚„\n", + /* 17*/ "€¥ª€‘€Õ‚„Š€Ö‚„\n", + /* 18*/ "€ùŽ€ø€‘€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "€¥ª€’€Õ‚„Š€Ö‚„\n", + /* 22*/ "€¥ª€’€Õ‚„Š€Ö‚„\n", + /* 23*/ "€ùŽ€ø€’€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 24*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 25*/ "ƒÏƒ¤‚±‚²€Û€Ü€â€ð怨€Ÿ€ŸÄãÉ\n", + /* 26*/ "ƒÏƒ¤‚±‚²€Û€Ü€â€ðӂ‚ÂÄóÀØÇ¹\n", + /* 27*/ "€ù‚„‚„€þ€÷€ÊŠæ€¨€Ÿ€ŸÄãÉ\n\n", + /* 28*/ "€ù‚„‚„€þ€÷€ÊŠæ€¨€§ÄãÉ\n\n", + /* 29*/ "ƒ…ÌÒ€ù‚„‚„€þ€÷€ÊŠæ€¨€Ÿ€ŸÏÄãÉ\n\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "‹€Ê€×€Ð€Ê’‰‚„€ß\n", + /* 33*/ "‹€Ê€×€Ð€Ê’‰‚„€ß\n", + /* 34*/ "‹€Ê€×€Ð€Ê’‰‚„€ß¸‚ÝÏ‚öãÉ\n", + /* 35*/ "Š€Ð€Ù‚„†æ€Ý€Ê€ãÄãÉ\n", + /* 36*/ "„™„ÊÒ…ƒÚ¸‚†…ž„ׄ؀Ž\n", + /* 37*/ "…ƒÚ‚†…ž‚ó‚ô€„™„ÊÒ€ú€Ê€×æ„×»É\n", + /* 38*/ "„Ñ‚öƒî‚Ȃɀ„™„ʅփ逴\n", + /* 39*/ "Š€Ð€Ù‚„†æ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 40*/ "Š€Ð€Ù‚„†æ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 41*/ "€ï‚„€â€Æ€Ï€þæ‚„¬ÄãÉ\n", + /* 42*/ "€Ð€ö‚„€ð€¨€§\n", + /* 43*/ "€Ð€ö‚„€ð€¨€Ÿ€Ÿ\n", + /* 44*/ "„™„ÊÒŠ€ÐÓ€ú€Ê€×ÄãÌ»ØÆ\n", + /* 45*/ "Š€Ð€Ù‚„†æ€Ý€Ê€ãÄãÉ\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "€ï€Ê€Û€Í€Ï‚ñ‚ò€‚µ‚¶‚ñ‚ò\n", + /* 52*/ "€ï€Ê€Û€Í€Ïƒ±„¶\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "€Õ€ð€Ü€Ñ\n", + /* 58*/ "€Õ€ð€Ü€Ñ\n", + /* 59*/ "€Õ€ð€Ü€Ñ¸‚ÒƒÕÅÉ\n", + /* 60*/ "ù΀ù‚„‚„æºâ‚ýÓ€‚¯Ï‚·Ûλå€Â\n", + /* 61*/ "ÃÒ‚¯Ó€ï‚„€â€Æ€Ï€þ€ø‚„€ððå€Â\n€Õ€ð€Ü€ÑÒ‚Ÿ‚ÆÑ€Â\n", + /* 62*/ "ÃÒ„™„ÊÒ…ƒÚÓ¿Îá…¡…¢ð€Â\nŠ€Ð€Ù‚„†óÜ¿Îდ‚ýæ¿¿âï€Â\n", + /* 63*/ "ƒ Óƒ‰éâðÂÑ€´\nƒÏ…£…¤¸Å¿ÂɃ¸ƒ¹‚€ÏƒæÎÀµ€Â\n", + /* 64*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 65*/ "‚ž‚ŸÅ䀂€Í€Ð€Ï€ä€´\nƒ¸ƒ¹‚€¸…£‚ÎÆâ\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "‚Ã…£‚Í‚•\n", + /* 69*/ "‚Ã…£‚Í‚•\n", + /* 70*/ "‚Ã…£‚Í‚•¸‚ÝÏ‚öãÉ\n", + /* 71*/ "€Õ€ð€Ü€Ñæ‚΂ÏÄãÉ€‚µ‚¶‚ñ‚ò\n", + /* 72*/ "ƒ”ÉÊÓ€š€¢¸„ß»ƒ–Å\n’€ú€þ€ö€ð¸‚Ê‚ËÅÉå€Â\np€š€¢ÏÓܼ€‡„±…Ž€ˆæÎ»Òó\nº¹ÎÃÍÓ‚ÃÃàλÓí߀Â\n", + /* 73*/ "Å¿ÅÃãóƒÜ…¥æ‚ØÊÉ΀Â\n€š€¢¸‡ŽÒƒŠƒçØó‚´õÑõÎàλ€Â\np€š€¢æ€ò€ö€ø¸‚ÕËÃ͸\n„Æ…§óÀο´ÉÒ¿€´\n", + /* 74*/ "ȹÎÃ̓žÜ„Æ…§óÀλå߀´\nÍÃäó€‚ÛÒ‚ÔÓô¼ÎÒ߀´\n", + /* 75*/ "“€ö‚€Ê€×€’Ò‚ùƒˆ…©‚¡Ó\nƒÆƒÇƒÈ¿à¾áÉÒ¿€À\n", + /* 76*/ "¾ƒÓ€ƒÆƒÇƒÈ¸€ä€ñÌ»ÉÒóÓλ¿€À\n", + /* 77*/ "»Ý€´€Å¿Åº¹ÎÏ€ü€Ï€ÙÍӀހÂ\nƒÆ„Ó„ÔÄ€…®Ò‚Ýæ„н̺â€Â\npƒÆƒÇƒÈæ„§‚˜Ïƒòƒóƒãƒä\nƒÛ‚‘¸„ׄØóÀâÓíð€Â\npƒ ÓƒÆƒÇƒÈÒ€‡…¯…°€ˆÄ½\n¼ØÁ‚ÝÏ‚öãõ€Ž\n", + /* 78*/ "€ë€Ï€‚±‚²æƒ¼ÂãõÒƒŸðÑ€Â\nºÒ€Ö€Ë€÷€Ï€ã€ÏæÃ㸃þ»Éà\npî´É»€‡ƒñ„¦€ˆ¸„Õ¹óÁâ߀Â\n", + /* 79*/ "€Ö€Ë€÷€Ï€ã€ÏÒƒçÏ\nƒñ„¦ÓƒòƒóÅλ߀Â\npÃÒ†€Ï€äÒ„Ùƒ„½æ€ç‹†ó‚çƒÂ‚ð€Â\n‚ªæƒÁ¹óƒÌ܃ƄӄÔÄ€Â\n", + /* 80*/ "ß‚„Å€ºãӇ˂ÝÁ‚Ļ̻â¹ð΀Â\np‚ä‚…Ó€‡Ë‚ÝÁ»¿Î»ÜÒÓƒ‘Æ€´\np¾ƒæ€‡…®Ò‚Ý€ˆ¸…„‚ÚÆâƒ“Ó\nÃÒÃ͸ßÁ‚á½Ì¾Á¹ð΀Â\n", + /* 81*/ "ÃÊà€Ó‚„‚€È€Ï€ã€…†‚„€×€Â\nƒ¡ƒ¢¸‚¦áØÆ€Â„¥ƒŽ¸Å̇ÌÄ»€Â\npƒÆƒÇƒÈ¸€ü‚„ŠÆâƒ‡ƒƒæºáØÆ€Â\nƒ»ó€à‚„€ð¸‚Ý‚”Å̇ÌÄ»€Â\n", + /* 82*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×߀ÈÒƒ“‚ýÓλ€Â\nƒ¼…²æ‚Å‚û½Ì»â‚ýÏ€„„ìæ‚Êå´É€Â\npƒ”æ„Õ¹ð€‡€ë€ù€ÏŠ€ˆÉÊæ\n€ç‹†‡ËƒÃó‚×Ê‚ØÍÄãÉ€Â\np€‡€Ó€÷€Ð€•€‘€ˆ¿à‚È…·ÄãÉ\n€ï€Ú€Ñ€øÒß¼ð€Â‚Ûàæ„†‚”ð€Â\np‚ãáƒãƒä€ƒÍ‚˜Ïƒ†¿´ÌÁã€Â\nƒ‹‡Ëð€ßäÅÁ…»Ú€Â\n", + /* 83*/ "€Ó€÷€Ð€•€‘€À€ƒÆƒÇƒÈÓô¼ÎâÒ€À\n", +}; diff --git a/src/files/lang/jap-final/depoP.c b/src/files/lang/jap-final/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/jap-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_f.c b/src/files/lang/jap-final/depo_str_f.c new file mode 100644 index 000000000..815834afe --- /dev/null +++ b/src/files/lang/jap-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble empêche tout système d'enregistrement de fonctionner. Une fois coupée, la Camspy pourra transmettre les données au QG.\n\n|Objectif 2: - Désactiver les systèmes de grilles laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver les systèmes de grille laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Désactiver le champ d'isolement\n", + /* 10*/ "Désactiver les systèmes de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "Récupérer la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial détruit.\n", + /* 25*/ "Générateur champ d'isolement coupé.\n", + /* 26*/ "Générateur ne peut être rallumé.\n", + /* 27*/ "Unité grilles laser coupée.\n", + /* 28*/ "Unité grilles laser activée.\n", + /* 29*/ "Tous systèmes grilles laser coupés.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "Décodeur porte fixé sur panneau d'accès.\n", + /* 36*/ "Commandes piratages lancées.\n", + /* 37*/ "Décodage porte achevé - porte déverrouillée.\n", + /* 38*/ "ALERTE INTRUSION - sécurité dans l'abri.\n", + /* 39*/ "Décodeur porte placé correctement.\n", + /* 40*/ "Décodeur porte mal placé.\n", + /* 41*/ "Conspirateurs alertés.\n", + /* 42*/ "Alarme activée.\n", + /* 43*/ "Alarme désactivée.\n", + /* 44*/ "Porte du coffre fermée.\n", + /* 45*/ "Décodeur porte fixé.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard placé correctement.\n", + /* 54*/ "Mouchard mal placé.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activés.\n", + /* 61*/ "La salle de réunion doit être droit devant. \nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est très complexe. \nLe décodeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite à \nla porte de tout à l'heure.\n", + /* 64*/ "Objet crucial détruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir \nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Détonateur\n", + /* 69*/ "Détonateur\n", + /* 70*/ "Détonateur obtenue.\n", + /* 71*/ "CamSpy détruite - abandonner la mission.\n", + /* 72*/ "Nous avons récupéré le Sapiens chez Carrington \net changé son programme. Il n'a plus de \npersonnalité. Cela évitera de futurs \nincidents.\n", + /* 73*/ "Cela réduira son efficacité. Mon équipe le \nmènera au centre. Ils prendront donc \ndes risques inutiles. Vous auriez dû \nprévoir ce développement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment prévoir une chose pareille?! \nEt pourquoi suis-je la seule à porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Président a-t-il refusé votre demande \nde prêt du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-être sous-estimé son côté \nintègre. Mais nous avons un plan de \nsecours. Nous agirons dès que l'équipe \nprésidentielle arrivera à la base aérienne. \nJe n'ai besoin que d'un échantillon de la \npeau du Président.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne bénéficiera d'aucune aide \nextérieure. L'équipement que vous nous \navez offert est installé au Nevada et est \nopérationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de détruire tout ce qui ne veut pas \nfonctionner. Souvenez-vous-en pendant \nl'exécution de votre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Préparez-vous à \nrecevoir les données de la réunion. \nDemande prioritaire d'une équipe de \nl'Institut pour protéger le Président \navant son départ pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tôt a été \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, là où les \nrescapés et les débris ont dû être amenés. \nRevenez au poste et préparez-vous \npour un départ imminent. \nCarrington, terminé.\n", + /* 83*/ "Secteur 51? Et le Président alors?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_g.c b/src/files/lang/jap-final/depo_str_g.c new file mode 100644 index 000000000..268459faf --- /dev/null +++ b/src/files/lang/jap-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nAuf dem Garagen-Deck des Gebäudes befindet sich eine Vorrichtung, die den Einsatz jeglicher Rekorder verhindert. Finden Sie das Gerät und schalten Sie es ab! Anschließend sollte der CamSpy die Daten ohne Probleme übermitteln können.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|5. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|4. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|3. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator außer Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwörer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Gebäude!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 15*/ "Level 1 Schlüsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlüsselkarte der Wache\n", + /* 18*/ "Schlüsselkarte der Wache aufgenommen\n", + /* 19*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 20*/ "Level 2 Schlüsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlüsselkarte der Wache\n", + /* 23*/ "Schlüsselkarte der Wache aufgenommen\n", + /* 24*/ "Wichtiges Objekt wurde zerstört.\n", + /* 25*/ "Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen\n", + /* 35*/ "Tür-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tür wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskräfte sofort ins Kellergeschoß!\n", + /* 39*/ "Tür-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tür-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwörer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetür ist versperrt.\n", + /* 45*/ "Tür-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen\n", + /* 51*/ "Zielerreichung unvollständig - MISSION FEHLGESCHLAGEN!\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit für den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklügelt.\nDer Decoder wird etwas mehr Zeit benötigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tür, die ich \nvorhin 'präpariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstört.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen\n", + /* 71*/ "Der CamSpy wurde zerstört - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurückgeholt \nund sein Programm verändert. Es hat nun keine \nPersönlichkeit mehr. Daher sind auch keine \nweiteren Zwischenfälle mehr zu befürchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie hätten \nvoraussehen müssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand hätte das voraussehen können! Und ich \nlehne es ab, dafür verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Präsident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig überschätzt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit unterschätzt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Stützpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPräsidenten.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Störmaßnahmen. \nWenn Carrington eins und eins zusammengezählt hat, \ndann ist Verstärkung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von außen erhalten. \nDie Technologie, die Sie uns zur Verfügung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit können wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstört werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nÜbertragung der Aufzeichnung vor. Ich beantrage ein \nUnterstützungsteam des Instituts zum Schutz des \nPräsidenten, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorität Eins.\n", + /* 82*/ "Dafür ist nun keine Zeit, Agent Dark. Während \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde über Nevada abgeschossen. \nDie dafür verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nÜberlebende und die Wrackteile gebracht. Bereiten \nSie sich für die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Präsidenten?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_i.c b/src/files/lang/jap-final/depo_str_i.c new file mode 100644 index 000000000..0480b5605 --- /dev/null +++ b/src/files/lang/jap-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio è collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato, la TeleSpia potrà trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1° piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2° piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unità griglie laser\n", + /* 28*/ "Attivata unità griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "È impossibile passare finché sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nÈ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte è criptata. \nIl decodificatore ci metterà un po'.\n", + /* 63*/ "È ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalità, così non \navremo più spiacevoli sorprese.\n", + /* 73*/ "Questo ridurrà la sua efficienza. La mia \nsquadra dovrà portarlo subito al centro, \nma ciò li metterà in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avrò sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ciò che mi serve \ndal Presidente è un campione di tessuto.\n", + /* 78*/ "Sì... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avrà già chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato è stata \ninstallata in Nevada ed è già operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ciò significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ciò che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c'è tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo è stato abbattuto \nin Nevada. Il colpo è stato sparato dall'\nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sarà del Presidente?\n", +}; diff --git a/src/files/lang/jap-final/depo_str_s.c b/src/files/lang/jap-final/depo_str_s.c new file mode 100644 index 000000000..e7b81a6ea --- /dev/null +++ b/src/files/lang/jap-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Húmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisión de cualquier información grabada por la Cámara Espía. Una vez apagado, la Cámara Espía puede enviar cualquier grabación al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Tres: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Dos- Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo húmedo\n", + /* 10*/ "Desactivar sistemas de rejilla láser\n", + /* 11*/ "Holografiar reunión de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obtén la llave magnética alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave de Nivel 1\n", + /* 17*/ "Llave Magnética del Guarda\n", + /* 18*/ "Llave Magnética del Guarda obtenida\n", + /* 19*/ "Obtén la llave magnética alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave de Nivel 2\n", + /* 22*/ "Llave Magnética del Guarda\n", + /* 23*/ "Llave Magnética del Guarda obtenida\n", + /* 24*/ "Objeto crítico de la misión destruido.\n", + /* 25*/ "Generador de campo húmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla láser apagada.\n", + /* 28*/ "Unidad de rejilla láser activada.\n", + /* 29*/ "Todos los sistemas de rejilla láser apagados.\n", + /* 30*/ "Obtén la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas terminó: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte está cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obtén el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIÓN FALLADA.\n", + /* 52*/ "MISIÓN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obtén la Cámara Espía.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Cámara Espía\n", + /* 58*/ "Una Camára Espía\n", + /* 59*/ "Cámara Espía obtenida.\n", + /* 60*/ "No hay ningún camino posible mientras \nesos láseres estén activos.\n", + /* 61*/ "Eso de ahí delante debe ser la sala de reuniones. \nHora de usar la Cámara Espía.\n", + /* 62*/ "La caja fuerte está fuertemente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "¡Hora de irse! Vamos a la puerta que creé \nantes.\n", + /* 64*/ "Objeto crítico de la misión destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La Cámara Espía ha sido destruida: abortar misión.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programación. Nunca más tendrá \npersonalidad, así no podrá haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducirá su eficiencia. Mi equipo tendrá \nque llevarlo al núcleo por sí mismo. Esto les \npondrá en peligro. Debías haber anticipado \nque la IA podría desarrollar un problemático \ncódigo moral.\n", + /* 74*/ "¡Nadie podría haber predecido eso! ¡Y me \nmolesta que me echen la culpa de ello! \n¿Qué pasa con él?\n", + /* 75*/ "¿El Presidente no ha admitido tu petición \nde préstamo del Pelagic II?\n", + /* 76*/ "¿No podría ser que hayas sobreestimado \ntu influencia sobre él?\n", + /* 77*/ "¡No! Quizá haya menospreciado su resolución. \nTenemos un plan de contigencia preparado, \ny comenzará tan pronto como el séquito presidencial\nllegue a la base aérea. Todo lo que necesito del \nPresidente es una muestra de tejido cutáneo.\n", + /* 78*/ "¡Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisará a los refuerzos.\n", + /* 79*/ "No habrá ayuda exterior para el Sr. Carrington. \nLa tecnología que nos diste está instalada en \nNevada y es totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "¿Entonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "¡Agente Dark informando! Preparaos para \nrecibir los datos de la reunión. \nPetición prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nÁrea 51... Allí es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aquí. Carrington fuera.\n", + /* 83*/ "¿Al Área 51? ¿Pero qué pasa con el Presidente?\n", +}; diff --git a/src/files/lang/destE.c b/src/files/lang/jap-final/destE.c similarity index 100% rename from src/files/lang/destE.c rename to src/files/lang/jap-final/destE.c diff --git a/src/files/lang/destJ.c b/src/files/lang/jap-final/destJ.c similarity index 100% rename from src/files/lang/destJ.c rename to src/files/lang/jap-final/destJ.c diff --git a/src/files/lang/destP.c b/src/files/lang/jap-final/destP.c similarity index 100% rename from src/files/lang/destP.c rename to src/files/lang/jap-final/destP.c diff --git a/src/files/lang/dest_str_f.c b/src/files/lang/jap-final/dest_str_f.c similarity index 100% rename from src/files/lang/dest_str_f.c rename to src/files/lang/jap-final/dest_str_f.c diff --git a/src/files/lang/dest_str_g.c b/src/files/lang/jap-final/dest_str_g.c similarity index 100% rename from src/files/lang/dest_str_g.c rename to src/files/lang/jap-final/dest_str_g.c diff --git a/src/files/lang/dest_str_i.c b/src/files/lang/jap-final/dest_str_i.c similarity index 100% rename from src/files/lang/dest_str_i.c rename to src/files/lang/jap-final/dest_str_i.c diff --git a/src/files/lang/dest_str_s.c b/src/files/lang/jap-final/dest_str_s.c similarity index 100% rename from src/files/lang/dest_str_s.c rename to src/files/lang/jap-final/dest_str_s.c diff --git a/src/files/lang/jap-final/dishE.c b/src/files/lang/jap-final/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/jap-final/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dishJ.c b/src/files/lang/jap-final/dishJ.c new file mode 100644 index 000000000..6128852f8 --- /dev/null +++ b/src/files/lang/jap-final/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Øí€â‚„€ø‡ËÒ€ä€Ñ€ã€Ð€Ñ¸ƒ›ã\n", + /* 9*/ "€ä€Ñ€ã€Ð€Ñ¸‚ÂÄ\n€ö€Ñ€ãҀ܀рʀขȂÉŃ΃’Çß\n", + /* 10*/ "Øí€â‚„€ø‡ËÒ‰‚„€ß€÷€Ï€Õ¸ƒ›ã\n", + /* 11*/ "€©€œÒ‚¼Áσü´Ì€‰‚„€ß€÷€Ï€Õ¸‚ÂÄÇß\n", + /* 12*/ "‰‚„€ß€÷€Ï€Õ¸‚Ýςմ̻⃇ƒƒºá\n", + /* 13*/ "…Ñ‚¾‚€Ž\n", + /* 14*/ "€©€œÒ€é€Ê€Ö€Ï€þ󱄶ÅÉ\n", + /* 15*/ "…Ñ‚¾æ‚†‚øÄãÉ€€©€œ¿à„Ìã…ªçóÆ\n", + /* 16*/ "Øí€â‚„€ø‡ËÒ€ž€œ€¦€î€Ñ€Ï¸ƒ›ã\n", + /* 17*/ "…ƒ‚‚é‚ê‚Í‚•¸‚È‚ÉÅ€ž€œ€¦€î€Ñ€Ï¸€Ý€Ê€ãÇß\n", + /* 18*/ "€ž€œ€¦€î€Ñ€Ïæ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 19*/ "€ž€œ€¦€î€Ñ€Ïæ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 20*/ "Øí€â‚„€ø‡ËÒ€Õ€ð€Ü€Ñ¸ƒ›ã\n", + /* 21*/ "€Ñ€Ï€ë€É€…€ø‚„€ðÒ€©€œ¸‚È‚ÉÅ€†è‡±Çß\n", + /* 22*/ "€Ñ€Ï€ë€É€…€ø‚„€ðÒ€©€œÒ†è‡±Ïƒ±„¶ÅÉ\n", + /* 23*/ "€ö€Ñ€ãæƒÎƒ’ÄãÉ\n", + /* 24*/ "Øí€â‚„€ø‡ËÒŠ€Ð€Ù‚„†¸ƒ›ã\n", + /* 25*/ "Š€Ð€Ù‚„†¸€Ý€Ê€ãÅ€ú€Ê€×¸‚†‚øÇß\n", + /* 26*/ "Š€Ð€Ù‚„†¸‚Ýςմ̻⃇ƒƒºá\n", + /* 27*/ "Š€Ð€Ù‚„†€Ý€Ê€ã€…ƒÚ‚†…ž„ׄ؀Ž\n", + /* 28*/ "…ƒÚ‚†…ž‚ó‚ô€Š€Ð€ú€Ê€×‚†‚ø\n", + /* 29*/ "Øí€â‚„€ø‡ËÒ€«€ã€ö€Ê€Õ¸ƒ›ã\n", + /* 30*/ "€«€ã€ö€Ê€Õ¸‚ù´Ì€Ð€Ñ€â€ð¸‚È‚ÉÇß\n", + /* 31*/ "IR€Ü€Ö€Ë€Ï¸‚È‚ÉÅÉ\n", + /* 32*/ "Øí€â‚„€ø‡ËÒIR€Ü€Ö€Ë€Ï¸ƒ›ã\n", + /* 33*/ "IR€Ü€Ö€Ë€Ï¸‚ù´Ì…µ…¶ÒŠ€Ð¸‚È‚ÉÇß\n", + /* 34*/ "…µ…¶ÒŠ€Ðæ‚È‚ÉÄãÉ\n", + /* 35*/ "Øí€â‚„€ø‡ËÒ€±€Ü€Ö€Ë€Ï¸ƒ›ã\n", + /* 36*/ "€ù‚„‚„€þ€÷€ÊŠÒ€Ü€Ñ€Ê€à¸„€ÅÌ„–ã\n", + /* 37*/ "ƒ…ÌÒ€ù‚„‚„€þ€÷€ÊŠæ„ð„¬ÄãÉ\n", + /* 38*/ "Øí€â‚„€ø‡ËÒ€ô€å€ë€É‚„€ð¸ƒ›ã\n", + /* 39*/ "‚Ê‚ÍÅ̀܀߀ʀë¿à€Ð€Ñ€â€ð¸‚ã\n", + /* 40*/ "€Ü€Ñ€×€ú‚„€×¸‚ö‚ÝÅÉ\n", + /* 41*/ "€ù‚„‚„€þ€÷€ÊŠ€‘æ„ð„¬ÄãÉ\n", + /* 42*/ "€ù‚„‚„€þ€÷€ÊŠ€’æ„ð„¬ÄãÉ\n", + /* 43*/ "‡ŽÒ€Ð€Ñ€â€ð¸‚áÏÀÉÒ󯿀Ž\n", + /* 44*/ "‚€Í€Ð€Ï€äìµÎ»¿€Â†€îȼ´ÌÒ¿€À\n", + /* 45*/ "į€Ããð€Â‚ØÍÄλ߼πÂ\n", + /* 46*/ "€Ü€Ñ€×€ú‚„€×¸‚ö‚ÝÅÉ\n", + /* 47*/ "€ô€å€ë€É‚„€ðó‚Ê‚ÍÆâ¹ð´ÉÒóÓ€À\n", + /* 48*/ "‚€Í€Ð€Ï€ä€‚ „®ƒ´ðï€Â\n", + /* 49*/ "‚€Í€Ð€Ï€ä€‚ƒ‚‹ôÃ¿à‚ŸÌÀɹð€À\n", + /* 50*/ "€Õ€ñ€öÏ„€„ÅÄãÉ\n", + /* 51*/ "Øí€â‚„€ø‡ËҀ܀р׀ú‚„€×¸ƒ›ã\n", + /* 52*/ "‡²¸ƒ‘ÅɃ؃Ùó€Ö€Ë€÷€Ï€ã€Ï¸‚È‚ÉÇß\n", + /* 53*/ "Ããó‚§Ò€ã€ù‚„€å€Ï€þÓ‚ó‚ôð€Â\n†”ÁÝ´É€Í€Ð€Ï€ä€´\n", + /* 54*/ "‚µ‚¶‚ó‚ô€‰‹€Ñ€Ü€…€ã€ù‚„€å€Ï€þτ΅ŽÅÉ\n", + /* 55*/ "‚µ‚¶‚ñ‚ò\n", + /* 56*/ "‰‚„€ß€÷€Ï€Õ¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×󉂄€ß€÷€Ï€Õ¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 57*/ "€Õ€ð€Ü€Ñ¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×ó€Õ€ð€Ü€Ñ¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 58*/ "€ä€Ñ€ã€Ð€Ñ¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×ó€ä€Ñ€ã€Ð€Ñ¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 59*/ "Š€Ð€Ù‚„†¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×óŠ€Ð€Ù‚„†¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 60*/ "€±€Ü€Ö€Ë€Ï¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×󀱀܀րˀϸ†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 61*/ "€ô€å€ë€É‚„€ð¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×ó€ô€å€ë€É‚„€ð¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 62*/ "IR€Ü€Ö€Ë€Ï¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×óIR€Ü€Ö€Ë€Ï¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 63*/ "€«€ã€ö€Ê€Õ¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×󀫀ã€ö€Ê€Õ¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 64*/ "€Ü€Ñ€×€ú‚„€×¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×ó€Ü€Ñ€×€ú‚„€×¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 65*/ "€ž€œ€¦€î€Ñ€Ï¸†Â†Ã\n€š€ß€Ï¸†ãÅÉØØó€×€Ñ€Ê€×€ñ€å€Ì‚„Ö\n€“€€Ü€â€Æ€Ê€×󀞀œ€¦€î€Ñ€Ï¸†Âö\n€š€ß€Ï¸ÓÎÆ\n", + /* 66*/ "‚€Í€Ð€Ï€ä€ƒ”æ€Ö€Ë€÷€Ï€ã€Ïð€Â\n", + /* 67*/ "ƒÎÄ»€Â\nÃÒ†üƒ°Ò‚¸‡‘‚ŽÅß¼€Â\n", + /* 68*/ "€Ñ€Ï€ë€É€…€ø‚„€ðÓÃÒƒ†Ã¼ð€Â\n", + /* 69*/ "ÃÃÓ‰‹€Ñ€Ü€…€öð€Â\n", + /* 70*/ "€Ð€×€Û€Í€ÏÍ€Û€ï€Ì€ö€Ï€ã¸‚ù´É\n‹€ã€øÒ€ã€ù‚„€å€Ï€þ€ø‚„€ðð€Â\n", + /* 71*/ "ÃÃæ…·‚ׇ„‡…ƒŠð߀‚€Í€Ð€Ï€ä€Â\n", + /* 72*/ "ÃÒ‚¯Ó…Ž„Á„ÊÖÍ‚¾»Ì»â€Â\n", + /* 73*/ "€í‹‚„€Ù€Ï€â€ä\n‚¼Á󀛀߀ϸ†ãÆÍË¿Ûâ€Â\n", + /* 74*/ "ܼ€‘‚Ò€›€ß€ÏóÓÎÆÃÍæóÀâ€Â\n", + /* 75*/ "€í‹‚„‹€Ñ€×\n‚¼Á󀛀߀ϸ€’‚Ò†ãÆÍ\n", + /* 76*/ "€í‹‚„‹€Ñ€×Ò‚Àွ…éáæóÀâ€Â\n", + /* 77*/ "Š€Ð€Ô‚„’€Ï\n‚¼Á󀛀߀ϸ†ãÇõ€Š€Ðæ„×Á€Â\n", + /* 78*/ "€›€ß€Ïó‚¼ÁÒÜÒ¸‚ÂÄóÀâ€Â\n", + /* 79*/ "€Ó€ùŽ‚„€ß‚„\n‚¼Á󀛀߀ϸ†ãÇõ\n€Ó€ùŽ‚„€ß‚„¸„Õ÷ÃÍæóÀâ€Â\n", + /* 80*/ "€ã€ù‚„€å€Ï€þ‚Ó‚–Ï‚ŸâÃÍæóÀØÇ¹\n", + /* 81*/ "€Ü€Ñ€Ê€à€Ù‚„Š€‘¸‚ÝÏ‚öãÉ\n", + /* 82*/ "€Ü€Ñ€Ê€à€Ù‚„Š€’¸‚ÝÏ‚öãÉ\n", + /* 83*/ "€Ü€Ñ€Ê€à€Ù‚„Š€“¸‚ÝÏ‚öãÉ\n", + /* 84*/ "€Ü€Ñ€Ê€à€Ù‚„Š€”¸‚ÝÏ‚öãÉ\n", + /* 85*/ "‚ɇËéâ\n€œ‡Ì€ß€Ïó€‡Ë¸‚ÉâÃÍæóÀâ€Â\n", + /* 86*/ "‚ɇÌäÆ\n€œ‡Ë€ß€Ïó€‡Ì¸‚ÉâÃÍæóÀâ€Â\n", + /* 87*/ "€â€Ü€ã€’„Î…Ž\n", + /* 88*/ "€â€Ü€ã€”„Î…Ž\n", + /* 89*/ "€â€Ü€ã€•„Î…Ž\n", + /* 90*/ "‚—҂̂͂†‚øÏƒ±„¶ÅÉ\n", + /* 91*/ "‚—¸€è€Ê€×€Ð€Ò€ãÅÉ\n", + /* 92*/ "ÃÒ‚—¸‚̂͂†‚øÇß\n", + /* 93*/ "ÃÒ‚—¸€è€Ê€×€Ð€Ò€ãÇß\nƒµò¿ãÎ»Òæ”€Ñ€Ï€ãóÆ\n", + /* 94*/ "ÈÅÌ‚­ƒ Ò‚—€Ž\n", + /* 95*/ "€«€ß€Ï¸†ãÅÉØØó€œ€ß€Ï¸€‘ƒ¬†ãÆÍŵæÚ\n", + /* 96*/ "ŵæ¹ðƒØƒÙ¿à€€«€ß€Ï¸†ãÅÉØØó€œ€ß€Ï¸Ü¼€‘ƒ¬†ãÆÍ€ÄàφœÁŵæÚ€Â\n", + /* 97*/ "€â€Ü€ã€“„Î…Ž\n", + /* 98*/ "ƒ…ÌҀ܀рʀขÂÄÇß\n", + /* 99*/ "†§Ò€Ü€Ñ€Ê€à¸ƒ…̂ÂÄÇß\n€‡´€Ü€Ñ€Ê€àÓÆèÏ€÷€Ý€Ê€ãÄãâÒ󀃻ó‡ÌÄ»\n", + /*100*/ "‚…ß҇ˇÌϺâ€ç€ø¸€à€È€Ê€×ÅÌ€€Ð€×€Ý€Ü€Ù‚„Џ‚ö‚ÝÇ߀Â\n€‚ö‚ÝÅÉ€Ù‚„Џ€†§Ò€ç€øÍ‚ë„ÎÇ߀Â\n", + /*101*/ "€Ù‚„Š€‘¸€à€È€Ê€×ÅÉ\n", + /*102*/ "€Ù‚„Š€’¸€à€È€Ê€×ÅÉ\n", + /*103*/ "€Ù‚„Š€“¸€à€È€Ê€×ÅÉ\n", + /*104*/ "€Ù‚„Š€”¸€à€È€Ê€×ÅÉ\n", + /*105*/ "€ã€ù‚„€å€Ï€þ‚ñ‚ò€… ƒú¸ƒ†¿ÎÁÌÓÎáØÇ¹\n", + /*106*/ "€â€Ü€ã€‘„Î…Ž\n", + /*107*/ "ƒ¸‚̂͋€ã€ø€€ß‚„€ÿ€Ê€ã¸€è€Ê€×€Ð€Ò€ãÇß\n€³€ã€÷€ü‚„¸„ã†ÌÅ̀πฆ£á‚ŸÅ̇ÌÄ»\n", + /*108*/ "ƒ•ƒ¬Ó‚ÄÁ‚—óÆ€Ž\n", + /*109*/ "…Ô‡ËéÓƒê‚×ÅÌÁâ‚—óÆ\n", + /*110*/ "‚í‚׸ƒ…Á‚îÂíÏ€ƒ…ÌÒ‚—¸‚ÙÇ\n", + /*111*/ "€ã€ù‚„€å€Ï€þ‚ñ‚ò€‚—Ò‚í‚׸‚îÂÌÅØ´É\n", + /*112*/ "€â€Ü€ã€–„Î…Ž\n", + /*113*/ "€â€Ü€ã€—„Î…Ž\n", + /*114*/ "€©€œ\n‚¼Á󀛀߀ϸ†ãÅ€‚ù¼ÃÍæóÀâ€Â\n", + /*115*/ "†§Ò‡É»€ç€øÍ‚ë„ÎÇß\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "€¨€¤€‚€Í€Ð€Ï€ä€Â\nƒ Óƒ—‡³Ï€ï€Ê€Û€Í€ÏÖÒ„¥ƒŽ¸‚Ú´ÌÁã€Â\n", + /*125*/ "‚€Í€Ð€Ï€ä€…†‚„€×\n", + /*126*/ "„±‚ý€ƒ‚܃߀„\n", + /*127*/ "€’€“ƒ£\n", + /*128*/ "|€œ€¢€ë€Å€Ñ€ø€¶€€’€—\n\n€ã€ù‚„€å€Ï€þƒØ†Î€¾‚ó‚ô\n€ã€ù‚„€å€Ï€þƒ±ƒ²€¾€š€¹€¹\n€Ü€â‚„€ß€Ü€¾†Š‚Ä‚µ‚¶ƒ‚Ú‚\n\n|’€ú€ë€Æ‚„€ø€¾\n\nƒ¸ƒ¹Ï†”Á‡„‡…ÄãÌ»âæ€…„‚‘ƒ¦ƒ§Óλ€Â‚®ãɃꅷ†…ƒ¦¸‚ÕÊ€ºàÞâ€Ò€È”€Ï¸‚ù»ÃÎÆ‚ó…΀ӂ„‚€È€Ï€ã€Â‚Û‚ÜÒƒ‹…ÒÂÉ€ã€ù‚„€å€Ï€þƒ±ƒ²Ó€€ã€ù‚„€å€Ï€þ€×€ö€ÜÏ„ÙÉ΀þ€ù‚„Џ„Ù†ˆÄÇÉ×ôóºâ€Â€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò‚ê…§ƒÑ΀ӂ„‚€È€Ï€ãÍ„Õõãâß¼ÏδɂۂÜÓ€€‡‚„€ë€È€×€ã€…†‚„€×€ˆÒ€Ù‚„Š€ç‚„€ð¸‚ÝÏ‚öãÉ€Â\n", + /*129*/ "‚€Í€ä€Ú€Ï\n", + /*130*/ "„±‚ý€ƒ„œƒß€„\n", + /*131*/ "€’€˜ƒ£\n", + /*132*/ "|€œ€¢€ë€Å€Ñ€ø€¶€€€™€»\n\n€ã€ù‚„€å€Ï€þƒØ†Î€¾‚ó‚ô\n€ã€ù‚„€å€Ï€þƒ±ƒ²€¾€š€¹\n€Ü€â‚„€ß€Ü€¾„‚Ú‚µ‚¶ƒ‚Ú‚\n\n|’€ú€ë€Æ‚„€ø€¾\n\n‚£‚¤ó‚­Üƒ¦ƒ§Ò„Ü»…µ…¶€Ü€Ñ€Â€î€þ€ä€ð€÷€ø‹‚„¸‚ùåÇÉà‚ÛÒ‡ÎÏ‚ŸâÜÒӻλ€Â€é‰Î‚à‚ׂ‘ßáÜ€„‚Ú‚µ‚¶¸‚«‡ËÍÆâ€Â‚€Í€Ð€Ï€äÏ‚ÎàãâØóÓ‚£‚¤‚­ƒÞÒ€ã€ù‚„€å€Ï€þƒ±ƒ²¸‚º‚ÕÅ̻ɀÂ\n", + /*133*/ "†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï\n", + /*134*/ "„±‚ý€ƒ„œƒß€„\n", + /*135*/ "€–€’ƒ£\n", + /*136*/ "|€œ€¢€ë€Å€Ñ€ø€¶€€€€»\n\n€ã€ù‚„€å€Ï€þƒØ†Î€¾€€»€»€»\n€ã€ù‚„€å€Ï€þƒ±ƒ²€¾€€»€»€»\n€Ü€â‚„€ß€Ü€¾€€»€»€»\n\n|’€ú€ë€Æ‚„€ø€¾\n\n„…øƒÑσᅼ΅……†ƒî€½…„„„‡ó€‚­„Ù€â€×€è€ú‚‚„¸„„‘‚Ï‚¦á…ÜÂÌÀɀրˀ÷€Ï€ã€Ï‚£‚¤Ò†ˆƒüƒî€Â‚ÛÒ€Ó‚„‚€È€Ï€ãæ…„‚ÚÆâƒ…€ï€Ê€Û€Í€ÏÒ’€ö€Ï¸ƒü‡‘Å€ÈÒ‚ƒ‚„؆³¸‚ÛÒ€Ô€ë€Æ€Ü¿àƒå…рـπã€ú‚„€øÆâ€Â„›‚ÍҀ݀πÜÓ…«Å€ô€å‚„€×€Â\n", + /*137*/ "€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒ\n", + /*138*/ "„±‚ý€ƒ‚܃߀„\n", + /*139*/ "€“€™ƒ£\n", + /*140*/ "|„‚„‹€ë€Å€Ñ€ø€¾\n\n‰‚„€ß†€Ñ€Ï„“Ò€ã€Ê’€Â‡¾‚‚φ¹ƒóÅ€„±Ï‡£„ÉÄãâÃ͸†›…Ðπрóæâ€Âƒ—ƒ˜æ€÷‚„†‚„€Û€Ê’¸ƒ›´Ì»Î»Íƒµæ…±ØÎ»€ß€Ñ’€Â€ö€Ñ‹€ø€ƒ„­ÏƒÆ€Ö€ö€ÑΆ€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï€„σ¾ËÉÛÏÓ€‚݃и†Âõλ€Â\n", + /*141*/ "€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ï\n", + /*142*/ "„±‚ý€ƒ„œƒß€„\n", + /*143*/ "€”€–ƒ£\n", + /*144*/ "|„‚„‹€ë€Å€Ñ€ø€¾\n\n„„ž„ŸÒ„ „¡„¢€Â€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÍ‚„€ã€ä‚„‚„°Ïºâ€ÂÍ»´ÌÜ€‡ˆ»Ï‡¾‚‚Í„™¸†Ä…ôÅÌ»âƒÎóËÎæ´Ì»âðÂðæ€Â€ã€ù€Ï€ãÓ„¹‚ŒƒÑ΃߅Žðæ€ßᄹ‚ŒƒÑ΀Հڀϊ€öÏÓ†Èæ‡Ëæàλ߼óºâ€Â‚ÛÓ„„ž„Ÿ‚ŽÒ†‰ƒ›…’ƒÑ΂ƒ˜¸ƒ…̃›áÅÀ´Ì»â€Â\n", + /*145*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø\n", + /*146*/ "„±‚„Å‚¢€ƒ€š€¢€„\n", + /*147*/ "€€¼€•ƒ£\n", + /*148*/ "|’€ú€ë€Æ‚„€ø€¾\n\n‰‚„€ß†€Ñ€Ï„“Ïߴׂ̄ÈÄãÉ„±‚„Å‚¢ó€…ƒÚ‚†…ž‚¢‚‚ÏƒÔƒÎæ‚•¿ãÌ»â€Â‚³‚´ÎÃÍÏ€‚ÛÓ€‡€ò€ö€ø€ˆ¸‚մ̻ɀ‚ÛÒƒ¸ƒ¹ÏƒÞ»„Å‚¢€ùŽ€øÓ€‰‚„€ß†€Ñ€Ï„“Ò†µƒÒ’€ö€ÏÏ…À„¤¸‚ÕÊ„ØÛÉÒð€Â‚ÛÒƒŸÅ‚ÔӄŃÑó€€Ð€Õ‰€ï€Ê€×΀րˀö€×€ß‚„¸¿ÜÅðÅÌ»â€Â\n", + /*149*/ "€Ó€øŒ€Ü\n", + /*150*/ "€î€Ñ€Ð€Ï€ƒ„œƒß€„\n", + /*151*/ "€“€’€ƒ£\n", + /*152*/ "|’€ú€ë€Æ‚„€ø€¾\n\n€î€Ñ€Ð€ÏÍ»¼†×†ØÒ€Ó€Ñ€÷€Ð€Ï€Â‚ÛÓ’€ú€â€×€ß‚„€ƒ‰€Æ€ü‚„Š€„󀆀å€Ó€ø€…€Ö€Ë€÷€Ï€ã€ÏÒƒƒ…¿ó‚˜†ä¸„£„¤Å̻ɀî€Ñ€Ð€ÏÒ‚˜†äƒÆ‚ù¸ƒ÷ƒøÅ̻ɀ’€ú€â€×€ß‚„ÓºàÞâ€Ò€È”€ÏÒ‚ù»‚ÝÍÅ̇„‡…ÄãÌ»â€Â€Ó€øŒ€ÜÓ‚˜†äÒ€ë€Å€Ï󀂘†äÏ‚ÆâÜÒÓƒ…̀܋€ö€Û€ÑÍ„ª´Ì»â€Â\n", + /*153*/ "€ï€Ü€ß‚„€ú€ÏŠ\n", + /*154*/ "„±‚ý€ƒ„œƒß€„\n", + /*155*/ "€’€•€€“€ƒ£€À\n", + /*156*/ "|’€ú€ë€Æ‚„€ø€¾\n\nÝÂÏ„—ƒüË„™„šÒ„œ€Âƒ¸ƒ¹Ï‚‡æƒÞÁ€‡¿»„›€ƒƒÏƒ¹€ù€Ñ€Ï€Ù‚„€ã€„¸ƒóÌ»â€Â€Õ€Ú€ÏŠ€öÝ€ã€ù€Ï€ãæ„儿Å̻⅚…›€þ€ø‚„’Ò€÷‚„†‚„€ÂÈÒ†˜ÒÃÍÓºØá„Åàã̻λ€Â\n", + /*157*/ "€ï€Ü€ß‚„€ú€ÏŠ\n", + /*158*/ "€Ü€Ø†‚„€ƒ‚Ê‚ÍÅɃ؃ـ„\n", + /*159*/ "‚ ‚ì\n", + /*160*/ "|’€ú€ë€Æ‚„€ø€¾\n\n„™„š„œÒ€í€ú€þ€ö€ðƒ¡ƒ¢¸‚Õˀ܀؆‚„‚‘…ý€Â‚€‚ƒ˜Ò€ò‚€Ì€ù‚„€ß‚„€ô€å€Ê€ã¿à€… ‚¹ó…ûƒ¥‚‚Һ ŃÑ΀рܸ‚ŸÆÃÍæóÀâ€ÂÃãÏßá€Ü€Ø†‚„Ó‚˜†äó‡Ã‚ÈχÂÄóÀâÒóºâ€Â\n", + /*161*/ "€®€¬€šƒÆƒÇƒÈ\n", + /*162*/ "„±‚ý€ƒ„œƒß€„\n", + /*163*/ "€•€ƒ£\n", + /*164*/ "|’€ú€ë€Æ‚„€ø€¾\n\nƒÞ»„ŃßÍ‚®ãɃ½ƒ®‚‚¸‚ÕË€€Ð€ë€÷€Õ†„€Ð€ñ€÷€Õ„±€Âƒ¹Ïƒ—ƒ˜æ… Å»Íƒ¤ìÉÃ͸‚Ú¾¼ÍÆâ怀ã€ù€Ï€ãÒ߼΄±‚ýõ¿áÏ‚›ØãÌ»â€Â“€ö‚€Ê€×€’¸‰‚„€ß†€Ñ€Ï„“Ï‚úÅ‚»ÂâÃ͸„Ú¹ðƒ óÜ€€ã€ù€Ï€ã惗ƒ˜¸„ç„–âÍÓƒ…Á„ª´Ì»Î»€Âƒ—ƒ˜Òƒ½ÛɃ¤…õÓ‡®Á„œóºâ€Â\n", + /*165*/ "€î€Ñ€Ð€Ï\n", + /*166*/ "€î€Ñ€Ð€ÏÓ€‚˜†ä󀇀þ€ù‚„€ˆÍ„Õõãâ€Ó€Ñ€÷€Ð€Ï󀄵†‘Ï„ü´Ì‚˜†ä¸€ò€å€ß€÷€Ï€þÅÌÀɀ‚ÛàÓ„±‡ÀÏ‚üÅ̆±ƒ´ƒÑóºá€„±‡ÀÏӀ܋€ö€Û€Ñ„…Ø‚¢‚‚æºâÍ…ÁìÌ»â€Â‚ÛàÒ‚˜†ä‡ËϾÂâ€Ù€Ï€ß€×€ã‚¯Ó†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€ÏÒÙ󀄱‡ÀÍÒ… ‡¶Î‚üƒúÓØð‚ڴ̻λ€Â\n", + /*167*/ "€Ü€Ø†‚„‚‘…ý\n", + /*168*/ "€Ü€Ø†‚„Ó†±‚‘ƒÑ΀Ӏр÷€Ð€Ï†×†Øóºâ€Â‚ÛàÓ€î€Ñ€Ð€ÏÍ„µ†‘‚‘´ÌÀɃ ó€‚­‚¼ÏδÌß¼ÝÁ„ð‚‘τ΃´Åɀ‚‘‚’ƒ“σÆÀ΀ñ€Õ€Ð‚„€î‚„¸‚ÍƒŽÆâÃÍæ„Ü»€ÂÎîÎà€…„Ó‚ÛàÓ„àÄÁ€€ìŒÒ߼΃¨ƒ°ð¿àóºâ€Â‚ÛàÓƒ¸ƒ¹Ï‚í‚׃Ñó€‚ÛàÒ†øÏÓ€‡‚‘»Ò†…††€ˆæºâÍÜ‚©åãÌ»â€Â\n", + /*169*/ "‚‡‚ˆ€Ü€ã‚„€÷‚„\n", + /*170*/ "†ý€Ó⿆ý€Ž†úƒÆÎ€Ó€Ñ€÷€Ð€Ïƒùæ„ô„õ„öÒ„øÏƒ—à‡ÁÙ€ÈÒ‡²¸…ÞÅɀƒ•ÍδÌÓ€È҂ꇳӀé€Ê€Ö€÷Åλ€ÂÈÒƒùÏÓ…„ƒ§‚ÒÍÌËÜÎÁƒôƒõ΀ҀȔ€Ïæ‚̓ŽÄã̻ɀƒφ̀‡€å€Ì‚„€×€÷€Ð€…‰€Æ€Õ’€ö‚„€ˆÍ„ÕõãâÃÒƒ„½Ó€ƒ°…ÚÒƒ˜„ƒ†Ù„θƒ…̃¼ƒÜÏÅÌÅØ¼€ƒ»äÅ»‚‚¸‚Õ´Ì»ÉÒð€ÂƒùæÜÓ݃‚¢Å̻λ̈́ªåÇâÉÛÏ€…ッ‚„»Ó‚΂ÏÄã€Ããà҃؆θ…•…–ÅÉ€ñ€Ê€Ý‚„‚”€ÊŠÍ‚¿Ï€†ê†ëÒ‚Û‚ÔÏ…ÞÄãÉ€ÂÃÒƒùÃȀ݀߀π‡Ç‡ÈÒ‚­ƒº€Ó€Ñ€÷€Ð€Ïð´ÉÒð€Â\n\nƒ“ÓƒàãÌ€›€œ€’€€€†‘€ÂƒÿÒ‚˜†ä‚–ƒ¨ƒ°Ò€î€Ñ€Ð€ÏÓ‚˜†äó†ö„ØÒ„±‡À¸‚È‚ÉÅɀ‚ÛàÓ„±‡ÀσÆÀ΂¡‚¢ƒß¸‚É‚ŸÅÉæ€º½Ì€Ù€Ï€ß€×€ãÓÍàí€ÈÒ‚·…¦…ªƒ«¸‚É‚¬âÃÍÏÅÉ€Â\n\n€î€Ñ€Ð€ÏÓ€‚˜†äƒ“‚ýó‚©½õ€š€€‘€–€•€†‘ω€ø€ß€…€Ó€÷†€æ€Ü‚»‚¼ó†±‚‘ƒÑ΀Ӏр÷€Ð€ÏҀ܀؆‚„̓ăŀ„àÄ΂‘‚’ÓÆèσƂ‘‡ÂÖÍ„úæ´Ì»´É€Â„µ»‚‘‡ÂÒƒ“¸ƒ¦Ì€‚ƒƒëÒ„ð‚‘æ…„ƒÍÅÉ€Âſŀ܀؆‚„Ò‚Ì‚’‚åÓ‡›„‘€Ó€÷€Ðó€â€ú‚څ縆£áƒ–ÅÌ€î€Ñ€Ð€Ï¸‡¦‚ßÅÌÀÉæ€€î€Ñ€Ð€ÏÓÈãÏÓ‚Ààο´É€Â\n\n€î€Ñ€Ð€ÏÏÍ´Ì€„±‡ÀÜ†Èæ€Ñ€ß»„Ö…ØÍδÌÀ̾ဂ˜†ä¸‚ñ„¯Ò…õ¸‚Õ´Ì‚É̻ɀ„±‡ÀÓ…‡…ˆÒƒ†‡Ë̈́ƅ§‚–Ò‚Ú‚Äó€ØÆØÆƒôƒõ΃؆ÎÏδÌÀ̻ɀ‚Ûàæƒ•„±‡À̈́ㅜ¸Íãõ€À´Í€å€Ê€×Ͼʻဂ˜†ä‡ËÏ„ÜÁÒ‚‘‡Â¸…’À‚ÃÃÆ‚¡‚¢ƒßæºâÍ„ªåãÉ€ÂÅÉæ´Ì€î€Ñ€Ð€ÏÓܼÅõàÁ€Š„±‡ÀæÜ´Í€‡ƒÆ„±€ˆÏÎâØó€‹„ã…œÓÍàíςɂ¬´Ì»ÁÃÍÏÅÉÒð´É€Â\n\n€š€€‘€™€˜€•†‘φ€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï悘†äÒ‚¼Áϻɀî€Ñ€Ð€ÏÒ€®€Ÿ€¨Í„ã…œ¸ÍâÃÍ󱄶Åɀ‚ÛÓ„±‡ÀÍ€î€Ñ€Ð€ÏÒ†Õ‚ÔÏ€ñ€÷€Ê€ãҺ⒀ö€Ï¸ƒˆƒ´Å€„±‡ÀÍ€î€Ñ€Ð€ÏÒ… ‡¶Î‚Ÿ‚¤»¸ƒŒÛâß¼†å‡‘Åɀ€î€Ñ€Ð€ÏӀրˀ÷€Ï€ã€ÏÒ’€ö€ÏÏ„÷ƒ´Å€‚ÛÓƒ¤ƒˆóÀℱƒ°ð͆´ƒ®ÅÉÒó€‚Ûσ—ƒ˜ÉÊÒ…‡…ˆ¸ƒ˜Â„”½€‚ÛÒ„ÿ…€ƒÂ‚¿àÈã¸‚È†ÓÆâÃ͸…©‚¡ÅÉ€Â\n\n€š€€’€€€–†‘€€Ü€Ø†‚„Ò‚Ì‚’‚åæ€Ý€ß€ÏÒ€ñ€Ê€Ý‚„‚”€ÊЏ‚È‚ÉÅɀ‚ÛàÓÆèÏ€»ËÜÒƒº…’΂ԄÏ󂘆äÒ„‚„‹¸„ØÛɀ„±‚ý݂ă°¸„ê„ëÅ€‡Á¹ðƒùÒºàÞâ„ì„í¸ÈÃ¿à…’À‚ŸÅÌ»´ÉÒð€ÂüÅÌ€ØÉÉÁ‚ýπ܀؆‚„Ó‡ŽÒƒùæ„ô„õ„öχÁ¹ó»âÃ͸ËÀÍÛÉ€Âſŀ…„…øÏÈÒƒùÏ€Ð€×€Ý€ÜÆâÏÓ€‚ÛàÏ܃͂˜ƒ¨ƒ°ÒƒËÂæƒ‡ƒƒóº´É€Â\n\n€Ü€Ø†‚„Óƒ—àÒ€÷€Ú‚„€à†ÙƒÝ¿à€ƒ—ƒ˜ÉÊÏ‚£‚‚ÅÌÁãȼ΂¤„“¸€÷€Ü€ã€Ð€Ê’ÅÉ€ÂÈÒ€÷€Ü€ãÒ€‘‚Æ‚­†Šæ‰‚„€ß†€Ñ€Ï„“óº´É€Â‚ÛàÓ„÷„“Ò€ã€Ê’€€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÏ„ã…œ¸ƒ›á€€Ò€î»ÃÍðàÂÒŒ‚€ç€Ü¸‚ÕÊ¿Âɀ€ƒÜÊä¹È¹ÎŒ‚€ç€ÜÓºâÓíæÎ»Òðæ€Â€„‰‚„€ß†€Ñ€Ï„“Ï„Š„øÒƒùÒ„‚„‹¸‚Ý„äåÇâ¿åáÏ€€Ü€Ø†‚„Ò‚·¹ð€â€×€è€ú‚‚„¸ƒ˜Â„”½âÃÍÏß´Ì€‚˜†ä‡Ëó‚­ÜƒÆÀ»‚¤„“ÏÆâÃ͸‚º„èÅÉÒð€Â‰‚„€ß†€Ñ€Ï„“æÝàÎÂãõÎàλÃÍÓ€…ƒÚ‚†…ž‚¢‚‚¸‚Õ´É€š€¢€ô€å€Ê€ã¸ËÁâÃÍóº´É€ÂÃãÓ…¨Å»ƒÛ„óÓº´É怂ÛàÏÓ‚¡‚¢Î‚Ž…åÒÃÍóº´É€ÂüÅÌÃÒ’€ú‚€È€×€ãӀ܀߂„€ãÅÉ€Â\n\n€Õ€Ú€ÏŠ€öÓ„„ž„ŸÒ„ „¡„¢€€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÏÃÒ‚ðƒœ¸‚ÕÊ¿Âɀ€ã€ù€Ï€ãÓÆèÏ‚ðƒœÏ„åå´É怄‰„Š„€„‹„ŒÒ‚ùƒˆ…©‚¡¸ƒ¶ƒ·¿àƒ¥ß¼ÍÆâ‚Û҆凑ӀƒÆƒÇƒÈÏ‚ªƒ¬Ü…ï‡ÌÄãɀƒƃǃȸ‡¼àÇíÏ„‰„Š„€„‹„Œ¸‚ùƒˆÆâÃÍÓ‚ ‚¡‚¢ð´ÉÒó€‚ÛàÓÜ´Í…ª‚ßÎ‚ðƒœ¸ƒüÌɀƒƃǃȸ€×€ú‚„€ÏÍ‚•À¿½Ì€‚ÛàÒ†±ÀÎ߼πـπã€ú‚„€øÆâÒð€ÂÃãæƒ±„¶Æãõ€€Õ€Ú€ÏŠ€öÍ€ã€ù€Ï€ãÏӀ܀؆‚„¿àÄàÎ ‚„€ä€Ü€ˆæ‚º„èÄãÉ€Â\n\nſŀ„ƒÙÓȹÎπЀî»ÜÒóÓο´É€Â€Ü€Ø†‚„Ò‚Ì‚’‚åÉÊÒ…€†›Ò‚Ö»Ó€€‡€å€Ì‚„€×€÷€Ð€…‰€Æ€Õ’€ö‚„€ˆ¸‚ÝÏÆâÃÍó€‚ö‚݃ ÓÈ㸂ù´Ì€î€Ñ€Ð€Ï¸ƒ‘ŃöâƒÏ€‚˜†ä¸…äÅς΂ÏÅß¼ÍÅÌ»ÉÒð€Âðæ€€Õ€Ú€ÏŠ€öÜ€ã€ù€Ï€ãÜ„—ÒƒÏ÷à‡Ìæ´É€‡„™€ˆÍ€‡‡¾‚‚€ˆÖÒ†¹ƒó¿à€ƒ—ƒ˜ÉÊæ†€îÄãÌ»âÍ»¼‚¡‚¢ƒßσ…ÁƒµæË¿Î¿´É€Â\n\nſʼn‚„€ß†€Ñ€Ï„“ӀɨɨóÓºâæ€ºâÜÒ¸ƒÛ႟Å̻ɀÂÈãÓ€€Õ€Ú€ÏŠ€öÉÊÒ‚ðƒœæ€‡‚ìà¿Ï¾¿Å»€ˆÃÍσµòÁðÂ҄Ń߸‚մ̻ɀÂÈãæ€Ý€ß€Ï€Û€Ê’Ò…ƒÚ¸‚†…žÆâÉÛσÛ႟ÄãÉ€š€¢€ƒ„±‚„Å‚¢€„ð´ÉÒð€ÂÃÒ€š€¢æ€ƒ•‚ÒÒ‚ðƒœÏ‚üÆâ…À„¤¸€Õ€Ú€ÏŠ€öφ°é¿ÂÉÍÀ€€Õ€Ú€ÏŠ€öÓ‚ÛÒ„±…ޏƒ‘Ńöä¼ÍÅɀ‚ۂÜÓ€ÃÒ€š€¢æ‚ï‚ðÎÃ͸„н…ªçÌ»â͆´ƒ®ÅÉÒð€Â‰‚„€ß†€Ñ€Ï„“惥âÜÒßáÜ´Í„ÜÁÒÜÒæ‚ñåãß¼ÍÅÌ»âÃÍæ…ƃ˜å¿´Ì»É€š€¢Ó€€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÒ…¼¸‚ù´Ì€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ö̓˸…ôÛÉÒóº´É€Ž\n", + /*171*/ "€ñ€Ñ€Ï€Ü€ã‚„€÷‚„\n", + /*172*/ "…„‚‘ƒ¦ƒ§Òλ„Ù„±€Ü€ÑÒ‚€Í€Ð€Ï€ä€…†‚„€×Ï†Š‚µ‚¶æ„”½àãÉ€ÂÈãÓ€‰‚„€ß†€Ñ€Ï„·„“Œ€øÒ‚˜‡Ì„ÿ…€€Ó€÷€Ð¿à€‚ƒ„±Ò………†ƒî¸‚¨»‚ŸÆÍ»¼ÜÒð´É€Â………†ƒî¸‚È‚ÉÅÉÍÀ€‚€Í€Ð€Ï€äÓÈÒ………†ƒî€Š€×€ß‚„€…€Ö€Ë€ú€øÍÓ€…„Ó‰‚„€ß†€Ñ€ÏÏß´Ì…ÊàãÉ„±‚„Å‚¢óºâÃ͸„Ŵ̀ۀ̀ʀ׸‚îÂâ€ÂſłۂÜÓÈÒØØŠ€×€ß‚„€…€Ö€Ë€ú€ø¸ƒÓƒ…ÎÍÃäØóƒ÷ƒøÆâøÁ€‚µ‚¶¸‚¾‚ÚÅɀŒ€ø‚ŽÏ€Ð€ö‚„€ðæÎဂœ‚¿àÒ‚ž‚ŸÓ‚ ‚¡‚¢Ïδɀ‚€Í€Ð€Ï€äÉÊÓŒ€ø…߇ËÒ€ì€÷”‚„€ãÖ̓†¿»€„’‚ƒÒ‚ž‚Ÿ‚݃Ðóºâ„³‚ÔÒ‚¥‚¦ƒùÏ‚ÀâøÁ€‚ßÅÁ‚‘åÎÁÌÓÎàο´É€Â\n\nЀ׀߂„€…€Ö€Ë€ú€ø¸„ßåãɉ‚„€ß†€Ñ€ÏÓÈÒ€’„¸ƒ Ï€†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï†¿„±¸„´ƒÑÍÅ̃ê‚×Ï‚ŸÉ€Âƒÿ…Öϻɂ۸„±…ÚÏÍ´ÉÒóºâ€Â‚ÛàӀրˀ÷€Ï€ã€ÏÒƒéÍ…’À…ó½Ï€‚ÛàÒ€‡‡œ‡’€ˆóºâ„±‚„Å‚¢ÒЀ׀߂„€…€Ö€Ë€ú€ø¸ƒ–Æß¼Ïƒƒ…ôÅÌÀɀ‰‚„€ß†€Ñ€ÏÓƒµò»Ì»Î¿´É怂ÛàÒ„€Å̻⊀׀߂„€…€Ö€Ë€ú€øÓ€…„ÓÈÒƒÿ…Ö҂ϻɀ€րˀ÷€Ï€ã€Ï¿à‰‚„€ß†€Ñ€ÏÒ‚ðƒœÏË»ÌÒ…Ú„¤¸‚îÂÌ»âÍÃäóº´ÉÒóºâ€Â‚€Í€Ð€Ï€äÓƒ—ƒ˜Ò€Üóºâ€Ö€Ë€÷€Ï€ã€Ï¸Í¼Í¼‚¨‚ŸÅÉæ€Š€×€ß‚„€…€Ö€Ë€ú€øÓ‚æÏ„ããƒöàãɃ óº´É€Âſŀրˀ÷€Ï€ã€ÏÓ€‚ÛÒ€‡€ë€ù€ÏŠ€ˆóºâ€î€Ñ€Ð€ÏҀܓ€Û€Ë€÷€Ü€ã҃˸„Õ÷Òυƃ˜Î„ì„í¸ƒ¥É͆´ƒ®ÅÉÒð´É€Â\n\n‚€Í€Ð€Ï€äÓÆèÏ€Û€Õ€Ö̓Á¹ð€Â‰‚„€ß†€Ñ€ÏÒ‚Ý‚¯óºâÍ»åㆀ•€Ù‚„”€ù‚„€Û€Í€ÏÒŒ€øó„׿ãâ€ï‚„€â€Æ€Ï€þ¸€Ü€ÑÆâÉÛð€ÂÃҀ€â€Æ€Ï€þ¸…•…–ÅɆك݀‰‚„€ß†€Ñ€ÏÒ‚ðƒœÏÓ„„ž„ŸÒ„ „¡„¢óºâ€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ïæ„åå´Ì»âÃÍ€ØÉ‚ðƒœƒ…‚‹Ò€÷‚„†‚„óºâÍ„ªåãℾŻ„™„š„œÒ„Ö…Øæ‚ìà¿Ïδɀ€ã€ù€Ï€ãæƒÆƒÇƒÈ¸ƒôƒõÏÄàÆ‚ðƒœ¸‚ìà¿ÏÆâÒ¸ƒþ»Ì€‚€Í€Ð€Ï€äÓÆèÄØÈ㸂£‚¤Ö̈́ㅜÅÉ€Âſŀ€ã€ù€Ï€ã¸„¬ÛâƒÏ€Ü´Í†ƒÒ‚µ‚¶æ‚ȃ¨ÅÌ»ÉÃ͸„ÅâÃÍÏÎâ€Â\n\n€î€Ñ€Ð€ÏҀܓ€Û€Ë€÷€Ü€ãÉÊÒƒù悪ƒ°¿Ï‚×Ê‚ØÍÄ。°‚‹Ý…¹æ»Ó€€ç‹†Ò€Ó€÷€Ð€•€‘Í»¼„¦Ò…µ…¶„§‚˜ÖÍ‚´õã̻ɀƒ¨„Öƒîæ»Éà‚¨‚ŸÅ€ƒùÒ…¹æ»Ü‚ÒƒÕÆâß¼ÏÍ»¼‡£„¡¸‚îÂÌ€‚€Í€Ð€Ï€äÓ„§‚˜Ï„Ñ‚öÅ€ÈÃϻɄ³‚ÔҀ܀Ñ̈́΃àÅɀ† …†„ÿ…€…Ï‚ö´É‚€Í€Ð€Ï€äÉÊÓ€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò…µ…¶¸„ÅâÃÍÏÎâ€Â€Ž‚£‚¤Ò€‡€ë€ù€ÏŠ€ˆ€î€Ñ€Ð€ÏÍÓ€€‡€þ€ù‚„€ˆÍÅÌ„Åàãâ€Ó€Ñ€÷€Ð€Ïð´ÉÒð€Â‚Û‚Üæ‚ªÍ¿ƒË‚ŸÅÉ€î€Ñ€Ð€ÏÓ€Ó€øŒ€ÜÍ…¼¸‚õéɀ‚ÛÓ€î€Ñ€Ð€ÏҀܓ€Û€Ë€÷€Ü€ã‚‚™Ò‚¯†È¸ƒÁ¹ó»É‚˜†äƒÆ‚ùÒ‰€Æ€ü‚„Šð´ÉÒð€Â\n\n€Ó€÷€Ð€•€‘Ò€ï€Ê€Û€Í€Ï¸ÃÎÅÌ€‚€Í€Ð€Ï€äӃƃǃÈÒƒÓƒ…¸‚¬â‚µ‚¶Ï‚ãâÃÍæóÀɀ‚ۂÜӀЀö€Ü€Õ҃Ħ„§‚˜ó€Ü€à€Ì€û‚„‰€ÜςʂÍÅ€ƒÆƒÇƒÈ„¹ƒˆƒÂÖÍ‚Àá‚Á¹ðÒð´É€ÂƒÁ‚ÚƒÂæ„Ì„ÍÆâÍ€€ã€ù€Ï€ã͂ʂÍÅɀ܀؆‚„ÉÊÓÄ´ÈÁ‡Ã‚ĸ„ׄØÅɀ޿€ÈÃÏÓ‚Ûค¬ÛâøÁ‚€Í€Ð€Ï€äæ»É€Â‚Û‚ÜӃƃǃȸ‚ž‚Ÿ€Õ’€Ý€øÖ̓÷ƒøÅÉæ€ÈÒ‚ýÏÜ€ã€ù€Ï€ãÉÊӃƃǃȸ…’Àíá‚Áܼ̀€Ü€Ø†‚„Ò€®€Ÿ€¨¸ƒÆƒÇƒÈ„¹ƒˆƒÂÖ̀؂„€ø„ã†ÙÄÇÌÀɀ‚€Í€Ð€Ï€äӀ؂„€øÏ…育¸„”½É怂óƒ…Ï‚Î‚ÏÆâÃÍÓóÀο´É€Â€Ó€øŒ€ÜæÝÚ¸ƒ¥í€ƒ—ƒ˜Ò€®€Ÿ€¨¸€é€Ñ€Ü‘‚„Šó‚‹‚ÓÉáÄÇâÃÍÏߴ̀؂„€ø¸„–ƒ®Åɀ€“Ë҃‚‹Ó€Ð€ö€Ü€ÕÒ†ó†öÖ̓̂ØÅÌ‚ÚÀ€ƒÆƒÇƒÈ„¹ƒˆƒÂÒ‚ž‚Ÿ”€ÊŠÓƒ¼„‚È…·ÄãÉ€Â\n\nƒ´†²¸ƒ›á‚ãÆÍ‚€Í€Ð€Ï€äÓ‚£‚¤Ï„ã…œ¸ƒ›ä¼ÍÅÉæ€€Ü€Ø†‚„Ò€®€Ÿ€¨¿à‚Ÿâ‚±‚²ƒÉƒÊÏßáƒÏƒ¤æóÀÎÁδ̻ɀ‚ۂÜÓ†óÒ‚¸€Ó€øŒ€Ü̓ƃǃȸ„€ÅÏ‚Ú´Éæ€‚ʂ̀܀؆‚„ÉÊÏóÁåÅɀ‚ÛàÜ‚€Í€Ð€Ï€äÝ€Ó€øŒ€Ü݃ƃǃÈÍÈÒ‚Õʃ°‚ƒ‡¶¸„€ÅÌ»ÉÒð€Â‚€Í€Ð€Ï€äӃ̂ØÅɀ܀؆‚„Ò€®€Ÿ€¨¿à€‘ËÒ‚—€þ€ø‚„’¸†Ä»¿ÂÌ»ÉÍÃ䀃ƃǃÈÒ€×€ú‚„€Ï¸‚È‚ÉÅɀ‚ۂÜÓÆèÄØ€×€ú‚„€Ï¸‚ÙÅ€‚±‚²ƒÉƒÊÒ‚Í‚•¸€Û€Ë€Ê€ã†€Ò€ÏÅÌ€ƒË¸„Õ¹ð€Â€Ü€Ø†‚„Ò‚ðƒœÓØÉÅÌÜ‚€Ë€îÄ〃ƃǃÈÓƒ¼„ð´É€Â€ã€ù€Ï€ãÓÈÒ‚ñ‚òÏßဂÛ҇ĂýÒ‚ÝÏß´Ì€ºåã΂´ƒé¸†ŽÚÃÍÏÎâ€Â\n\nſŀ܀؆‚„ÓØðºÀàÛ̻ο´É€Â‚݃и†Âõλ‚í‚×Ï‚ŸÉ€Ü€Ø†‚„ÉÊÓ€ƒ¶ƒ·Ò„‰„Š„‚„‹„Œ“€ö‚€Ê€×€’ÍÈÒ„óƒù¸€Û‚„‚€Ë€Ê€×ÅÌ€„ô„õ„öҺ─рπãÖ̓†¿´É€Â‚€Í€Ð€Ï€äÍ€Ó€øŒ€ÜÓ€‚—҇Âĸ‚±‚²ÆâøÁ€„óƒùÖÍ‚Àáùð€ÂÈÃó‚Û‚ÜÉÊÓ€€Ü€Ø†‚„Ò„·‚ÓÒ‚Ö»¸ËÀÍÛâÃÍÏÎâ€Â‚—Ò„„ŽƒÛ„¸…ƃ˜Ï‚±‚²Å€„‰„Š„€„‹„Œ¸ƒ›áƒ–ÅɃ ó€‚€Í€Ð€Ï€äÍ€Ó€øŒ€ÜÓ„‰„ŠÖ̓†¿´É€Â„‰„Šó‚Û‚ÜÉÊæ‚ÉÉÜÒÓ†úƒÆÎ€Ý€ß€Ï€Û€Ê’óº´É€Â€Ü€Ø†‚„Ïß´Ì…ÊàãÉ‚Ÿ‚öá‚€¿à€Ý€ß€Ï€Û€Ê’Ï‚öâÃÍæóÀÉ€ÂÈÃó‚Û‚ÜÉÊӀ܀؆‚„‚‘…ýÒ‚°‚‹ÏóÁåÆ€Â€Ü€Ø†‚„ÉÊÜ€ÃÒƒù¸„ª»ƒÏáπـπã€ú‚„€øÓóÀ̻λ߼ð´É€ÂÅËû€Ü€Ø†‚„Í‚‘»€€Ý€ß€Ï¸¿åÅÎæà€‚€Í€Ð€Ï€äÍ€Ó€øŒ€ÜÓ€Ù€ÐÖÍÉôá˻ɀÂÈÃÏÓ¿ËÌŠ€×€ß‚„€…€Ö€Ë€ú€øð´É„±‚„Å‚¢æ»É€Â‚€Í€Ð€Ï€äæ‚ÛÒ„±…ޏ„„‡ÃÄÇâÍ€‚ÛÓ‚€Í€Ð€Ï€äÍ€Ó€øŒ€ÜÏ€Æèπ݀߀πۀʒ¿à‚ž‚ŸÆâ߼σéìɀ‚ÛÓƒôƒõ΃„½¸„¼¹ðÃҀ݀߀πۀʒ¸€ƒ—…£ÆâÃÍó…£‚ÎÆâÍ»¼‚Ԅϸ†Â¹ðÒð€Â\n\nƒ „¸€Ö€Ë€÷€Ï€ã€Ï‚£‚¤ÏÌ€‚€Í€Ð€Ï€äÓ€í€û€Ñ€ã€é€Ò€ÜóÒ‚„€â€ÆÖÍ‚Ÿ‚ÈÆâ„¥ƒŽ¸Å̻ɀƒŅù€ºÉáÓ€å€Ê€×Ͼʻ´É€Â€Ü€Ø†‚„Ò‚Ì‚’‚åÒƒ¨À…¹á怀݀߀ÏóÒ‚ñ‚ò҄턄πրˀ÷€Ï€ã€Ï‚£‚¤¸¾È´ÌÀÉÒð€Â‚€Í€Ð€Ï€äÓ…Ž„Á„ÊÒƒÓƒ…¸‚¹‚ºÅËË€€Ü€ß€Ê€ëÒ‚¨ƒËÎôó†üƒ°‚Ž‚¸‡«á‚Ҵɀ‚€Í€Ð€Ï€äæ‚ÕÊÃɽ̻â‚ýÏ‚£‚¤Ò€Ü€ß€Ê€ëÓ×͹ô‚ž‚ŸóÀÉæ€‚‘‚’‚ςۂÜӆȸ†Ì´Ìƒµ¸‚ñ»€€Ü€Ø†‚„Ï…ÛàåãÌÅØ´É€Â\n\nƒµæËÁÍ€‚€Í€Ð€Ï€äӀ܀؆‚„†ê†ëƒùÒÇØ»‚…ßÏ€€Õ€Ú€ÏŠ€öÍ€’„±ó…ă¯Äã̻ɀ¾ôä»ÉÃÍÏ€€Õ€Ú€ÏŠ€öÓƒ—à҃鸀ý€Ý€ÑÏÅÌ€‚€Í€Ð€Ï€äÏ‚ž‚ŸÒ€à€Ë€Ï€Ü¸„”½ÉÒð´É€Âƒù‚ŽóÒ‹€ã€ø¸†£á„úéɃ ó€‚€Í€Ð€Ï€äÓŠ€Ê€Ö€Ï€þŽ€Ñ҃Âý€Û‚„€øŠ¸‚ ‚¢ÏÆâÃÍ󱄶ÅÉ€ÂüÅÌ€Ó€øŒ€ÜÍÈ҇Ăýæ‚Ï‚öâÃÍæóÀ€ƒ…‚“Èä´Ì€Û€Ì‚„€â€Æ€Ï€þ€…‚„€â€Ææ„ØØ´ÉÒð´É€Â\n\n‚€Í€Ð€Ï€äÉÊæ‚À´ƒ›´É€Ü€Ø†‚„Ò†ê†ëƒùÓ€€Ü€Ø†‚„Ò€‡‚‘»Ò†…††€ˆÒ‡Ë¸ƒÏ…ªÅÌ»´É€ÂÃãϾôä»ÉÒÓ€Ó€øŒ€Üð´É€ÂÎîÎà€ÃÃӀ܀؆‚„Ò€‡‡º‚˜€ˆóºá€„µ†‘Ï„üâ€î€Ñ€Ð€Ï̀܀؆‚„Ò‚‘‡Â‚Ü€ÃÒƒŠƒç¸ËÀÍÛàãο´É¿àð€ÂÃÒ†…††æ‚΂ÏÄããõ€‚‘»¸†…‡ºÎ‚Ú…çÍÆâ€Ü€Ø†‚„‚Ì‚’‚åÒ„ˆ½Ò„éáƒçæÎÁÎင·‚ÓÒ„õ†¶æ¾Ííãâóºä¼€Â‚€Í€Ð€Ï€äӀ߂„€ÿ€Ê€ã¸€Ü€Ø†‚„‚Ì‚’‚åÒ€Õ€÷€Ü€îÍ„Õõãâ€Ö€Ï€þÏÅùကӀøŒ€ÜӀ܀؆‚„†ê†ëƒù¿à€€î€Ñ€Ð€Ï„¦Ò‚Ÿ‚ăƒ…¿¸‚ŸÅÉ€Â\n\n‚‘»Ü€×€ö€Ñ€î€Ê€×€Ü¸…¸½€‚—Ò†…††Ó‚΂ÏÄãɀ€î€Ñ€Ð€Ï„¦Ïßâ…£‚×Ï€€Ó€øŒ€Üæ€Ü€ã€Ê’¸¿Âɀ‚€Í€Ð€Ï€äæØð‚ã´ÌÀ̻ο´ÉÒð€Â€Ž‚Û‚ÜÓƒ¨À̻ɀƒ¨À…¹áÒÅËû€Ü€Ø†‚„φڸ˿Øã€†…††Ò…¹æ»Ò‚ϼÜãÌ»ÉÒð€Â€Ó€øŒ€ÜÓÆèÏ‚€Í€Ð€Ï€äςคüÅ€‚Û‚Üæ€Ü€Ø†‚„ÏÍôÛ¸‡¦ÅÉ€ÂüÅ̀܀؆‚„‚Ì‚’‚åÒ„éáƒçóºâ€Ö€Ï€þ͆…††¸‚óƒ…ς΂ÏÅÌ€€’„±Ó†ê†ëƒùÏ‚ã´Ì»´ÉÒð´É€Â\n", + /*173*/ "‰‚„€ß†€Ñ€Ï\n", + /*174*/ "‰‚„€ß†€Ñ€Ï„“Ó€€š€¢€Û€Ü€â€ðÒ’€ú€þ€ö€ðŒ‚€ç€Ü¿à€Ü€ß‚„€ãÅɀ€Ѐñ€÷€ÕÒ„„ž‚„°Ò…Ô„æ‚­Ü„™ÏÎâÃÍæ‚ìà¿Ïδ̿àÓ€„…„†ƒÑ΀î€ç‚„‚€Ë‚„€€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒæƒ„½‚„°ÒŒ‚€ç€Üõ¿á¸„îÅ‚·Ûâß¼Ïδɀ†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€ÏÓ€‡ª„ƒ€Ù€Ï‘€Ì‚„€â€Æ€Ï€þÍ€š€¢€÷€Ú‚„€àÏ‚Æâ‚¿„÷’€ú‚€È€×€ã¸€Õ€Ú€ÏŠ€öÏ‚ÕÊ¿ÂÉæ€‚Û‚ÜÓÈ㸃…Áƒ¼†ÑÅɀ€“Ë„—Òƒ„½‚¤„“扂„€ß†€Ñ€Ï‡œ„·Íδ̃‹…éÓ€‰‚„€ß†€Ñ€Ï€…€þ€ø‚„’Ò„ƒ²Ó€Ø€ß‚þ»Ò†Ç†ßÏδɀƒ„½„ׂÈ҃Ƈª‚î„®¸ƒ¶ƒ·¿àƒ›áËÂɃ Ï€€Õ€Ú€ÏŠ€öÓ‰‚„€ß†€Ñ€Ï„“Ò‚­ƒÞ…÷‚µƒîÏδɀ‚¤„“ÒƒÕ‚ö҃Ƃƒ˜Ó‚Âö€š€¢„ׂÈÏ„®æã€‰‚„€ß†€Ñ€Ï„“Óô¹ô¹†úƒÆÏδ̻´É€Â\n", + /*175*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤\n", + /*176*/ "‚Êåáƒî҂Ȃ섇ÍÅÌ„‚ý¿à‚É…ÇÄã̻Ɇ€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€ÏÓ€ƒêƒÔ‚‚€â€×€è€ú‚‚„¸„„‘φŠÛÌ‚¦á…ÜÂℜÍδɀÂÃÒ€â€×€è€ú‚‚„Í‚„ãׂ҄Ȅ„ÒƒÕ‚öó€Ö€Ë€÷€Ï€ã€Ï‚£‚¤¸†ˆƒü€Â„÷‚£‚¤Ó€†Óƒ†ÀӀЀñ€÷€ÕƒÆ„Í¿à…«Å„ÌãÉÍÃäÏ…È‚•Æâ………†…‡…ˆ€Û€Ï€×€ß€Ï€×ðæ€…„Ó‚˜†ä‡ËÒ‚­‚¯…Ð…‡…ˆÒ„ׂȃ؆θ€à€È€Ê€×ÆâÉÛÒ€€Ü€Ñ‡™ƒ±ƒŠóܺ´ÉÒð€ÂÃÒ„—ƒÑӀրˀ÷€Ï€ã€ÏÒÙæ„Å´Ì»â€Â\n", + /*177*/ "€Š‰‹€Ñ€Ü…û‚쀋\n„‚öƒˆÒ€ò‹€Ñ€ø€Õ€ñ€ö€Â\n„±‚ý҇ŀрñ‚„‚¸…Ç…·Å\nŠ€Ð¸„×ÂâÃÍÜóÀâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nÍÎáҀрπë€É€…€ø‚„€ðÏ\nƒæâ€€é€Ê€Õ‚„Ò€©€œÒ€í€ú\n€þ€ö€ðƒœƒ¢¸…•…–Ç߀Â\n\n€Š…‰ƒÛ…û‚쀋\n€³€ã€÷€ü‚„󃜃¢…•…–€Â€›\n€ß€ÏóŠ€Ð¸„×À€€«€ß€Ï\n¸†ãĽ̂ÐḂɂÒÇâ€Â\n", + /*178*/ "€Š‰‹€Ñ€Ü…û‚쀋\n‚¡†Ñ‡¬¸ƒ…̃º…¦ÅÌ€…†‰\nÒ‚ó܆тá€Ñ€ñ‚„‚¸ƒÛá\nºéâ€Âƒ¨ƒéƒêƒëÜ…Á„ÅÅ\nÈ㸃º„‚Å̆—Æ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n…†‰Ò‚¸‚·¹ó\n‚ë‚ì€Ü€Ñ€Ê€à¸ƒÎƒ’Ç߀Â\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»Ò‚¿à€ä€Ñ€ã€Ð€Ñ\n¸†Â†ÃÅ̂½„ð„¬Æâ€Â\n", + /*179*/ "€Š‰‹€Ñ€Ü…û‚쀋\n€é€Ï‰€ÆÎ…ƒÚ‚†…žƒÂ€Â\n€ú€Ê€×σå…у›á‚»ÂâÍ\n‚†…žóÀâØó…ƒÚ¸ƒã‚…Ï\n„–á¿½Ì…äÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n…Ø´ÉŠ€ÐÒ€ú€Ê€×¸„€Å\nŠ€Ð€Ù‚„†¸‚ù´ÌŠ€Ð\n¸„×€Â\n\n€Š…‰ƒÛ…û‚쀋\nŠ€Ð€Ù‚„†¸†Â†ÃÅ\n€ú€Ê€×҃󀛀߀πÂ\n", + /*180*/ "€Š‰‹€Ñ€Ü…û‚쀋\n†§Ýƒ°‚‹¸‡§†ÑóÀâ€Â\n€ä€Ñ€ã€Ð€ÑÝIR€Ü€Ö€Ë€Ï\nóӂɽλƒ°Ü‚ɽâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n€±€Ü€Ö€Ë€Ï¸‚ù´Ì€’ËÒ\n…Þãɀ܀рʀค€Å\n€ù‚„‚„€þ€÷€ÊЏƒ‘Ç€Â\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»Ò‚¿à€±€Ü€Ö€Ë€Ï¸\n†Â†ÃÅ̂½„ð„¬Æâ€Â\n", + /*181*/ "€Š‰‹€Ñ€Ü…û‚쀋\n‚Ê‚Íó€Ü€ÑÖÒ…À‡”¸†œ†–\nóÀâæ€‚É‚Îàãâ‚¡‚¢ƒß\nܺâÒ󃃄®ƒ´€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n‚Ê‚ÍÅÌ€ÍÎáÒ‚…ßσæ\nâ€Ü€ß€Ê€ë¿à€Ð€Ñ€â€ð¸\n‚ö‚ÝÇ߀Â\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»Ò‚¿à€ô€å€ë€É‚„€ð\n¸†Â†ÃÅÌ‚Ê‚ÍÆâ€Â\n", + /*182*/ "€Š‰‹€Ñ€Ü…û‚쀋\n‡Å‰‚„€ß¸ƒ¡ƒ¢€Ñ€ñ‚„‚Ï\n‚Ê…óÆâ€Â…†‰Ò‚óÜ‚ù½\n…ÞÄãÉŠ€Ð݆§Ò…þ»‚ƒ˜\nÎôÒ†¦ƒ¹¸„‚ŸÆâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nIR€Ü€Ö€Ë€Ï¸‚ù´Ì…µ…¶ÒŠ€Ð¸‚ȂɀÈ㸄×€Â\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»¿àIR€Ü€Ö€Ë€Ï\n¸†Â†ÃÅ̂½„ð„¬Æâ€Â\n", + /*183*/ "€Š‰‹€Ñ€Ü…û‚쀋\n€¡€®€€ù‚„†‚„€î€Ê’‡Ëó\n„­„ÇÒ„´ƒÑ¸„‚ŸÅ€ƒ³‚üƒÑ\n΂ԃ†Í†É„̸†Ó†—Æâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n€«€ã€ö€Ê€Õ¸‚ÂÄÅÌ\n€ù‚„†‚„Òƒ¤ƒÚ¸†Ä»Îæà\n€Ð€Ñ€â€ð¸‚ÒƒÕÇ߀Â\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»Ò‚¿à€«€ã€ö€Ê€Õ\n¸†Â†ÃÅ̂½„ð„¬Æâ€Â\n", + /*184*/ "€Š‰‹€Ñ€Ü…û‚쀋\n„—Ï‚ö⇬҅¹ƒ¢¸€Õ€Ê€ãÅ\nÌ€‚ƒƒ“ƒÑ΀Հñ€ù€Ô€ÏƒÜƒÝ\n¸ƒÛ႟ÆÃÍæóÀâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n€Ü€Ñ€×€ú‚„€×¸‚ù´Ì\n€Ö€Ë€÷€Ï€ã€ÏÒ€Ô€ë€Æ€ÜÏ‚Ú\nÀ€€Ü¸¾ôä¿Çß¼€´\n\n€Š…‰ƒÛ…û‚쀋\nƒç‚Õ„»¿à€Ü€Ñ€×€ú‚„€×¸\n†Â†ÃÅ̂½‚†‚øÆâ€Â\n", + /*185*/ "€Š‰‹€Ñ€Ü…û‚쀋\n€Ù€Ï€Ü€ß€Ï€ãςʅ¦Æâƒ¤ƒÚ\n¸…ÇÊ€ºàÞâƒÉ„ƒƒÏƒ¤ƒÂ\n„½¸‚±‚²óÀâ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n…µ…¶ÒŠ€ÐÒƒ†Ã¼Ïºâ\n…ƒ‚‚é‚ê‚Í‚•Ï€ž€œ€¦€î€Ñ€Ï\n¸†°é̃›á‚»Â߀Â\n\n€Š…‰ƒÛ…û‚쀋\n€«€ß€Ï€¹€“€€Ü€â€Æ€Ê€×ó\n‚Ö»¸„ÇÛ€€³€ã€÷€ü‚„ó\n†°éâ€Â\n", + /*186*/ "€Š‰‹€Ñ€Ü…û‚쀋\nƒÍƒŠÒ€Ü€ÑÍ‚£‚¤Ò€é€Ê\n€Õ‚„ÍÒ‚ý󉂄€ßÒÝმ\náæ‚¡‚¢ÏÎ≋€Ñ€Ü€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n‰‚„€ß€÷€Ï€Õ¸‚ù´Ì\nÃÒ‚…ßϺ
€œÒ‰‚„€ß\n¸€é€Ê€Ö€Ï€þÅ€…µ…¶ÒŠ€Ð\n¸„×€Â\n\n€Š…‰ƒÛ…û‚쀋\n‰‚„€ß€÷€Ï€Õ¸†Â†ÃÅ\n€©€œÒƒó€›€ß€Ï¸†ãÆ€Â\n", + /*187*/ "‚È…·€¾€³€ã€÷€ü‚„ó€Ò€È”€Ï‚È…·\n", + /*188*/ "€Ô‚„€ã€÷€ú‚„Š\n€î€ü‚€ÏæƒÃÏδÉà€³€ã€÷€ü‚„¸ÓÎÆ\n", + /*189*/ "€î€å€Ì€Ð€ø€÷€ú‚„Š\n€î€ü‚€ÏÒ…¤æ†–´Éà€›€ß€Ïó€÷€ú‚„Š\n", + /*190*/ "‚ë„¥€ò‚„Š\n€«€ß€Ï¸†ãÅÉØØÏÆâ͂넥€ò‚„ŠÖ\n", + /*191*/ "€“€€Ü€â€Æ€Ê€×ó‚ë„¥¸€Ù€Ï€ã€ú‚„€øóÀâ\n", + /*192*/ "ƒ—‚Ąㅷ\n€³€ã€÷€ü‚„¸†ãÅÉØØóƒ—‚Ąㅷ\n", + /*193*/ "€×€Ñ€Ê€×‚ë„¥\n€œÒ‡Ë‡Ì€ß€Ïó…«ÅíË‡Ë‡Ìæ‚Ö½â\n", + /*194*/ "ƒ‚„€ð€ò‚„Š\n€«€ß€Ï¸†ãÅÉØØóƒ‚„€ð€ò‚„ŠÖ\n", + /*195*/ "€×€Ñ€Ê€×„ã…·\n€³€ã€÷€ü‚„¸ƒ„ƒŒÁ„ã†Ìó€×€Ñ€Ê€×„ã…·\n", + /*196*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤\0|Base of operations\n", + /*197*/ "‰‚„€ß†€Ñ€Ï„·„“Œ€ø\0|Global headquarters\n", + /*198*/ "‚˜‡Ì„ÿ…€…\0|Underground research labs\n", + /*199*/ "€Ö€Ë€÷€Ï€ã€ÏÒƒÿ…Ö\0|Private coastal retreat\n", + /*200*/ "€Û€Õ€\0|Backstreets of the city\n", + /*201*/ "€ €•Œ€ø\0|dataDyne front corporation\n", + /*202*/ "€Ó€÷€Ð€•€‘\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "€Ð€ö€Ü€ÕƒÃ„¦„§‚˜\0|Brooks Range, Alaska\n", + /*204*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ\0|The President's airplane\n", + /*205*/ "ƒÌ‚؃̓Š\0|Victoria Island 71N 118W\n", + /*206*/ "“€ö‚€Ê€×€’\0|Specialized deep-sea research ship\n", + /*207*/ "€Ý€ß€Ï€Û€Ê’\0|The most alien environment on Earth\n", + /*208*/ "€Ü€Ø†‚„†ê†ëƒù\0|Troop carrying spacecraft\n", + /*209*/ "‡É»‡”†ø\0|The planet of the Battle Shrine\n", + /*210*/ "‚€Ë€Ï’€Û€Ê’\0|Agile troop craft\n", + /*211*/ "€í‹‚„€Ù€Ï€â€ä\0|Gravity-negation device\n", + /*212*/ "€í‹‚„‹€Ñ€×\0|Low altitude vehicle\n", + /*213*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ã\0|Your helpful buddy\n", + /*214*/ "€í‹‚„€Ù’€ß‚„\0|Urban AG gunship\n", + /*215*/ "€ €•€ú€Ê€ã\0|Urban combat droid\n", + /*216*/ "€š€•€‘€Ñ€Ï€ß‚„€Ý’€ß‚„\0|Robotic air interceptor\n", + /*217*/ "€î€Ñ€Ð€Ï‡¨€®€Ÿ€¨\0|Scout and patrol vessel\n", + /*218*/ "€Ü€Ø†‚„‡¨€®€Ÿ€¨\0|Alien troop dropship\n", + /*219*/ "‚£‚¤ÒŒ€øÏÓ„ÜÁÒ€Ó€÷€Ðæºâ€Â€Ô€ë€Æ€Ü€Ó€÷€Ð€…„ƒ§€Ó€÷€Ð€ƒÛ„€Ó€÷€Ð€ÈÅÌ…Ž„Á„Êð€Â‚–Ò„„‘¿àÓ…„ÌÄãÉƒŠƒçÏºâæ€ÈãÏߴ̆›…µÒ‚µ‚¶æ‚¡‚¢Ïδ̻â€Â\n", + /*220*/ "€Ô€ë€Æ€Ü‡Ò‚„†ÏƒüË€ö€ÏŠ€î‚„€×€Â‰‚„€ß†€Ñ€Ï€þ€ø‚„’Ò„·„“ÓÓâ¿…ŒÁ¿àóÜ„—ƒü´Ì‚ɽâ€Â\n", + /*221*/ "‚˜‡ÌÏ…ÞÄã€ÀöÅÁ‚‰ƒŽÄãɆ›…µ„ÿ…€€Ó€÷€Ð󀉂„€ß†€Ñ€ÏÒƒÔƒƒ’€ú‚€È€×€ãæ‚Ļ̻âÍ‚©åãâ€Â†ÂáÆèáÒ………†ƒîÉÊæ€‰‚„€ß†€Ñ€Ï¸ƒ¾ƒîÏÆâøÁ€„¸…½„ÿ…€¸‚¾ÂÌ»âàÅ»€Â\n", + /*222*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤‚ºƒáÒ€ƒì‡›Ò‚˜ÏºâÃÒƒÿ…ÖÓ€†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€ÏÒ‚º‡™‚˜ÍÅÌ‚ùåãÌ»â€Â‚ȃɀۀ܀â€ð€„úƒÆÎ€û€Ñ€Ï€Ý€ö‚„æºâ€Â\n", + /*223*/ "€Û€Õ€Ò‡Ò€„¾ÅÁƒôƒõ΀Ӏ÷€Ð€Â\n", + /*224*/ "€ €•Œ€øÒ‚Ž‚Ï€ï‚„€â€Æ€Ï€þ€ø‚„€ðæºá€ÃÃóÓƒ…ÌÒ…–…Ï€½…–ƒœæóÀλ߼Ïδ̻â€ÂÃÃÓ‰‚„€ß†€Ñ€ÏÒ…µ…¶Ò’€ö€Ï情̂Ļ̻â€Â\n", + /*225*/ "€Ó€÷€Ð€•€‘ÍÅÌ„Åàãâ„úƒÆÎ…µ…¶„§‚˜Ó€þ€ø‚„€ðŠ€ö€Ñ€…€ù€Ñ€×Ò‚¼ÁÒ„˜äÁϺâÍ‚©åãÌ»â€Â‚–Ϻâ€ì€÷”‚„€ãÍ€ö€ö€Ð€Ï€â€äÒƒÆÀÄæ€ÃÒ‚˜‡ÌÏ„úæâ„§‚˜ÒƒÝÌÅλƒÆÀĸ…ÁìÄÇâ€Â\n", + /*226*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂæƒüÊßãâ߼π‚‰ƒŽ¸ƒº…¦Å̺âƒÃ„¦„§‚˜Ò€‘Ë€Â×͹ô҃Ħ„§‚˜Ó„±„—Ï˿λ€…®‚˜Ò€Ó€÷€ÐÏ…Êàã̾á€ÃÃÜÈÒ‡Ž‚–óÓλ€Â\n", + /*227*/ "Ã҃ƃǃȄ¹ƒˆƒÂÓ€€Ð€ö€Ü€ÕÒ†›†œ†¸„¤…úÍÅλ߼π„­ƒÿφˆ‚ðÄãÌ»â€Âƒ•‚ÒÒ‚ÚÀ‚¯Ó€è€ø€Ò€È‚„ҀԀ܀úð€Â\n", + /*228*/ "€Ð€ö€Ü€Õ‡ËƒÃÒ†ó†öσÁ‚ÚƒÂÒ…¹æ»æ‚ØÊÌ»´É€Â\n", + /*229*/ "ƒ¶ƒ·ƒçƒáÒ“€ö‚€Ê€×€’Ó€‚­„‰„Šó„„ŽƒÛ„æ‚Ú½â€Â„„‘ó„’‚ƒÒ‚óƒ…πـϑ€Ì‚„€ß‚Œ†·ÄãÉ„‰„Š„€„‹„Œð€Â\n", + /*230*/ "Ó⿆ý¿à„Š„øó„º´Ì»â†úƒÆÎ€Ó€Ñ€÷€Ð€ÏÒƒù€Â\n", + /*231*/ "€Ü€Ø†‚„‚‘…ýÉʸ‡´‡”†øÖÍ‚¦á…ÜÂâ‚¥‚¦ƒù€Â€Ü€Ø†‚„‚‘‚™Ò‚ƒ‚¸…‚Ûâ€Â\n", + /*232*/ "‡ÉÀ‡·Ò‡”†ø€Â€“ËÒ„ô‡‡¸‚ÕËÓâ¿‚Û‚ÔÒ„ô‡‡†„Ï…È‚•Æâ€Â\n", + /*233*/ "€Ù€Ï€×€ã󃄃ŒÁ€„à‚ÒáæÀÁ€Ó‚„‚€È€Ï€ã‚¥‚¦ƒˆ€Û€Ë€ã€ø€ÂƒÆ‡Æ‡ƒÒ‚¸€Ü‘‚„‰€ÆÏ„¨‚ÄÆâÃ͸„—ƒÑφˆ‚ðÄãÌ»â€Â€Ù€Ï‘€Ì‚„€ßóƒ—‚Ä…‰…ŠÜóÀâÅ€€÷€ò‚„€ã€Ù€Ï€ã€ú‚„€øÜóÀâ€Â€“„±¿à€”„±Ò€Ó‚„‚€È€Ï€ãÍ€ÈÒ‚ÍƒŽ„»¸‚¥‚¦óÀâ€Â\n", + /*234*/ "…ӄʀ܀߀ʀëÒƒÛ„ƒˆÒƒêƒÔ‚‚‰‹€Ñ€Ü€Â€Ù€Ï€â€äÒ†ìҀ܀рʀ฻ãâÍ€ƒêƒÔ‚‚€ë€Æ‚„€øŠæ€Ù€Ï€â€ä¸‚ÕʇËéâ€Â\n", + /*235*/ "ƒÞƒ¬Ò†œ»€ã€ú‚„€ø‹€Ñ€×€Â„àÄ΃êƒÔ‚‚‚Í‚•¸‚ù´Ì€í‹€÷€Ï€þÅ€„à‡¨Òƒº‚‚΀ò‚„€ß‚„ó„î‚·‚‚¸ƒ¥â€Â\n", + /*236*/ "‡£„Ç€Ó€÷€Ð¸Àã»Ï…Ë‚øÆâ€Â„§„·ƒÑφüƒ°ƒ…‚‹¸ÁØÎÁ‚Ò´Ì»ÁÃÍæ„Ü»€Â€Ó‚„‚€È€Ï€ãÉÊÓ€„§„·ƒÑÏÓ€×€÷‚„€å€Ï€þ€ú€Ê€ã¸‚í‚×Åλ߼τˆ½àãÌ»â€ÂÎîÎà€†›…µ€Ó€÷€Ðχ‘‚ŽÅÌÜà½âÃÍܺâ¿àð€Â\n", + /*237*/ "‡Æ‡ƒ‚ϾÂâ€ã€ú‚„€ø€Œ‚í‚׃ˆŒ‚„€×€ø€Â€’„±‚Àáó€€è‚„ƒ€ÊŠÏ‹€ø€Õ€Ï€Ö€Ë€è€Ï€€Ò€Æ€Ï€þÏÓ€ï€Ú€Ñ€ø¸‚̓ŽÅÌ»â€Â‚àÏßâ‚í‚×€ƒ… ‚¹Ï‚ÖåãÉ€ú€Ø€Ê€ã…¤æŽ€Ü€ã€„ó€‚Î‚ÏÆâÃÍæóÀâ€Â\n", + /*238*/ "‡Æ‡ƒ‚óҀـϋ€Ê€ãƒˆÏ†ˆ‚ðÄãÌ»â€ÂƒêƒÔ‚‚€â€×€è€ú‚‚„ó€í‹€÷€Ï€þÅÌ»â€Âƒº‚‚΂̂ÍÍ€Û‚„€øŠ¸‚Õˀ„¾Å»„±ƒ°¸‚ÉÉà€‡„¤ƒýƒ¼ƒˆó‚¯‚Œ‚í‚×€ˆÍ»¼„ª„Ѐø‚„€à€Ïó€ô¹ô¹‚í‚×ÅÌÁâ€Â\n", + /*239*/ "€í‹‚„‹€Ñ€×Ò€ú€Ê€ã‡µ€Âßჺ‚‚΃êƒÔ‚‚€ô€å€Ê€ãÍ€ò‚„€ß‚„€Û€Ü€â€ðæËÀ€†Ž‚ڀܑ‚„Š¿à€‚­ƒÆ€î€Ê€é€’Ҁܑ‚„Šó„¨‚ÄÆâÃÍæóÀâ€Â‚̂̓úÍ…‰…ŠƒßÏÓƒÔƒÎæ‚•¿ãÌ»âæ€€Û‚„€øŠÏ…þƒÎ¸‚Õ´Ì»â€Â\n", + /*240*/ "€î€Ñ€Ð€Ï€‘„±æ‚ÀâÃÍæóÀâ€Â‚Àƒ©‚“Ó¿ÎáÇØÁ…Áìâð伀„±‚ýð´Éà€Î¾Äàóºâ€Â\n", + /*241*/ "€‘€„±Ò‚Ì‚ÍÅɀ܀؆‚„‚‘…ý¸‚´÷ÃÍæóÀâ€ÂƒÏƒ¹Ò€ù‚„†‚„óÓ„€„ÅóÀλ€Âƒº‚‚΂±‚²ƒÉƒÊ¸‚ȃ¤ÆâÃÍæóÀ€ƒÏƒ¤‚Í‚•Ý€ù‚„†‚„Îô҃„½¸‚ ‚¢ÏÆâÃÍæóÀâ€Â\n", + /*242*/ "€Š€â‚„€î€‹\nƒá‚¢Î€Ó‚„‚€È€Ï€ãÓ‚Ðḃ¹Ï€à€È€Ê€×ÅØÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nØåḂɂÒÅÌ€€ç€ø¸€à€È€Ê€×Å̇ÌÄ»€Â\n\n€Š…‰ƒÛ…û‚쀋\n€œ‡Ì€ß€Ïó‡Ë¸‚ÉÌ€€œ‡Ë€ß€Ïó‡Ì¸‚Éâ€Â€«€ß€Ïó‚ë„¥€ò‚„ŠÏ‚öက“€€Ü€â€Æ€Ê€×ó‚Ðḃ—‡³Ï‚ÉØåÆÃÍæóÀØÆ€Â\n", + /*243*/ "€Š€â‚„€î€‹\n€Ú€ÑЀ܀â€Ê’Ó€ƒ“ÏÓ‘€Ï€à¿à‚¨´ÌÁãâ€â€×€å€Ê€×óÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nƒÏºâ€Ü€Ñ€Ê€à¸ƒ…̂ÂÄÇ߀‡´€Ü€Ñ€Ê€àÓÆèÏ€÷€Ý€Ê€ãÄãâÒ󃃄®ƒ´€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n€œ‡Í€ß€Ï€¾‡Í€Ü€â€Ê’\n€œ‡Î€ß€Ï€¾‡Î€Ü€â€Ê’\n\n", + /*244*/ "€Š€â‚„€î€‹\nŵæÚÃÍÏß´Ì€„ÙÅ»€Ó€÷€Ð¸„€†çóÀØÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n€Ý€Ï€Ú‚„ϺÉàíÏ€€Ü€Ñ€Ê€à¸‚ÂÄÅ̇ÌÄ»€Â\n\n€Š…‰ƒÛ…û‚쀋\n€«€¹€œ‡Ì€ß€Ï󀒃Ђ½ÏŵæÚ€Â€“€€Ü€â€Æ€Ê€×óŵæ¹ðØØ†ŽÁ€Â€«€ß€Ï¸€×€÷€Ê€×ó‚ÃÀ‡Ëæâ€Â\n\n", + /*245*/ "€Š€â‚„€î€‹\n…¡†ÇÒ‚—¸ƒ³‚Ýσ„‚Ýó‚‘¼ÒÓ€€ö€×óÓºáØÇ¹€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n‚—¿àƒ…Á†€ñ‚„‚¸‚îÂíÏ€ƒ…‚“€è€Ê€×€Ð€Ò€ãÇ߀Â\n\n€Š…‰ƒÛ…û‚쀋\n€Ò€È”€ÏæÎ»ƒ“ӀπàºâÒـ€³€ã€÷€ü‚„¸„ã†ÌÅ̇ÌÄ»€Â\n\n", + /*246*/ "€Š€â‚„€î€‹\n‚—¸‚̂͂†‚øÆãõ€‚—ҀҀȔ€Ïæ‚ÝÏ‚öáØÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\n‚—¿àƒ…Á†€ñ‚„‚¸‚îÂíÏ€ƒ…‚“€è€Ê€×€Ð€Ò€ã€½‚̂͂†‚øÇ߀Â\n\n€Š…‰ƒÛ…û‚쀋\nƒ ä¿àҀπàÓ‚ƒ‚×ó\n€è€Ê€×€Ð€Ò€ãóÀØÆ€Â\nƒä€’‚Ì„½€ò‚„Џ‚ù¼Í‚—¸\n‚̂͂†‚øóÀØÆ€Â\n", + /*247*/ "€Š€â‚„€î€‹\n…¡†ÇÒ‚—̓„‚Ý󂑴̇ÌÄ»€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nƒ…Á†€ñ‚„‚¸‚îÂλ߼ÏÅÎæà€ƒ¸‚Ì‚ÍÒ‚—¸ƒ…‚“‚ÙÇ€Â\n\n", + /*248*/ "€Š€â‚„€î€‹\n…¡†ÇÒ‚—̓„‚Ý󂑴̇ÌÄ»€Â‚—ӂ̂̀߀ђ̓¸‚Ì‚Í€ß€Ñ’æ»ØÆ€Â\n\n€Š€ã€ù‚„€å€Ï€þ‚ޅ個\nƒ…Á†€ñ‚„‚¸‚îÂλ߼ÏÅÎæà€‚—¸ƒ…‚“‚ÙÇ€Â\n\n", + /*249*/ "ßá… ‚¹Ï‚Ö´Éá€Ü´Íƒ—‡³Ï‚Ðá¸‚ÉØåÅÉ»ÍÀÓ€‚ë„¥€ò‚„Џ‚ù´ÌÁðÄ»€Â\n", + /*250*/ "€â€Ü€ãÏ€à€Ë€ù€Ï‚ÆâƒÏ€ƒ—ƒ˜Ò‚ÚÀÉ»ƒŠƒç¸‚¹‚ÇÅÉ׼滻óÆÑ€Â€ß‚„€ÿ€Ê€ãÒ‚ý¸‚­ÜƒŒÁ‚ÚÀƒóÀâ߼Δ€Ñ€Ï€ã¿à€Ü€ß‚„€ãÆâ‚Ôæƒ¥„ÃóÆ€Â\n", + /*251*/ "ŵæÚÃÍÏß´Ì€‡¤ƒÏóÓ‚ÚÂλ߼ÎÍÃäÏ‚ÚÂÉáÆâÂô€ƒü´Ì»âÍÀÒ‚ÔæƒŒÁ‚ÄÂØÆ€Â€â€Ü€ã¸‚Ú¼…øÓ€ƒ‡ƒƒÎÍÃäóÒÙŵæÚß¼ÏÅÉ‚Ôæ»»å߀Â\n", + /*252*/ "‚—Òƒ ä¿à‚í‚ׯâÒÓ€ë€È€ÐìµÎ»¿ÜÅãλÂô€Ããæ€Ö€×å߀€ê€Ê€ã€Œ€Ð€Ò€È€Ñæ„§„·Ñ€Â\n", + /*253*/ "€Ò€È”€Ï¸„ß¼ƒ“Ó‚—Ï‚¼ò»Ì€„ß´ÉàÆèÏ„Ìã̃ê‚׸¿åÅ€„ߴɀҀȔ€Ï¸‚ù´Ì‡ÌÄ»€Â\n", + /*254*/ "‚„ÍÅÌʵ€ÝàãâðÂ߀‚ÄÀÎÄ»€´‚ƒ„±Ïƒµ¸ÍàãÌõ¿áìµÎÁÌ€ƒ…‚“¸‚ÉâÒóƀƒ…‚“æ‚ɽλƒŠ„ÎÓ€‚ɽâØó‚Ä»É‚Ôæ»»åÑ€Â\n", + /*255*/ "ƒ„‚ÝÒ€ë€Å€Ñ€ã󗃤æË»Éà€‚Ì‚ÍÅÉ‚—Ï€à€Ë€ù€Ï‚ÅÌÁðÄ»€Â‚̂͂†‚øÅÉ‚—¿àÆèÏ„ÌãÌ€‚ÝÏ‚öãɀҀȔ€Ï¸‚ù¼ÒóÆ€Â\n", + /*256*/ "ßá… ‚¹Ï‚Ö´Éá€Ü´Íƒ—‡³Ï‚Ðá¸‚ÉØåÅÉ»ÍÀÓ€‚ë„¥€ò‚„Џ‚ù´ÌÁðÄ»€Â\n", + /*257*/ "€Ú€ÑЀ܀â€Ê’Ó€ƒ“ÏÓ‘€Ï€à¿à‚¨´ÌÁãâ€â€×€å€Ê€×óÆ€Â\n", + /*258*/ "ŵæÚÃÍÏß´Ì€‡¤ƒÏóÓ‚ÚÂλ߼ÎÍÃäÏ‚ÚÂÉáÆâÂô€ƒü´Ì»âÍÀÒ‚ÔæƒŒÁ‚ÄÂØÆ€Â€â€Ü€ã¸‚Ú¼…øÓ€ƒ‡ƒƒÎÍÃäóÒÙŵæÚß¼ÏÅÉ‚Ôæ»»å߀Â\n", + /*259*/ "‚—Òƒ ä¿à‚í‚ׯâÒÓ€ë€È€ÐìµÎ»¿ÜÅãλÂô€Ããæ€Ö€×å߀€ê€Ê€ã€Œ€Ð€Ò€È€Ñæ„§„·Ñ€Â\n", + /*260*/ "€Ò€È”€Ï¸„ß¼ƒ“Ó‚—Ï‚¼ò»Ì€„ß´ÉàÆèÏ„Ìã̃ê‚׸¿åÅ€„ߴɀҀȔ€Ï¸‚ù´Ì‡ÌÄ»€Â\n", + /*261*/ "‚„ÍÅÌʵ€ÝàãâðÂ߀‚ÄÀÎÄ»€´‚ƒ„±Ïƒµ¸ÍàãÌõ¿áìµÎÁÌ€ƒ…‚“¸‚ÉâÒóƀƒ…‚“æ‚ɽλƒŠ„ÎÓ€‚ɽâØó‚Ä»É‚Ôæ»»åÑ€Â\n", + /*262*/ "ƒ„‚ÝÒ€ë€Å€Ñ€ã󗃤æË»Éà€‚Ì‚ÍÅÉ‚—Ï€à€Ë€ù€Ï‚ÅÌÁðÄ»€Â‚̂͂†‚øÅÉ‚—¿àÆèÏ„ÌãÌ€‚ÝÏ‚öãɀҀȔ€Ï¸‚ù¼ÒóÆ€Â\n", + /*263*/ "‰‚„€ß€÷€Ï€Õ¸‚ù¼…øÓ€ƒ¹Ï€ß‚„€ÿ€Ê€ã¸‚ɽâ„û‚›‚ŽÏ‚•»Ì€…Ñ‚¾æ‚Å„–ãλ߼ÎâøÁ„Ìãλó‡ÌÄ»€Â\n", + /*264*/ "óÀâð€߂„€ÿ€Ê€ãÏ‚¼ò»Ì€€ž€œ€¦€î€Ñ€Ïæ… Å»ƒŠƒçÏËÁß¼‚¹‚ÇÅ̇ÌÄ»€Â€«€ß€ÏÒ‚ë„¥€ò‚„ŠÝ€€œ€ß€Ï¸‚ù´Ì‚Ö»¸„ÇÛ̇ÌÄ»€Â\n", + /*265*/ "€Õ€ð€Ü€ÑÒ…‰ƒÛÓ…¨Å»Òó€Þ´ÁáÍ€Ž\n", + /*266*/ "€ä€Ñ€ã€Ð€ÑÓ…½‚ý€Ù€Ï‹€Ê€ãÎôóƒûƒüÊØÆæ€‚Ðáæ‚ìâÁÎâÍ„¤…úóÆ€Â\n", + /*267*/ "Š€Ð€Ù‚„†æ¼ØÁ€Ý€Ê€ãóÀλƒ“Ó€€ß‚„€ÿ€Ê€ãÍÎâøÁ‚¼Á€… ƒúσ†À„μ߼σü´ÌÙÌÁðÄ»€Â\n", + /*268*/ "€«€ã€ö€Ê€ÕÓ€ƒ³‚üƒÑ΂ԃ†Í†É„ÌÅ¿†Ó†—ÅØÇ¹€Â€ß‚„€ÿ€Ê€ãØóÒ€î€Ê’Ó†Ó†—ÄãλÒó€‚ÐḆ”Á‚ÉÎæà„€†çÅ̇ÌÄ»€Â\n", + /*269*/ "IR€Ü€Ö€Ë€Ï‚̓óƒ“ӆф…æÇØÁÎâÒó€€Ù€Ï‹€Ê€ãƒ“ÏÓ‚ ƒâÏÎáØÆ€ÂƒØ†Î¸„н̂ù´Ì‡ÌÄ»€Â\n", + /*270*/ "‚ƒ„džɄÌß჆üæ‚ɽÎÁÎâÒ󀾿Å΃“Ï‚ù¼Íƒ—ƒ˜æ‘€Ï€àÏÎáØÆ€ÂÝÙÁÜÏ‚ù¼ÒÓÝÛØÅ·¼€Â\n", + /*271*/ "‚Ê‚ÍÍÓ€‡‰Ï„›¸ƒóÂâÍ»¼ÃÍðÂóÓºáØÇ¹€ÂÈÒ„±ƒ°ÏÕÄåÅ»€î€ä‚„ó‚Ú‚ÄÅλ̀‹€ùÌÅØ»ØÆß€Â\n", + /*272*/ "†˜ÏƒžÜ»Î»ÍÃäóӀ܀р׀ú‚„€×¸€¨€Ÿ€ŸÏÅÌ€ÎâøÁ„µÁ‚ù½âß¼ÏÅØÅ·¼€Â\n", + /*273*/ "‰‚„€ß€÷€Ï€Õ¸‚ù¼…øÓ€ƒ¹Ï€ß‚„€ÿ€Ê€ã¸‚ɽâ„û‚›‚ŽÏ‚•»Ì€…Ñ‚¾æ‚Å„–ãλ߼ÎâøÁ„Ìãλó‡ÌÄ»€Â\n", + /*274*/ "óÀâð€߂„€ÿ€Ê€ãÏ‚¼ò»Ì€€ž€œ€¦€î€Ñ€Ïæ… Å»ƒŠƒçÏËÁß¼‚¹‚ÇÅ̇ÌÄ»€Â€«€ß€ÏÒ‚ë„¥€ò‚„ŠÝ€€œ€ß€Ï¸‚ù´Ì‚Ö»¸„ÇÛ̇ÌÄ»€Â\n", + /*275*/ "€Õ€ð€Ü€ÑÓ‡§‚ìóÓºáØÇ¹€Âƒµò¿ã⃊„ÎܺâÒ󀂗һâ€Ó€÷€ÐÏ‚öâÍÀӅƃ˜Ïƒµ¸ËÂ̇ÌÄ»€Â‚ùƒˆƒ Ó‚ÒƒÕÅλ̀ÈÃÏ…¹´ÉØØóÆ€Â\n", + /*276*/ "€ä€Ñ€ã€Ð€ÑÓ…½‚ý€Ù€Ï‹€Ê€ãÎôóƒûƒüÊØÆæ€‚Ðáæ‚ìâÁÎâÍ„¤…úóÆ€Â\n", + /*277*/ "Š€Ð€Ù‚„†æ¼ØÁ€Ý€Ê€ãóÀλƒ“Ó€€ß‚„€ÿ€Ê€ãÍÎâøÁ‚¼Á€… ƒúσ†À„μ߼σü´ÌÙÌÁðÄ»€Â\n", + /*278*/ "€«€ã€ö€Ê€ÕÓ€ƒ³‚üƒÑ΂ԃ†Í†É„ÌÅ¿†Ó†—ÅØÇ¹€Â€ß‚„€ÿ€Ê€ãØóÒ€î€Ê’Ó†Ó†—ÄãλÒó€‚ÐḆ”Á‚ÉÎæà„€†çÅ̇ÌÄ»€Â\n", + /*279*/ "IR€Ü€Ö€Ë€Ï‚̓óƒ“ӆф…æÇØÁÎâÒó€€Ù€Ï‹€Ê€ãƒ“ÏÓ‚ ƒâÏÎáØÆ€ÂƒØ†Î¸„н̂ù´Ì‡ÌÄ»€Â\n", + /*280*/ "‚ƒ„džɄÌß჆üæ‚ɽÎÁÎâÒ󀾿Å΃“Ï‚ù¼Íƒ—ƒ˜æ‘€Ï€àÏÎáØÆ€ÂÝÙÁÜÏ‚ù¼ÒÓÝÛØÅ·¼€Â\n", + /*281*/ "‚Ê‚ÍÍÓ€‡‰Ï„›¸ƒóÂâÍ»¼ÃÍðÂóÓºáØÇ¹€ÂÈÒ„±ƒ°ÏÕÄåÅ»€î€ä‚„ó‚Ú‚ÄÅλ̀‹€ùÌÅØ»ØÆß€Â\n", + /*282*/ "†˜ÏƒžÜ»Î»ÍÃäóӀ܀р׀ú‚„€×¸€¨€Ÿ€ŸÏÅÌ€ÎâøÁ„µÁ‚ù½âß¼ÏÅØÅ·¼€ÂØÉ‚û‚ü󇃃¿€ÜÅÁÓ‚û‚üσ¾Ì⃗ƒ¤æºâƒ“ƒ‹‚–Ó€‚àÓ‚ùåλ׼æƒÓƒ…óÆ€Â\n", + /*283*/ "€ë€Å€ø€Ù€Ï€’Óƒ¸ƒ¹Ï… ‚¹Î†¾‚àÎÒó€‚×Ê…èìÓƒ…̺ÎɃ—‚«Ò…÷‚µóƀƒ䀒‚Ì„½€ò‚„ŠÓ€þ€÷€Ê’€Ð€ß€Ê€×ÎÒó€ÃÒ€ã€ù‚„€å€Ï€þóÓƒˆ»ØÇ¹€Â\n", + /*284*/ "€ë€Å€ø€Ù€Ï€’Ò… ‚¹Ä¸…ƃ˜Ïƒ¨¿ÆÉÛÏ€€Ü€Ù‚„’¸ƒ›áËÂÉÒæÃҀ߀ђóƀ€肄€î€ø€ß€Ñ’„÷…”σ䀒‚Ì„½€ò‚„ŠÓ€þ€÷€Ê’€Ð€ß€Ê€×ÎÒó€ÃÒ€ã€ù‚„€å€Ï€þóÓƒˆ»ØÇ¹€Â\n", + /*285*/ "€Ú€Ñ€ù€Ï€Ú‚„€ß€Ñ’Ò€ë€Å€ø€Ù€Ï€’Ó„‚öƒÛ‚‘Ï‚­‡•ҀҀȔ€Ï󀂗σµò¿ãλ߼ςí‚׸…Ô¿ÂâÃÍæóÀØÆ€ÂÃÒƒâƒÎ¸€ð†ÏÆâÃÍÒλ߼€… ‚¹Î…·‚׸€ã€ù‚„€å€Ï€þÅ̇ÌÄ»€Â\n", + /*286*/ "MagSec4Ó… ‚¹Äßá܃º‚‚΂΂ς‚σԃθ‚•¿ãɀҀȔ€Ïó€ƒä€’‚Ì„½€ò‚„ŠÒ€“„ã…·¸‚Éãõ€ÈҀ܀ÄÓ‚ìà¿óƀ„’‚ƒÒƒÆÀÎ…þƒÎÓ€€î€ü‚€ÏҀڀуæ„àÄ»ÃÍóÆ€Â\n", + /*287*/ "€Ü€Ø†‚„Ò‚ƒ‡‚ƒÑ΀ҀȔ€Ïó€ÍÌÜ€û€ë€øÏ†ˆ‚ðÄãÌ»ØÆ€Â€î€ü‚€Ï¸»ÁË¿‚ùƒˆÆâÃÍÏß´Ì€ƒº‚‚΂΂ς‚¸‚ÕË€à€Ë‚„‚€Ð€Ê’¸…ÇËÃÍæóÀØÆ€Â…¤†¨Ò€Ö€Ë€Û€â€ÆæƒÆÀ„—ÎÒ܃âƒÎóÆ€Â\n", + /*288*/ "Ã҄܃£Î‘€Ü€ã€øÓ€€’ËÒ†¦Î´É‚È…¤€Û€Ü€â€ðÒ€€Û€Ï€þ€ø€Û€Í€Ê€ãÍ…£…¤€Û€È€ø¸‚Õ´Ì»ØÆ€Â€î€Ñ€Ð€ÏҀӀς€å€ÐÉÊӄㅷҀܑ‚„Џ‚ʽâÃÍÏß´Ì€„÷ì€Ó€ç€ø€ý‚„‚ùƒˆ‡ªó†¦Î⃺ƒ¬Ò€Û€Í€Ê€ã¸‚¡‚¢ÏÅØÅÉ€Â\n", + /*289*/ "DY357€î€þ€ä€ð¸…‰â‡Ëó‚­ÜƒÔƒƒÎÃÍÓ€»Ë€÷€ú‚„ŠÆâ¿Í»¼ÃÍóƀ‚à‚ׂ‘‚Ï€€–‚È‚öá€î€ü‚€ÏÒ…¹á…¤†ÇÒÃÍÓƒ¹Ïƒ´†²ÅÌ»ÎÁÌÓÎáØÇ¹€ÂÃÒ€é€ÏŠ€ü€ÏÒƒÔÄÓ€ƒº‚‚΀þ€÷€Ê’€Ð€ß€Ê€×¸‚¡‚¢ÏÅÌ»ØÆ€Â\n", + /*290*/ "€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÓƒ¹Ï€€Ü“€Û€Ë€ø…Ô…”Ò€ò€è¸…¾Åæâ€ß€Ñ’ó€ÃÒ‚àÜÈÒ‡Ž‚–óÓºáØÇ¹€ÂÃÒ‚àÏÓ„­ƒÿÎ…¤æ‚ùåã̾ဂƒ‚׃‡…‘Ò€û‚„¸…µÛÌ»ØÆ€Â\n", + /*291*/ "ƒ¤…»æ‚•€ƒÜ…¥Ò†”»†ˆ‚ðÒ€Ú€î€Û€Ï€ü€Ï€ÂÃҀҀȔ€Ïæ…ªƒö€’†‘‚ý‰‚„€ß†€Ñ€Ï„“ÒŽ€Ü€ã€Ý€ö‚„ð´ÉÃÍæÈ㸄è‚ìÅÌ»ØÆ€Âƒä€’‚Ì„½€ò‚„ŠóӀ߂„€ÿ€Ê€ã¸€Ú‚„€àÅÌ€ú€Ê€×€Ô€ÏÆâÃÍæóÀØÆæ€ÃÒÆõàÅ»ƒÂ‚¢Ó…ƃ˜€ã€ù‚„€å€Ï€þÅ̾Áƒ‡ƒƒæºáØÆ€Â\n", + /*292*/ "ÃÒ€Ú€î€Û€Ï€ü€ÏÓ€ƒ´„ɃÑςֻ怇… ‚¹óλ€ˆß¼Ï†ˆ‚ðÄãÌ»ØÆæ€€ã€ù‚„€å€Ï€þÒƒ´„³Ó…ƃ˜ºáØÆ€ÂÃҀڀр׀ú€ÏÓ†¾ƒ“‚ýσƇªÒ…¤¸„ã…·ÆâÃÍæóÀØÆæ€ÈÒƒôƒõƒ¬Þ½Ï‚ƒ‡‚óÓƒ›…’惯„¬ÄãÌ»â€Ò€È”€ÏóÆ€Â\n", + /*293*/ "€î€Ñ€Ð€ÏÉÊÒƒ—‡³Î†ˆ‚ð„ª…§æ€ƒ°‚‹¸‡®ƒÏÆâ‚‚¸‚ÕË€é€Ñ€…€Ñ€Ï€×€ã¸ƒä€’‚Ì„½€ò‚„ŠÏƒŽ½É€ÃÒ€Ú€î€Û€Ï€ü€Ï¸…Êá‡ËéØÅɀ„ㅷ‚ÿƒ¬Ó€ë€È€å€×€Ü„÷…”€ƒä€’‚Ì„½€ò‚„ŠóÓ‚ØÊØÆ€ÂÃãÓ‚È…·Ò€ñ€Õ€åƒ€ðÍ‚à‚«¸…èÎåλÉÛóÆ€Â\n", + /*294*/ "RC-P120Ó„­ƒÿΆƃ°óóÀÉ…¤Ï„å½€ƒÞ»„ã…·ƒß̓ƅ凪Ҁî€ü‚€Ï܂մ̻âÉÛ€€Ü€Ø†‚„‚ü„Ãσ‚¿Çλ͂©åãÌ»ØÆ€ÂÃÒ…¤Óƒä€’‚Ì„½€ò‚„ŠÒ€Ü€Ñ€×€ú‚„€×ƒÂ‚¢Ò€Ó€ç€ø€ý‚„ÍÅÌÜ‚ùåãØÆ€Âƒ•‚ÒÒ€ã€ù‚„€å€Ï€þÓÃÒ„­ƒß¸ƒêƒ¡ÄÇâÉÛÏ€„­ƒÿÒÜÒςʂËÄãØÅÉ€Â\n", + /*295*/ "€ö€Ê’€ã€Ê’€©€œÒ߼Άÿ¸ÅÌ»âðÂóÓÎÁ€ƒä€’‚Ì„½€ò‚„ŠÒƒ—‚ă‚àóÓ€‡‚É…˜á€ˆƒûÍÅÌ€†±ÀÎƒŠƒçπ݀ʀãÆâÃÍæóÀØÆ€Â‚ž‚Ÿ‚€Ï̃ñƒ÷ÄÇÉ်⃊ƒç¸‚¬àÇÉáÜóÀâÒóÆ€Â\n", + /*296*/ "ÃÒ€ò‰€øÓ‰‚„€ß†€Ñ€Ï„“æ…´„¦¿à҃Ƈª‚󱄶ÅÉ€ò‰€øðæ€Øð„úÁ‚ùåãÌӻλ€Â‚ƒ‚ɀ܀߀φ‚„Š€ß€Ñ’Ò€ö€Ñ€ë€øð怉‚„€ß†€Ñ€Ï„“Ò‡ž„»àÅÁ€‚à‚«Ò‡Ìπ݀πڂ„…£…¤¸‚̓ŽÅÌ»â€Âƒä€’‚Ì„½€ò‚„Џ‚ù¼ƒŠ„ÎÓ€Ã҂ฆ°é†âÌÎÁÌÓÎàλ€Â\n", + /*297*/ "ÃÊà󂹂ÇÅÉÍÃäÏßâÍ€ÃҀҀȔ€Ï҃䀒‚Ì„½€ò‚„ŠÓƒôƒõƒ°‚ȂɃ‚¢¸‚մ̾စ£…¤Ý€…ÞÄãÉ…£‚ȃ°€ƒƒä€’‚Ì„½€ò‚„ŠÒŠ€ö€€ÏÎô€„Ý€ƒ—‚ă‚àÎô¸„€„ÅóÀØÆ€Â\n", + /*298*/ "‚£‚¤æ‚ÝæÂÉ‚­†ŠÒ€Ú€Ò€È”€ÏóºâAR34Ó€¿Îá€Ü€ß€Ï†‚„ŠÎ…ÊáÒ‚¼†É„̃ˆ€ö€Ñ€ë€øó€ƒä€’‚Ì„½€ò‚„ŠÓƒ¹ƒ“€Ü€Ù‚„’óƀƒ•‚ÒÒ€â€Ü€ãóÓ€…·‚×Ò… ‚¹ÄÏƒÔƒÎæ‚•¿ãÌ»ØÆ€Â\n", + /*299*/ "ßá€ìŒ‚„ÏδɊ€ö€€Ïó€€Ý€Ï€Ú‚„…£…¤‚ƒ˜æ€ €ö€Ï€à€ËÏ‚Êå´Ì»ØÆ€Â…´„¦óƒ˜‚™ƒñƒ÷ƒˆÒ€Ò€È”€ÏÍÅÌ… ‡¶Ï‚ùåãÌ»âÒÜ€¼ÎíÂâÍÃäóƀƒ•‚ÒÒ€ã€ù‚„€å€Ï€þó€ €ö€Ï€à€ËÒ…¤…™¸€â€Ü€ãÅ̇ÌÄ»€Â\n", + /*300*/ "ÃҀҀȔ€ÏÏ‚ÅÌ…¯¿»ÃÍÓ…ÒÀóƀ€ۀπþ€ø€Û€Í€Ê€ã͆€ø€Û€Í€Ê€ãÒ€’€ò‚„Šæƒˆƒ´ÄãÌ»ØÆ€Â€Û€Í€Ê€ã€ü€ÏÏÅÌÓƒÆÀ„—Ò€î€ü‚€Ï¸‚Õ´Ì»ØÆæ€€÷€ú‚„ŠÏƒ“‚ýæ¿¿âÒó€‚ðƒœƒßÒºâ‚Ú‚Äæƒ‡ƒƒóÆ€Â\n", + /*301*/ "†”Á†ˆ‚ðÄãÉ€€é€Ñ€û‚„ƒ‚„€ðƒÂ‚¢‚»ÀÒ€€Ú€Ñ€ù€Ï€Ú‚„€ß€Ñ’Ҁ܀ä€Ñ‚„€ö€Ñ€ë€øóÆ€ÂÜÅ‚×Ê…èìæº´ÉƒŠ„ÎÓ€‚ý‚þ»ÎÁ‚ւׂÝ҂ֻ惚¿´ÉÍ»¼ÃÍÏÎáØÆ€Â‚Ö»¸ƒÓ„ÇÄÇÉ»ÍÀÓ€ƒä€’‚Ì„½€ò‚„Џ‚ù´Ì€‡ÅµæÚ€ˆÍ€‚Ö»æƒÓ„ÇÅØÆ€Â\n", + /*302*/ "ºØáÏÜ‚·¹ð…‡…ˆæ‚ùåãÌ»âÒ󀃔ÉÊÏÓ‚ù»ÏÁ»ƒúÜºáØÆæ€ÈãóÜÃҀҀȔ€ÏÒƒâƒÎÓÈ㸅ƃ˜Ï€Õ‹‚„ÅÌ»ØÆ€ÂÃҀۀ̀ʀãÓ×͹ô‚ªó܇®À€€Ü€Ù‚„’Ó†§¸‡§†ÑÅÌ„—„´¸€Ú‚„€àÆâÃÍæóÀ€ƒ‡ƒƒºàõÈ㸀ú€Ê€×€Ô€ÏÅØÆ€Â\n", + /*303*/ "€×€ú€Ü€Ò҅ッ΃‚¢Ó‡‹†©‡ŒÒ€Û€Í€Ê€ã󯿀ƒä€’‚Ì„½€ò‚„ŠÓ‚ƒ‚׃‡…‘Ò€Ö€øóƀ€׀ú€Ü€ÒÓ„‚öƒˆ€Ò€È”€ÏÎÒó€€÷€ú‚„ŠÏƒ“‚ý濿်Øá€Ù€Ï‹€Ê€ãƒ†ÀóÓºáØÇ¹€Â\n", + /*304*/ "€ã€ö€Ï€Ö€ö€ÑÓ„„‘‚Ò† ‡–„ÿ…€ƒçÎôó†”Á‚Éàã↠‡–ƒÂ„½óƀ‡‹†©‡Œ¸€‘€Û€Í€Ê€ãí˂ȅ·óÀØÆæ€„Ü‡ªÒ€Û€Í€Ê€ã¸€Õ’€Ý€ø…¤ÍÅÌ‚×Ë‚ƒ‚׃‡…‘Ò€÷‚„€Ú€ø„®‚öÏ„–á†Ô½âÃÍÜóÀØÆ€Â\n", + /*305*/ "ÃҀҀȔ€ÏÓ„±‚ýßáÓâ¿Ïƒº»€ô‚„‚„ÒÉÛφˆ‚ðÄãÉÃÍðÂÓ‚ý‚þ»Î»ß¼óÆ€ÂÔëØíÂõ‚Ö»æ„ÇÛÝÆÁÎáØÆæ€‚óƒ…Ï… ‚¹Í»¼åÂóÓºáØÇ¹€Â…¤¸‚ù»ƒÝÉÅÌÅØ´ÉƒŠ„ÎÓ€‚à‚«¸Š€÷€øÍÅÌ‚ù¼ÃÍÏßဃ³‚Ýφ€ñ‚„‚¸„”½àãØÆ€Â\n", + /*306*/ "‰‚„€ß†€Ñ€Ï„“Ò‚­‚¼Ò‡ž„»ó€€ô€å‚„€×΀â€×€è€ú‚‚„æ‚ùåãÌ»ØÆ€Âƒä€’‚Ì„½€ò‚„ŠóÓ…£…¤Ò‚ÐáÏ…ÅƒŠ¸ƒÛáðÅ€‚ƒ„ǃ“‚ýÒ…ÑƒóƒØƒÙ¸€Ö‚„’ÅØÆ€ÂÈÒƒ Ó…ÅƒŠæ‚†‚øÄ々£…¤Ó‚ØÊÌ…£‚ÈÅØÆ€Â\n", + /*307*/ "€Ù€Ï€×€ã󂪂ÒóÜ‚ùƒˆ‚¡‚¢Î€ú€Ø€Ê€ã€ö€Ï€à€Ë󀂃‚È‚×˃¬Ï€÷€ú‚„Šæƒ‡ƒƒóƀƒ䀒‚Ì„½€ò‚„ŠóÓ€CMP150Í„÷솄ƒÇÒ€ú€Ê€×€Ô€Ï€Û€Ü€â€ðæ‚ùåã̾က‘ËҀ߂„€ÿ€Ê€ã¸€ú€Ê€×ÆâÃÍæóÀØÆ€Â„—„´¸†Ä†Æâƒ“Ò€ú€Ø€Ê€ãҀܑ‚„ŠÓƒ¸ƒ¹Ïƒ€»ÉÛ€„®ƒ´Å̇ÌÄ»€Â\n", + /*308*/ "€Ü€Ø†‚„Ò„à‡¨€ï€Ú€Ñ€ø€ö€Ï€à€Ëó€ƒÏƒ¹Ò€ú€Ø€Ê€ã€ö€Ï€à€ËÍ€€ô‚„‚„æ€÷€ò‚„€ã€Ù€Ï€ã€ú‚„€øóÀ €ú€Ø€Ê€ã€Õ€ñ€ö€ˆ¸‚×ËÃÍæóÀØÆ€Â€ú€Ø€Ê€ãÓƒ—‚ăÑπܑ‚„Џ‡ËéÌ‚ÚÀØÆæ€€Ü‘‚„Џ‚ØÍÅÌ…¯¿Á€Ù€Ï€ã€ú‚„€øÆâÃÍÜóÀØÆ€Â…£‚ÈӃ󅤃“€ÜÅÁÓ…’À„™æ…’¿ãɃ“Ï‚ÃÃáØÆ€Â\n", + /*309*/ "‚ɄτÿçÆØÄãɀـϋ€Ê€ã€ä€Ñ€ë󀆰éÝÆÁƒÛàãÌ»ØÆ€Â†°éÉ€ä€Ñ€ëÒ…ÜÁ„û‚›ÝƒÁö‚ÔÎôÏÓ€€ã€ù‚„€å€Ï€þ惇ƒƒóÆ€Â\n", + /*310*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Ò€È”€Ï„ׂȂ慄ƒ§ƒÑτׂÈÅÉ€€÷€Ü€ãς̓óÆâ€ß€Ñ’Ò€ù‚„‚„ó€€’ËÒŒ‚„€ðæ€Ý€Ê€â€Æ€Ï€þóÀØÆ€Â€ñ€Ñ€Ï€ò‚„ŠóÓ…·ƒ«‚ŽÏ€ù‚„‚„€ø€Ü¸‚È…·Å€ƒä€’‚Ì„½€ò‚„ŠóÓ…’À„™¸…’»Ì»â‚ý€„ゾÅɀۀ͂„€ã€ù€Ï‚€…Œ‚„€ð¸‚ÈÆâÃÍæóÀØÆ€Â\n", + /*311*/ "„§„·ƒÑ΀ê€Ì‚„ƒ¸‚ùƒˆÅÉƒŠ„Î€‚Ã‚Ä¿à…£‚ÈØó€”†Û¿¿áØÆ€ÂÃãÏÓ€ô€å‚„€×΃䀒‚Ì„½€ò‚„Š€€Ý€Ï€Ú‚„‘€Ï‚„€øæƒˆƒ´ÄãÌ»ØÆ€ÂÃÒ€ò‚„Šó€‚Ýá¶¼…¤Ó€Ó€ç€ø€ý‚„æÎÁÎâ¿€€Ý€Ï€Ú‚„悪¿¸…Á„ÅÆâØó‹€Ò€ÏŠÅ‚¾ÂØÆ€Â\n", + /*312*/ "€î€Ñ€Ð€Ï‚Ýá¶¼…¤Óƒ¨ƒ°Ò†…ƒ¦†„¸‚΂ÏÅØÆ€Â…£…âÒ„û‚›‚ŽÏ‚ö´ÌÅØ¼Í€„—ӿƹó€‚Õ´Ì»ÉÜÒ¸ƒ…Ì‚ØÍÅÌÅØ»ØÆ€ÂÃÒ‚Ýá¶¼…¤Ó€‚ª¿Ï‚Ó´ÉÍÀÏ…£‚ÈÄÇâ߼π݀ʀãÆâÃÍÜóÀâÅ€€Ý€Ï€Ú‚„ó‚Ã…£ÄÇâÃÍÜóÀØÆ€Â…ƃ˜Ï„ÌãÌ¿à‚ù»ØÅ·¼€Â\n", + /*313*/ "Ã㸂ù¼ÍÀÓ€…ƃ˜Ï„н̿à€Ý€Ê€ãÅØÅ·¼€ÂÄÜλ̀‚ִ̻ɂ—Ó…£‚ÈÒ„û‚›¿à‚–Ï‚ŸÌÅØ»ØÆ€ÂÃÒ€ã€ù‚„€å€Ï€þó‚ù»‚Ô¸…†¹ó€…„‚‘ó‚ñ‚òÅλ߼ÏÅ̇ÌÄ»€Âƒä€’‚Ì„½€ò‚„ŠÓK7 AvengerÍ„÷ìÁ€ƒôƒõƒ°‚ȂɃ‚¢óÆ€Â\n", + /*314*/ "€Ý€Ï€Ú‚„…£…¤Ò‡Ë‚Ý΂ù»‚ÔÓ€‚—æ„Æ…§óÀλ߼ÎÍÃäπ݀ʀãÆâÃÍóÆ€ÂÜŃ—ƒ˜æ€Ý€Ê€ãÄãℲð´ÉƒŠ„ÎÓ€ƒä€’‚Ì„½€ò‚„ŠÒƒôƒõƒ°‚ȂɃ‚¢¸‚ù´Ì‚ÒḀà€È€Ê€×Å̇ÌÄ»€Âƒ“‚ýÒ€ð†Ï„ª½â¿ÜÅãØÇ¹æ€ƒ“ÏÓÈãóƒéæƒË¿âÃÍܺâÒóÆ€Â\n", + /*315*/ "€÷€ò‚„€ã†„Ò…£…¤Ò‚­„Ù‡¨ó€„§„·ƒÂ‚¢Óƒ•ØóÒÜÒÍ„÷ìóƀ€ñ€Ñ€Ï€ò‚„Šó…£…¤¸€Ý€Ê€ã€ƒä€’‚Ì„½€ò‚„Šó‚Ã…£ÅØÆ€ÂôÃπ݀ʀãÅÉ¿‚èãλ߼π´\n", + /*316*/ "€â€Ü€ã€‘€¾€Ð€×€Û€Í€Ï€‘\n", + /*317*/ "€â€Ü€ã€’€¾€Ð€×€Û€Í€Ï€’\n", + /*318*/ "€â€Ü€ã€“€¾€Ð€×€Û€Í€Ï€“\n", + /*319*/ "€â€Ü€ã€”€¾ƒ¸‚̂͋€ã€ø€‘\n", + /*320*/ "€â€Ü€ã€•€¾ƒ¸‚̂͋€ã€ø€’\n", + /*321*/ "€â€Ü€ã€–€¾…„‚‘†ÿ‡¶€‘\n", + /*322*/ "€â€Ü€ã€—€¾…„‚‘†ÿ‡¶€’\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dishP.c b/src/files/lang/jap-final/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/jap-final/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_f.c b/src/files/lang/jap-final/dish_str_f.c new file mode 100644 index 000000000..0b877e455 --- /dev/null +++ b/src/files/lang/jap-final/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vue nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vue nocturne.\nTrouver l'interrupteur.\nRétablir la lumière.\n", + /* 10*/ "Prendre le récepteur sur la table pour commencer.\n", + /* 11*/ "Se tenir près du terminal et utiliser le récepteur.\n", + /* 12*/ "Il faut tenir le récepteur.\n", + /* 13*/ "Connexion établie...\n", + /* 14*/ "Terminal piraté avec succès.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal placée.\n", + /* 19*/ "Mine CME placée correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumières réactivées.\n", + /* 24*/ "Prendre le décodeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le décodeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le décodeur porte.\n", + /* 27*/ "Décodeur fixé. Commandes de piratage lancées...\n", + /* 28*/ "Décodage terminé. Porte déverrouillée.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR grâce au pisteur.\n", + /* 31*/ "Scanner IR localisé avec succès.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secrète grâce au scanner IR.\n", + /* 34*/ "Porte secrète localisée avec succès.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cachés pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont désactivées.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur récupéré avec succès.\n", + /* 41*/ "Grille laser 1 désactivée.\n", + /* 42*/ "Grille laser 2 désactivée.\n", + /* 43*/ "Je viens chercher l'équipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme ça on se déguise?\n", + /* 45*/ "Voilà. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur sécurisé avec succès.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'où sortez-vous?\n", + /* 50*/ "La caméra vous a repérée.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entraînement\nest terminé!\n", + /* 54*/ "Mission accomplie - Entraînement équipement terminé!\n", + /* 55*/ "Mission échouée - vous êtes repérée.\n", + /* 56*/ "Choisir le Récepteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le récepteur et relâcher le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la CamSpy et relâcher le bouton A.\n", + /* 58*/ "Choisir la Vue nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir Vue nocturne et relâcher A.\n", + /* 59*/ "Choisir le Décodeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le décodeur porte et relâcher le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner rayons X et relâcher le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le costume et relâcher le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner IR et relâcher le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le pisteur et relâcher le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir l'occulteur et relâcher le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la mine CME et relâcher le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emmène aux salles d'entraînement.\n", + /* 68*/ "Le centre d'information est derrière cette porte.\n", + /* 69*/ "Ici se trouve le labo d'équipement.\n", + /* 70*/ "Par ici se trouve la salle d'entraînement et de simulation.\n", + /* 71*/ "Par là se trouve le champ de tir.\n", + /* 72*/ "Ce couloir mène au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B près de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour relâcher une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B près de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B près d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B près de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entraînement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 terminé avec succès.\n", + /* 88*/ "Holoprogramme 4 terminé avec succès.\n", + /* 89*/ "Holoprogramme 5 terminé avec succès.\n", + /* 90*/ "Garde désarmé avec succès.\n", + /* 91*/ "Garde neutralisé avec succès.\n", + /* 92*/ "Désarmez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-clé: furtivité.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 terminé avec succès.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'éteindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'accès.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entraînement échoué - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 terminé avec succès.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de dégâts.\n", + /*111*/ "Entraînement échoué - dégâts subis.\n", + /*112*/ "Holoprogramme 6 terminé avec succès.\n", + /*113*/ "Holoprogramme 7 terminé avec succès.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B près d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous préparer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entraînement: Complet\nNote entraînement: A++\nStatut actuel: Assignée\n\n|Profil -\n\nBien entraînée mais sans expérience. Formidables réactions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score à l'entraînement. A l'origine d'un nouveau système de notation. Etant la représentation de l'agent idéal de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (Mâle)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entraînement: Complet\nNote entraînement: A+\nStatut actuel: Infiltré\n\n|Profil -\n\nNotre agent infiltré à la plus grande expérience. Très habile avec son arme de choix (Magnum). Plus qualifié pour des missions d'infiltration plutôt que pour le combat ouvert. Avant Joanna Dark, il détenait le meilleur score d'entraînement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (Mâle)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entraînement: Non disp.\nNote entraînement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de génie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les opérations depuis son bureau par lien direct. Il a un goût vestimentaire étrange.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. Déteste recevoir des ordres et perdre l'initiative. Est prête à des actes cruels pour éliminer toute concurrence. Haine conséquente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (Mâle)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est lié par une certaine amitié à Cassandra De Vries ou partage des intérêts/affaires avec cette dernière. Obéit à Cassandra, dotée d'une personnalité plus dominante que la sienne déjà colossale. Est la figure de proue d'opérations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle créée par la dataDyne Corp. gratifiée d'un penchant pour la lexicographie et les codes à cracker. Il est par chance doté d'une morale, et grâce à son incroyable intelligence, il a pu prédire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renforçant son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Mâle)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en déplacement sur la Terre à la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents maîtres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (Mâle)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Très grand, il porte des vêtements blancs et d'habitude un imperméable. Il semble contrôler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis à jour -\n\nUn guerrier skedar se dissimulant derrière la projection holographique d'un homme blond d'une vingtaine d'années. Un modulateur vocal donne au Skedar une voix précise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner à merveille.\n", + /*161*/ "Le Président des Etats-Unis\n", + /*162*/ "Humain (Mâle)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Américain de bonne éducation, très intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseillé par des gens comme Trent Easton. Il pense maîtriser Trent depuis qu'il lui a refusé le Pelagic II pour la dataDyne Corp. Il ne bénéficie pas d'une grande popularité: on suppose, peut-être à tort, que la majorité politique a tout contrôle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs siècles) et ayant détecté chez les humains un certain potentiel, ils apprécient notre monde et en sont les généreux mécènes. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore à établir.\n", + /*167*/ "Guerrier skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des siècles jusqu'au récent cessez-le-feu. Ils utilisent de colossales armures mécaniques pour se déplacer et combattre: ils sont en fait de petite taille et ressemblent à des reptiles. Etant très agressifs, la guerre est leur religion et ils y sont tous dévoués.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'années, un croiseur d'une puissance colossale fut sabordé dans l'Océan Pacifique par une race extraterrestre, les Cetans. Il était équipé d'une arme jamais utilisée: un découpleur nucléaire, pouvant en théorie briser les liens entre les molécules. Pour que les témoins croient à la destruction du vaisseau, une balise fut envoyée vers la planète mère, et ils détruisirent les sondes couvrant le système solaire dans lequel ils décidèrent de se cacher.\n\nLes Maians découvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contactés: les Maians décidèrent d'attendre qu'ils se développent.\n\nLes Maians rencontrèrent les Skedars et s'enlisèrent dans un conflit sans fin. Après des centaines d'années de guerre, ils arrivèrent finalement à une paix fragile. Les fanatiques skedars éprouvent constamment la résistance de cette paix en se livrant à des activités terroristes, mais les Maians refusent de se laisser entraîner.\n\nLes Maians se méfient des humains, conscients que de trop nombreuses crises sont survenues sur Terre à cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur présence n'entraîne d'autres conflits sur la planète. Ils ont donc décidé d'observer la race humaine jusqu'à ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des évènements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en accélérant la prise de contact entre les deux peuples. Les Maians, qui trouvèrent le plan judicieux et Carrington honnête, aidèrent ce dernier à diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouvèrent la sonde messagère provenant du croiseur Cetan. Ils envoyèrent immédiatement des éclaireurs sur Terre pour enquêter de façon brutale, kidnappant les gens et mutilant les animaux dans leur tentative de récupération du croiseur. Leur enquête les mène dans l'Océan Pacifique, où ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y accéder.\n\nIls mènent leur propre étude de la Terre et établissent une liste des sociétés qui possèdent les ressources nécessaires pour les aider à retrouver le vaisseau sabordé. En tête de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour être honnête - ce qui est vrai. En échange d'une aide pour sortir 'leur' vaisseau de l'océan, ils donneront à la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacités linguistiques et de décodage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les détails. Il tente d'obtenir l'approbation du Président pour le prêt d'un bâtiment de recherche océanique à la dataDyne mais échoue. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la colère du gouvernement américain. Ils conçoivent donc un nouveau plan : remplacer le Président par un clone sous leur contrôle. Cela promet à Easton et De Vries une récompense supplémentaire une fois l'opération skedar terminée.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se réjouir puisque les Skedars ont l'intention de tester le découpleur nucléaire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveuglée par la possibilité de gagner autant de pouvoir, ne pense même pas à l'éventualité de se faire doubler. Il en va de même pour Trent.\n\nMais la dataDyne crée la seule chose qui puisse prévoir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette création, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inquiétudes quant à cette mission, De Vries ordonne que l'on modifie sa personnalité. En d'autres termes, la création pense trop. Désespérée, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant à s'échapper d'un complexe scientifique de haute sécurité, situé sous l'immeuble de la dataDyne. Elle est surprise de découvrir que le Dr. Caroll est en fait une IA créée par la dataDyne mais poursuit néanmoins sa mission de sauvetage. L'alarme donnée, Joanna doit se frayer un chemin jusqu'à l'héliport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn réponse à cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation réclame en échange le retour de leur IA, leur 'propriété'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, où Carrington discutait avec elle des plans de la dataDyne. Joanna délivre Daniel, mais ne peut empêcher la dataDyne de récupérer le Dr. Caroll. L'IA en a cependant assez dit à Carrington pour que celui-ci convoque sur Terre un groupe de spécialistes maians.\n\nJoanna est envoyée à Chicago pour espionner les conspirateurs dans l'immeuble du G5, une façade de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'étrange homme d'origine nordique qui semble tout contrôler. Une fois le plan concernant le Président révélé par Trent, Joanna rapporte la situation, mais découvre qu'il y a quelque chose de plus urgent à accomplir en premier lieu.\n\nLes spécialistes ont été interceptés par les conspirateurs. Les survivants du crash et l'épave ont été transportés dans le Secteur 51, dans le Nevada. Joanna est larguée dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'éventuels survivants et de retrouver leur équipement. Lorsqu'elle pénètre dans le labo, Joanna découvre le secret de l'Institut : ses alliés sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il était garde du corps de l'ambassadeur qui était à la tête de l'équipe de spécialistes.\n\nAprès avoir aidé les survivants de la délégation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Président. Elle se fait passer pour un membre de l'entourage du Président pour accéder à la base aérienne où Air Force One est stationné. Elle réussit ensuite à se cacher à bord de l'avion. Une fois en vol, Trent et les Skedars occultés se manifestent, mais Joanna est là pour les arrêter. Elle escorte le Président jusqu'à la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion à la recherche du Président. Ils désirent entraîner ce dernier à bord de l'OVNI skedar, arrimé à AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas à la détruire. Elle appelle Elvis à la rescousse et celui-ci décide de s'écraser sur Air Force One. La capsule de sauvetage est éjectée et les trois appareils s'écrasent dans le désert glacé de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aperçoit que sa communication est brouillée par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Président et Elvis. Elle rencontre des escouades de Skedars occultés qui recherchent le Président, Elvis, elle-même et certaines possessions du Président. Elle suit un groupe jusqu'au vaisseau skedar abattu, où elle découvre un clone du Président. Elle le détruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedars ont été déjoués une fois de plus, le Président est sauf et Trent est exécuté de façon atroce par les Skedars pour son incompétence.\n\nAu mépris de toute prudence, la dataDyne et les Skedars s'emparent du Pelagic II - le bâtiment d'études océaniques du gouvernement - et se dirigent vers le lieu où se trouve le vaisseau cetan. Joanna et Elvis s'introduisent à bord du bateau pour y semer le désordre et découvrir quel est le grand projet. Après avoir saboté les opérations de plongée et rappelé le sous-marin, ils plongent vers les profondeurs de l'océan, où ils aperçoivent le croiseur cetan pour la première fois. Ils pénètrent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Après avoir combattu les Skedars et évité les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. Là, ils découvrent l'IA qui était le Dr. Caroll. Une fois sa personnalité restaurée, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de détruire une bonne fois pour toutes.\n\nDe retour à l'Institut Carrington, Joanna est sur le point de partir à un cocktail présidentiel à la Maison Blanche lorsque l'enfer se déchaîne. Les survivants de l'équipe d'assaut skedar libèrent leur vengeance sur les responsables de leur échec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employés vers les hangars, tandis que les Skedars attaquent différentes parties du bâtiment. Tandis que la majorité des employés quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se réveille dans une pièce à bord du croiseur skedar avec Cassandra comme compagnon de cellule. Cette dernière se sacrifie pour permettre à Joanna de s'échapper. Elle parvient à abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau capturé se place en orbite autour de la planète où se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais réussi à trouver cet endroit, le saint des saints des Skedars. Si l'Autel était détruit, cela anéantirait le moral des Skedars et une véritable paix pourrait être instaurée à la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedars, le Grand Prêtre de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un répit dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coincée sous des gravats et retenue par un Skedar accroché à sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux héros quittent ensuite la planète.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commencé dans la programmation d'IA Lorsqu'il devint évident que la plupart de leurs revenus provenaient de leur travail pour l'armée américaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit à traiter avec des fabricants d'armes et à ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Après le rachat par dataDyne de la troisième corporation d'armement, les bénéfices devinrent astronomiques. Dans le mois qui suivit la réception d'un contrat gouvernemental d'armement, Cassandra De Vries fut nommée PDG une part importante des bénéfices furent injectés dans la recherche sur les IA, avec d'excellents résultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Brièvement considéré comme un inventeur cinglé, Daniel Carrington fut le premier à diffuser la technologie anti-gravité dans le monde. Les revenus générés par cette nouvelle technologie et ses dérivés l'ont aidé à créer l'Institut Carrington, un réservoir des connaissances technologiques situé dans une partie reculée des USA. Mais l'Institut est également une base d'entraînement pour ses agents, qui sont envoyés à travers le monde pour suivre les développements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule caméra contrôlable à distance, parfaite pour l'exploration furtive. Elle est équipée pour l'holographie. Elle peut ouvrir les portes en projetant une zone de chaleur humaine.\n\nInstructions d'entraînement\n- Prenez un hologramme du terminal informatique de la salle Info voisine.\n\nManipulation\n- Appuyez sur Z pour prendre un hologramme. Appuyez sur B pour ouvrir n'importe quelle porte. Maintenez R pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumière ambiante pour fournir une image de la zone. Révèle également les formes de vie. L'utilisation avec une luminosité normale entraîne des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entraînement\n- Déplacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumière.\n\n Manipulation\n- Sélectionnez la Vue nocturne dans votre inventaire pour l'activer. Sélectionnez-là à nouveau pour la désactiver.\n", + /*179*/ "Description\n\n- Appareil autonome de décodage. S'attache au panneau de contrôle et passe en revue les différentes combinaisons jusqu'à l'ouverture.\n\n Instructions d'entraînement\n- Trouvez le panneau à côté de la porte et utilisez le décodeur pour la déverrouiller.\n\nManipulation\n- Tenez-vous près de la porte et appuyez sur le Bouton tout en tenant le décodeur.\n", + /*180*/ "Description\n\n- Utilisé pour voir à travers les murs et les objets solides. Peut voir des choses que la Vue nocturne et les lunettes IR ne peuvent détecter.\n\n Instructions d'entraînement\n- Le scanner allumé, recherchez les deux interrupteurs cachés et activez-les pour éteindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir à nouveau pour le désactiver.\n", + /*181*/ "Description\n\n- Endormez les soupçons en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous démasquer.\n\n Instructions d'entraînement\n- Grimshaw possède un occulteur qui attend d'être utilisé. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOpération\n- Sélectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut être utilisé dans le noir. Révèle également des anomalies telles que portes secrètes et les pans de mur peu solides.\n\n Instructions d'entraînement\n- Allumez le scanner IR, trouvez la porte cachée et ouvrez-la.\n\nManipulation\n- Sélectionnez le scanner IR dans votre inventaire pour l'activer. Sélectionnez-le à nouveau pour le désactiver.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'équipement.\n\n Instructions d'entraînement\n- Activez le Pisteur et suivez l'écho radar pour retrouver l'objet.\n\nOperation\n- Sélectionnez le Pisteur dans votre inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*184*/ "Description\n- Crée une disruption du spectre lumineux autour du porteur, ce qui entraîne un effet caméléon presque parfait. L'effet est annulé lorsque le porteur fait feu.\n\n Instructions d'entraînement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- Sélectionnez l'occulteur dans l'inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications électroniques. Doit être placé sur l'appareil pour être efficace.\n\n Instructions d'entraînement\n- Jetez la mine CME sur le voyant lumineux au-delà de la porte secrète.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfoncé et ajustez votre visée avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des données ou ouvrir les serrures électroniques à distance.\n\n Instructions d'entraînement\n- Utilisez le Récepteur pour pirater le terminal dans le coin, pour déverrouiller une porte secrète.\n\nManipulation\n- Tenez-vous à côté du terminal et appuyez sur le Bouton B lorsque vous avez le Récepteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Relâchez le Bouton Z quand vous êtes à court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfoncé pour le mode visée.\n", + /*191*/ "Utilisez le Stick analogique pour déplacer le curseur de visée.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfoncé pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfoncé pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'opérations\n", + /*197*/ "Tour Lucerne\0|QG suprême\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|Résidence côtière privée\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Façade commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Près du lac Groom Dry, Nevada\n", + /*203*/ "Base aérienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion présidentiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Bâtiment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La planète de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Transport de troupes\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravité\n", + /*212*/ "Hoverbike\0|Véhicule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|Hélico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Droïde de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot aérien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le bâtiment de l'Institut comprend de nombreuses zones différentes: bureaux et laboratoires, ateliers et hangars. Il est isolé du monde extérieur ce qui aide à garder le secret des différentes opérations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'austère bâtiment de la dataDyne Corporation, se détache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cachés et sous haute surveillance, sont la clé de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propriété de l'Institut, cette résidence retirée est le refuge de Daniel Carrington pour échapper au stress de l'Institut. La résidence, équipée d'un générateur, sert d'observatoire et possède une cave à vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, fermé à la circulation terrestre. C'est ici que la Corporation G5 possède son QG.\n", + /*224*/ "A l'intérieur de l'immeuble du G5, il existe une salle de réunion protégée par des dispositifs anti-mouchards. C'est le lieu le plus sûr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour hélicos et les tours de communications donnent une idée de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases aériennes renforcées, servant de points de ravitaillement pour Air Force One. Ces bases sont isolées et se trouvent dans des régions inhospitalières, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimisé pour les climats froids, plutôt utile lorsqu'il est basé au nord de l'Alaska. Le vol est à destination d'Oslo, Norvège.\n", + /*228*/ "Dans le paysage rocheux et enneigé du cercle polaire arctique repose l'épave de l'avion abattu.\n", + /*229*/ "Propriété du gouvernement des USA, le Pelagic II a été conçu pour les missions de plongée dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul bâtiment au monde à pouvoir étudier les grands fonds océaniques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'océan depuis des millions d'années.\n", + /*231*/ "Un vaisseau d'assaut interplanétaire qui transporte les guerriers skedars vers les zones de conflit. Fait partie de la très diminuée flotte skedar.\n", + /*232*/ "Une planète aride, secouée par des tremblements de terre, des tempêtes de sable et des tornades. Fait partie d'un système solaire complexe à trois soleils.\n", + /*233*/ "Un véhicule de transport d'agents. Petit, rapide et très maniable, il a été conçu pour une utilisation urbaine. Peut être contrôlé par ordinateur ou piloté à distance. Il peut transporter trois à quatre agents, plus leur équipment.\n", + /*234*/ "Un appareil antigrav conçu pour aider les manutentionnaires qui se fixe à une caisse. Lorsqu'il est activé, le champ antigrav soulève la caisse en réduisant son inertie.\n", + /*235*/ "Moto de patrouille à basse altitude. Utilise une petite unité AG pour flotter, ainsi qu'une petite -mais puissante- turbine à poussée vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent accès à toutes les zones d'un bâtiment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'accès malgré lui à certaines zones importantes.\n", + /*237*/ "Véhicule de patrouille et d'élimination. Equipage de deux hommes, armé d'un canon Vulcain à l'avant, et d'un lance-missiles sur chaque aile. Peut être descendu avec un feu nourri, ou mieux, avec une roquette bien placée.\n", + /*238*/ "Robot de combat urbain. Utilise une unité antigrav pour flotter. Lourdement protégé et armé. Utilisé pour éloigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unité AG beaucoup plus puissantes. Peut atteindre Mach 2 sans problème et peut avancer au pas pendant des heures. En dépit de son armement, ce véhicule compte plus sur sa maniabilité que sur ses boucliers.\n", + /*240*/ "Conçu pour un seul pilote maian. Un passager se sentirait à l'étroit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers skedars en armure et armés jusqu'aux dents. Indétectable par des radars conventionnels. Il peut émettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les équipements de détection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque détail autour de lui.\n\n Instructions d'entraînement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfoncé le Bouton R pour passer en mode visée et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n\n Instructions d'entraînement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas à gauche- Bouton C gauche\n- Pas à droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir permet d'accéder à de nouvelles zones.\n\n Instructions d'entraînement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez R et appuyez sur C bas.\n- S'accroupir- Une fois baissé, maintenez R et appuyez sur C bas.\n- Se relever- Appuyez brièvement sur R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps-à-corps peut s'avérer difficile.\n\n Instructions d'entraînement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- Désarmer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entraînement\n- Assommez/désarmez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Désarmer - Maintenez le Bouton B enfoncé, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derrière.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires à mains nues.\n\n Instructions d'entraînement\n- Battez tous les ennemis désarmés sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, armés ou non.\n\n Instructions d'entraînement\n- Battez tous les ennemis armés sans vous faire toucher.\n\n", + /*249*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode visée.\n", + /*250*/ "Pensez à l'endroit où vous souhaitez aller avant de commencer le test. Placez-vous à un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est nécessaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire, et soyez prêt à reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme dérobée avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode Visée.\n", + /*257*/ "Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est réellement nécessaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire et soyez prêt à reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproché juste le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez à ce que l'objet ciblé soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*265*/ "La CamSpy peut être difficile à contrôler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*269*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*271*/ "Un costume n'est pas seulement le vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez à ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la repérer : alors soyez prudent en entrant dans une zone déserte. Souvenez-vous que la CamSpy reste là où vous l'avez laissée jusqu'à ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et réagissez avant l'ennemi.\n", + /*277*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*279*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*281*/ " Un costume n'est pas seulement un vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue nécessité et si vous êtes sûr du résultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing très précise. Par conséquent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile à distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a été ajoutée à l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile à distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les opérations furtives, conçue pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre précision pour vous assurer de ne jamais gâcher votre chance.\n", + /*286*/ "Le Magsec 4 privilégie la puissance de feu au détriment de la précision, particulièrement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut être concentrée en un tir dévastateur. La quantité importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet très versatile possède deux types de munitions: standard ou explosives. Les ingénieurs maians ont réussi cette prouesse sans sacrifier la consommation d'énergie, bien que la cadence de tir soit réduite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'avérer utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours à la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particulières que l'arme. Elles sont conçues pour se fragmenter à l'intérieur de la cible et l'éliminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux dernières années, et ceci grâce à son mode secondaire. Le système d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation complète de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a été conçu pour ne PAS être précis, mais c'est une excellente distraction à l'entraînement. Sa cadence de tir est cependant extrêmement élevée, faisant de cette arme un atout dévastateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilité de conception maian. Son mode secondaire est intéressant: un projectile à haute vélocité qui peut pénétrer n'importe quoi. Pour éviter d'endommager le canon ou le mécanisme de mise à feu, la cadence de tir - tout comme pour le Phoenix - est réduite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile minéral spécial qui, couplé à une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent être utilisées pour alimenter un prototype d'occulteur. L'entraînement a été modifié pour mettre en valeur cette caractéristique particulière.\n", + /*295*/ "Non seulement cette arme peut être pliée pour ressembler à un PC portable, mais elle peut en plus être transformée en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou protéger une zone.\n", + /*296*/ "C'est le modèle que la dataDyne a réussi à vendre à l'armée américaine, bien qu'elle ne soit pas encore largement répandue. Conçue dans l'esprit de la dataDyne pour faire de mauvaises surprises, le modèle de base est pourvu d'une mine de proximité sous le canon. Vous devez vous débarrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble être un 'détecteur de danger' repérant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour créer une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutôt pour le tir de précision.\n", + /*299*/ "La version lourde du Dragon. La mine a été remplacée par un petit lance-grenades. Il a été adopté par l'armée américaine comme arme de soutien d'escouade. Entraînez-vous à utiliser le lance-grenades.\n", + /*300*/ "La subtilité n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil à pompe, mais méfiez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom à fort grossissement. Seul le tireur peut influer sur la précision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre visée.\n", + /*302*/ "Bien que la technologie employée pour élaborer ce fusil soit au-delà de notre compréhension, nous pouvons toujours apprécier les effets du FarSight. Le tir est presque impossible à arrêter et la lunette peut inspecter à travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbalète est un tir de projectile soporifique, le second un tir de poison mortel à effet immédiat. C'est avant tout une arme pour les missions demandant une grande discrétion. Recharger cette arme prend du temps, attention donc à son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hôpitaux à travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de sédatif.\n", + /*305*/ "Essayez de maîtriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a été conçue pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre visée. Si un ennemi réussit à passer à travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie intéressante. Le mode secondaire active un champ magnétique autour d'une grenade, lui permettant d'adhérer à une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et réutilisable, qui se recharge après chaque tir. Le mode secondaire utilise une variante limitée du système de verrouillage de cible du CMP150, avec la possibilité de verrouiller une seule cible. Le missile se déplace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guidés par l'utilisateur. Les Skedars éprouvent une satisfaction perverse lorsque la caméra située dans la tête du missile se rapproche de la cible. Le missile guidé accélère automatiquement mais peut être ralenti pour plus de maniabilité. L'explosion se produit au contact ou lorsque la détente est pressée.\n", + /*309*/ "Un couteau de combat bien trempé, également équilibré pour le lancer. La pratique est essentielle pour s'habituer à la portée et à la trajectoire de la lame.\n", + /*310*/ "Le département des armes expérimentales a développé ce laser de poignet avec deux rayons différents. Le premier mode envoie une salve à une distance considérable, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle possède un détonateur réglé sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximité à effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est détectée.\n", + /*312*/ "Cette grenade Maian sème le chaos dans l'esprit des créatures soumises à son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous lâcherez ce que vous tenez. La grenade peut être réglée pour exploser à l'impact ou déclenchée par détecteur de proximité. Prenez garde à la lancer assez loin.\n", + /*313*/ "L'utilisation des mines à retardement nécessite jugement et calcul. La cible peut dépasser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un détecteur de danger identique à celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacité des mines de proximité est de savoir les placer là où votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truffée de mines, utilisez le détecteur de danger pour les repérer. Cela vous fera peut-être perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La dernière génération de mines contrôlées à distance, identiques aux modèles plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat réel 1\n", + /*322*/ "Holo 7 - Combat réel 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_g.c b/src/files/lang/jap-final/dish_str_g.c new file mode 100644 index 000000000..cb9b761da --- /dev/null +++ b/src/files/lang/jap-final/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Gerät vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Gerät vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie müssen das Gerät bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal wurde erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu groß.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tür-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tür zu entriegeln.\n", + /* 26*/ "Sie müssen den Tür-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen - Tür wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tür mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tür wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Röntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "Täuschen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrüstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So täuschen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie müssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Geräte-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "Wählen Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "Wählen Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "Wählen Sie das Nachtsicht-Gerät aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Gerät und lassen Sie den A-Knopf los.\n", + /* 59*/ "Wählen Sie den Tür-Decoder aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tür-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "Wählen Sie den Röntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "Wählen Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "Wählen Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "Wählen Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "Wählen Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "Wählen Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schön, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch führe Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tür.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schießstand, Jo.\n", + /* 72*/ "Dieser Korridor führt zum Hangar.\n", + /* 73*/ "HOVERCRATE \nStellen Sie sich neben die Hovercrate und drücken Sie den B-Knopf.\n", + /* 74*/ "Drücken Sie den B-Knopf erneut, um die Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE \nDrücken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drücken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ÖFFEN VON TÜREN \nDrücken Sie den B-Knopf, um eine Tür zu öffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs können auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZÜGE \nDrücken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "Während des Trainings können Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN \n- Drücken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN \n- Drücken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlüssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrückt, und drücken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrückt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Betätigen Sie alle Schalter.\n", + /* 99*/ "Betätigen Sie alle Schalter an der Wand.\n- Sie müssen schnell sein, da sie rasch zurückspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfüllt - Sie müssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drücken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschließend ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfüllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drücken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den Wänden.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, ich lasse Sie allein, damit Sie sich vorbereiten können.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkörperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (männlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt für Undercover- Missionen, weniger geeignet für Kampfeinsätze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (männlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Gründer des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Büro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Süchtig nach Macht; möchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, äußerst skrupellose Aktionen durchzuführen, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenüber Daniel Carrington, den sie verabscheut, keine Skrupel.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (männlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu Cassandra De Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht. Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persönlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte künstliche Intelligenz mit einer Vorliebe für Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner überragenden Intelligenz die Pläne von dataDyne erahnen. Seine Stimme ist äußerst präzise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (männlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (männlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr groß, trägt weiße Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwörung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den späten Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine präzise, intelligente Stimme. Dieses Gerät ist übrigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Präsident\n", + /*162*/ "Menschlich (männlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der ständig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, wäre allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine außerirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenüber sind sie wohlgesonnen, und erkennen großes Potential in der Erdbevölkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer kämpfen. Erst kürzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangenähnlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges außerirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Molekülen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, das Schiff wäre zerstört worden, wurde ein Satellit in das Heimatsystem der Cetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschließen aber, die für sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommt zu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen ständig, diesen Frieden durch terroristische Aktionen zu stören. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen 'äußeren Einflüssen' immer mehr Krisenherde auf der Erde entstehen. Sie befürchten, dass noch mehr Unruhe entstehen könnte, wenn sie ihre Existenz offenbaren würden. Daher beschließen sie, den Planeten weiter zu beobachten, bis die Menschen ein höheres Entwicklungsstadium erreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein könnte. Das Resultat wäre eine schnellere Annäherung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzuführen.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entführung von Menschen und die Verstümmelung von Tieren gehören. Ihre Untersuchungsergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die über die nötigen Ressourcen verfügen, um ihnen bei der Bergung behilflich zu sein. An der Spitze dieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstand der Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhört, um wahr zu sein - und genauso ist es auch. Als Dank für die Bergungsarbeiten versprechen die Skedar, dass sie dataDyne mit genügend Technologien versorgen, um die Firma zum mächtigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss, ist eine künstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu können. Keine leichte Aufgabe, aber durchaus im Bereich des Möglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, und informiert ihn über alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Präsident verweigert seine Zusage. Es gibt keine Möglichkeit das Schiff zu stehlen, ohne dass die Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wird ein Plan ausgeheckt, demzufolge der Präsident durch einen Klon ersetzt werden soll. Auf diese Weise wäre die Kontrolle in den Händen von Easton und De Vries. Außerdem würden dadurch noch einige Extra-Vergünstigungen für die Verschwörer herausspringen, nachdem die Operation der Skedar erst durchgeführt worden ist.\n\nAllerdings hätten die beiden nicht viel Zeit, sich mit ihrem Triumpf zu brüsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durch ihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen könnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, diese Gefahr zu erkennen: Der Sapient, die künstliche Intelligenz, die dafür vorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu äußern, veranlasst Cassandra De Vries, dass dem Sapienten seine Persönlichkeit entzogen werden soll. In einem Akt der Verzweiflung tritt die Maschine mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einen Wissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Gebäude zu befreien. Ihr Erstaunen ist groß, als sie erkennt, dass es sich bei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Mission fort, und bringt ihn/es in Sicherheit. Während der Mission wird der Alarm ausgelöst, und Joanna muss sich bis ins oberste Stockwerk vorkämpfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. Zwei Tage später wird er in seiner eigenen Villa als Geisel genommen. Verlangt wird die Aushändigung der KI im Austausch für Daniel Carringtons Leben. Was dataDyne nicht weiß, ist die Tatsache, dass sich die KI bereits in der Villa befindet. Carrington wollte im Gespräch mit Dr. Caroll mehr über die von dataDyne geplanten Aktivitäten erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die Hände des Konzerns fällt. Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwörer im G5-Building zu spionieren. Sie erfährt, dass Trent Easton, der Chef der NSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamer skandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist. Nachdem von Trent erörtert worden ist, wie er gegen den Präsidenten vorgehen möchte, sendet Jo einen Hilferuf an das Institut. Allerdings erfährt sie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwörern abgefangen. Die Überlebenden des Absturzes sowie die Trümmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderen Agenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle Überlebenden und deren Ausrüstung in Sicherheit bringen. Nachdem es Joanna gelingt, ins medizinische Labor einzudringen, lüftet sie das größte Geheimnis des Carrington Instituts: Bei den Verbündeten handelt es sich um Maianer. Aliens, die als ‚die Grauen' bekannt sind. Der Außerirdische, den sie retten kann, wird Elvis genannt. Er war ein Bodyguard des Maianischen Botschafters, der das Spezialistenteam anführen sollte.\n\nNachdem es Joanna gelungen ist, den einzigen Überlebenden der Maianischen Delegation zu retten, wendet sie sich wieder dem Präsidenten und seiner Bedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um in die Basis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihr auch, an Bord zu gelangen. Während des Flugs treten Trent und der getarnte Skedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten. Während Trents Leute das Flugzeug nach dem Präsidenten absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan wäre gewesen, den glücklosen Politiker an Bord eines Skedar-UFO zu bringen, das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterung zu beschädigen, sie schafft es aber nicht, sie zu zerstören. Die Agentin verständigt Elvis, der einen Kamikaze-Angriff auf das UFO durchführt. Alle drei Vehikel stürzen über Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre Übertragung durch ein Störsignal der Skedar unterbrochen wird. Sie macht sich auf, um Elvis und den Präsidenten zu finden. Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klon des Präsidenten findet. Joanna Dark zerstört den Klon, deaktiviert das Störsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machenschaften der Skedar vereitelt, der Präsident wurde gerettet, und Trent wird von den Skedar für seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen. Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich auf den Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvis unterbrechen die Aktion und finden heraus, worum es ihren Gegnern eigentlich geht. Anschließend gelangen sie mit einem Tauchboot zum Grund des Meeres und sehen zum ersten Mal das außerirdische Schlachtschiff. Das Team betritt das Schiff durch den Eingang, der von den Skedar erschaffen wurde und treffen auf einen leblosen Skedar. Offenbar scheint außer ihnen noch jemand an Bord zu sein. Nach zahllosen Kämpfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommen finden sie die KI, die einst Dr. Caroll war. Nachdem seine Persönlichkeit wieder hergestellt wurde, drängt er Joanna und Elvis, das Schiff zu verlassen, da er es endgültig zerstören möchte.\n\nZurück im Carrington Institut bereitet sich Joanna für einen Empfang im Weißen Haus vor, als sich die Ereignisse plötzlich überstürzen. Die überlebenden Skedar richten ihren Zorn nun gegen jene Personen, die sie für das Scheitern ihrer Mission verantwortlich machen. Joanna durchkämmt das Institut, um so viele Angestellte wie möglich zu retten. Währenddessen attackieren die Skedar alle Teile des Gebäudes. Der Mehrheit der anwesenden Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zelle an Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch, ein Ablenkungsmanöver zu starten, um Joanna die Flucht zu ermöglichen. Jo gelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigen Freunden, und eine fulminante 'Party' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit über dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemals gelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schrein zerstört, wäre dies auch ein harter Schlag gegen die Moral der Skedar. Auf diese Weise könnte ein anhaltender Frieden, anstatt eines unsicheren Waffenstillstands erzielt werden. Jo macht sich auf die Suche nach dem Anführer der Skedar, während Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trümmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen. Glücklicherweise ist sie am Leben, begraben unter Schutt und Asche. Allerdings hält noch ein Skedar ihren Fuß umklammert. Elvis gibt ihr eine Waffe, um dieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstört, die Verschwörung wurde gestoppt, und beide können ruhigen Gewissens in den Orbit zurückkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer für künstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Militär bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Geschäfte mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezüglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Höhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugeführt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einkünfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsstätte für Agenten, die in alle Länder der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese Überwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera für verdeckte Untersuchungen. Ausgerüstet für spektroskopische Holografie. Öffnet Türen durch Projektion von Körperwärme.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drücken Sie den Z-Trigger um zu holografieren. Durch Drücken des B-Knopfs werden Türen geöffnet. Drücken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verstärkt Licht, um die Umgebung besser wahrnehmen zu können. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung überlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und betätigen Sie ihn.\n\nBedienung\n- Wählen Sie das Nachtsichtgerät aus Ihrem Inventar. Wählen Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geöffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tür ein, um sie zu öffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drücken Sie den B-Knopf, nachdem Sie den Decoder ausgewählt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtgerät und die IR-Brillen nicht erfassen können.\n\nTraining\n- Suchen Sie mit dem Röntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' müsste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, wählen Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Türen und brüchige Wände.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tür und öffnen Sie sie.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- Wählen Sie den Tracker aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Träger. Erschafft einen chamäleonähnlichen Effekt. Das Feld bricht zusammen, wenn der Träger eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu überraschen!\n\nBedienung\n- Wählen Sie die Tarnkappe aus Ihrem Inventar. Wählen Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein ständig wechselndes Signal, um jegliche elektronische Kommunikation zu stören. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tür.\n\nBedienung\n- Drücken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrückt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlösser knacken können.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tür zu öffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drücken Sie den B-Knopf, nachdem Sie den Uplink ausgewählt haben.\n", + /*187*/ "SCHIESSEN\n Drücken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drücken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrückt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrückt, um automatisch zu feuern.\n", + /*193*/ "ZIELHÖHE\n Drücken Sie die C-Knöpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrückt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drücken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Stützpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Präsidenten\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Das größte außerirdische Schiff\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff für Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Späh- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Gebäude beinhaltet viele verschiedene Bereiche: Büros und Laboratorien, Workshops und Hangars. Da es von der Außenwelt relativ isoliert ist, können die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Geschäftsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Größe von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlüssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfügt die Villa über einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Geräte geschützt wird. Dies ist für dataDyne der sicherste Ort, um vertrauliche Pläne zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffenstützpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstürme lassen Rückschlüsse auf die Größe des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschützt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde für kalte Klimata optimiert. Sehr nützlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzuführen. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstürmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manövrierbares Fluggerät. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz für bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Unterstützung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Trägheit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Gerät ein, um zu schweben. Der Antrieb erfolgt über zwei starke Turbinen.\n", + /*236*/ "Hält alles rein und sauber. Hat Zugang zu allen Bereichen eines Gebäudes. Es wird geraten, diese Roboter nicht zu beschädigen, da sie teilweise einen alternativen Zugang zu stark bewachten Räumen ermöglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter für urbane Einsätze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene Gäste fernzuhalten. Frei nach dem Motto: Zuerst schießen, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfügt über stärkere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manövrierbarkeit.\n", + /*240*/ "Designed für einen Maianischen Piloten. Ein Passagier würde sich sehr eingeengt fühlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerüstete Skedar transportieren. Unsichtbar für konventionelles Radar. Sendet starke Störsignale über eine weite Entfernung aus, um Kommunikation und Erfassung unmöglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drücken Sie den C-Knopf unten\n-nach unten schauen - Drücken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrückt und verändern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n\nTraining\n- Betätigen Sie alle Schalter. Sie müssen schnell sein, da sich die Schalter rasch zurücksetzen.\n\nBedienung\n- Sidestep links - Drücken Sie den C-Knopf links.\n- Sidestep rechts - Drücken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken können Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und betätigen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrückt und drücken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrückt.\n- Aufstehen - R-Taste\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drücken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schläge zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrückt und drücken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "Überlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen müssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*253*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*260*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Nützlich im Kampf, aber achten Sie auf Überladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, setzen Sie daher dieses Gerät nur im Bedarfsfall ein.\n", + /*271*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er könnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, dass der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Nützlich im Kampf, aber achten Sie auf Überladung. Versuchen Sie, die Situation abzuschätzen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt Ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, daher setzen Sie dieses Gerät nur im Bedarfsfall ein.\n", + /*281*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekundär-Funktion ist der Schlag mit der Waffe und somit am Schießstand nutzlos.\n", + /*284*/ "Zur Erhöhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekundär-Funktion am Schießstand leider nutzlos.\n", + /*285*/ "Die schallgedämpfte Version der Falcon 2 eignet sich hervorragend dazu, gegenüber Ihren Gegnern den Überraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die MagSec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schuß Sekundär-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, können Sie den Schuß um ein Vielfaches verstärken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlüssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als nützlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt für die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stücke.\n", + /*291*/ "Ein verlässliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekundär-Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel Ärger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafür designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilität und verfügt über eine interessante Sekundär-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natürlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem großen Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln können auch als Energielieferant für die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekundär-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Militär eingeführt. In Übereinstimmung mit dataDynes Tendenz, den Leuten böse Überraschungen zu bereiten, wurde dem Basismodell eine Annäherungs-Mine eingebaut. Wird der Sekundär-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen können, verfügt die Waffe als Sekundär-Funktion über einen Sensor, der mögliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfügt das Magazin über ein nur kleines Fassungsvermögen. \n", + /*298*/ "Der erste Versuch des Instituts, eine unterstützende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekundär-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Annäherungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Militär hat diese Waffe klarerweise großen Anklang gefunden. Gewöhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilität zählt hier nicht. Zwei Modi stehen zur Verfügung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ groß, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallgedämpftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern könnte, ist der Schütze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu können.\n", + /*302*/ "Obwohl die Technologie schon etwas überholt ist, schätzen wir noch immer die Fähigkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch Wände.\n", + /*303*/ "Die Primär-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekundär-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Betäubungsgewehr findet in seinen Grundzügen in vielen medizinischen Labors und Krankenhäusern Verwendung. Die Dosis des Betäubungsmittels kann, bei kurzen Distanzen, erhöht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht für einen menschlichen Schützen konzipiert. Wenn Sie in die Knie gehen, können Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerstößen vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekundär-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an Wänden ermöglicht wird. Nach einiger Zeit fällt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. Lädt nach jedem Schuss selbst nach. Die Sekundär-Funktion ermöglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schüsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flüchtende Ziel durch eine Kamera beobachten können. Ein Agent des Carrington Instituts findet dafür natürlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslöser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. Übung ist unumgänglich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfügbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich stärkerer Kurzstrecken-Laser verfügbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Annäherungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren Händen befindet. Die Detonation erfolgt bei Kontakt oder bei Annäherung.\n", + /*313*/ "Um Zeitzünder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls könnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre Fähigkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekundär-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlüssel zur erfolgreichen Platzierung von Annäherungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekundär-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter überlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezündeter Minen, die aber auf dem üblichen Prinzip aufbaut. Die Primär-Funktion platziert die Mine, die Sekundär-Funktion lässt sie detonieren. Können Sie die Mine nicht sehen, müssen Sie sich auf Ihr Gefühl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_i.c b/src/files/lang/jap-final/dish_str_i.c new file mode 100644 index 000000000..537d0b08f --- /dev/null +++ b/src/files/lang/jap-final/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale è stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM in posizione errata.\n", + /* 19*/ "Mina ECM piazzata correttamente.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta è stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi farò fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurrò al reparto addestramento.\n", + /* 68*/ "Il centro informazioni è oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo è il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITÀ\nPremi B vicino all'Antigravità per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiverà anche qualsiasi strumento lì vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIÙ\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia è stata disarmata.\n", + /* 91*/ "La guardia è stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilità!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento a amni nude: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI n°027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI n°009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto più capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio più alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI n°000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. È senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, è legato a Cassandra De Vries da una strana amicizia, che sembra più che altro un'alleanza d'interesse. Tende a fare tutto ciò che dice Cassandra, forse perché, pur avendo una forte personalità, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilità linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di proprietà di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. È il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis è un terrafilo: per lui il mondo terrestre è incredibilmente affascinante.\n", + /*153*/ "Mr Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. È un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma è attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ "I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra è Daniel Carrington, però manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poiché non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabissò nell'Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinché possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realtà questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arrivò ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanità continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall'avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e così decisero di continuare pazientemente le loro osservazioni finché gli umani non si fossero dimostrati più 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contattò una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la più grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilità linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries riferì i dettagli del piano a Trent Easton, direttore dell'NSA, che cercò invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. Né gli Skedar né la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben più sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e né Cassandra né Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivelò le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordinò di manipolargli il cervello togliendogli così la personalità. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adottò lo pseudomino di Dr. Caroll e contattò il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark è incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'proprietà'. A loro insaputa l'automa si trova già nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell'istituto, ma non può impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna è inviata a Chicago per spiare una riunione di cospiratori nell'edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, è coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito più urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna può tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna è lì per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocità. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Così si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente è salvo, gli Skedar hanno fallito e ora Trent dovrà pagare cara la sua incompetenza.\n\nMa non è finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affondò la nave Cetan. Joanna e Elvis devono intralciare l'attività a bordo e così scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalità, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell'istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sarà necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poiché i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Così Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. È viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar è giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi è la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries iniziò a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fondò il Carrington Institute, una fucina tecnologica situata in una sperduta località degli USA. L'istituto è anche il campo di addestramento per la formazione di agenti la cui missione è girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualità della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finché non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. È più potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Può essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede,che possono così scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai più munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalità Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalità Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle città\n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerche oceaniche\n", + /*207*/ "Astronave Cetan\0|Segno degli alieni sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravità\0|Dispositivo antigravità\n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. È piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di proprietà dell'istituto, questa residenza appartata è usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osservatorio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo è il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One è particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo è Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di proprietà del governo USA, il Pelagic II può condurre operazioni subacquee in alto mare in ogni condizione climatica. È l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Può essere comandata dal computer o pilotata a distanza. Può trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravità usato dai magazzinieri. È applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unità antigrevità, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perché possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Può essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unità antigravità per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina più potenti; può facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocità ridotta. Anche se ben armato il suo punto forte è la manovrablità.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Può portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Può trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ciò che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare giù: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perché si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nIstruzioni di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare a mani nude contro più avversari può essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z più volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare a mani nude contro più nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro più nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilità di lotta a mani nude, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*257*/ "Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*259*/ "Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ "Quando sei sicuro delle tue abilità di lotta a amni nude va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*265*/ "La TeleSpia può essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma può causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c'è nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*275*/ "La TeleSpia non è invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarrà nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma può causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ "Usa i dispositivi mimetici quando non c'è nessuno che possa vederti. Evita di sparare se non strettamente necessario finché non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ "La Falcon 2 è una pistola molto precisa: qualsiasi errore dipende da te. La modalità secondaria è la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa è dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalità secondaria è inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore è eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 è dotata di un'eccezionale potenza di sparo ma non è troppo precisa, soprattuto se usata nella modalità secondaria a tre esplosioni. Il vero svantaggio dell'arma è il caricatore ridotto.\n", + /*287*/ "È una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo può essere caricato in modo da essere devastante. La carica di munizioni superiore è un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola può essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in più e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ "Un fucile mitragliatore affidabile e efficace: è facile capire perché sia il modello più venduto della dataDyne, anche se non è prevista la modalità secondaria. Il sistema di designazione e puntamento è eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non è stato progettato come arma di precisione, anche se vale la pena fare pratica. Può sparare molte pallottole in poco tempo ed è quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilità Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalità secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocità di fuoco è ridotta nella modalità secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocità e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento è stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e può essere usata come sentinella in modalità secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo è il modello che la dataDyne ha fornito all'esercito USA, anche se non è ancora stato adottato ufficialmente. Poiché la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimità sotto la canna. Usare la modalità secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalità secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalità secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto è troppo piccolo.\n", + /*298*/ "Il primo tentativo dell'istituto di creare un'arma di supporto è l'AR34, un semplice fucile d'assalto. La modalità secondaria è uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione più pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimità. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione è d'uopo! Ci sono due modalità: esplosione singola o doppia. Il caricatore è piuttosto capiente per un fucile a pompa, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione è il cecchino. Usa la modalità secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo è inarrestabile e penetra nelle pareti in grande profondità, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra è un colpo narcotico non letale, mentre la seconda annienta all'istante. È un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non è adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo è la stessa usata in molti ospedali e laboratori. Può essere caricata sia con piccole quantità di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. È pensata per esseri più forti degli umani, questo è chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalità secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalità secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocità ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar può lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute è superiore a certe cose. Il missile guidato accelera automaticamente, ma può essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. È necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalità primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finché il grilletto è premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno è stata aggiunta una modalità secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimità.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbierà la vista e gli oggetti ti cadranno di mano. Può essere fatta esplodere a impatto o per prossimità. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio può sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalità secondaria è un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimità è metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremità di destinazione della mina di prossimità, usa il rilevatore di minaccia della modalità secondaria per proteggerti. Può sembrare una perdita di tempo, ma può salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalità primaria piazza la mina, mentre la secondaria dà il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - A mani nude 1\n", + /*320*/ "Olog. 5 - A mani nude 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/jap-final/dish_str_s.c b/src/files/lang/jap-final/dish_str_s.c new file mode 100644 index 000000000..f3721a697 --- /dev/null +++ b/src/files/lang/jap-final/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visión Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visión Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitúate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexión establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con éxito.\n", + /* 15*/ "Conexión perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y conéctale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la Cámara Espía de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Información y holografíala.\n", + /* 22*/ "Sala del PC de Información holografíada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificación completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Escáner de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Escáner de Infrarrojos ha sido localizado con éxito.\n", + /* 32*/ "Recoge el Escáner de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Escáner de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con éxito.\n", + /* 35*/ "Recoge el Escáner de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla láser.\n", + /* 37*/ "Todas las rejillas láser han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaña a alguien para que te dé el Dispositivo de Ocultación.\n", + /* 40*/ "Dispositivo de Ocultación recuperado con éxito.\n", + /* 41*/ "Rejilla Láser 1 desactivada.\n", + /* 42*/ "Rejilla Láser 2 desactivada.\n", + /* 43*/ "Estoy aquí para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. ¡No engañas a nadie!\n", + /* 45*/ "Aquí lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultación ha sido asegurado con éxito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ¿recuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ¿de dónde has salido?\n", + /* 50*/ "Has sido detectado por la cámara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultación de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultación y localiza a Carrington.\n", + /* 53*/ "¡Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misión completada - ¡Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misión fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botón A.\n", + /* 57*/ "Elegir la Cámara Espía.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Cámara Espía y suelta el Botón A.\n", + /* 58*/ "Elegir la Visión Nocturna.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visión Nocturna y suelta el Botón A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botón A.\n", + /* 60*/ "Elegir el Escáner de Rayos-X.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de Rayos-X y suelta el Botón A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botón A.\n", + /* 62*/ "Elegir el Escáner de Infrarrojos.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de IR y suelta el Botón A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botón A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultación.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botón A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botón A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conduciré a las salas de entrenamiento.\n", + /* 68*/ "El centro de información está tras esta puerta.\n", + /* 69*/ "Aquí tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "Éste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botón B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botón B para soltarla.\n", + /* 75*/ "AEROMOTO \nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botón B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botón B también activará cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botón B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento está en marcha.\n", + /* 81*/ "Has obtenido el Código Interruptor 1.\n", + /* 82*/ "Has obtenido el Código Interruptor 2.\n", + /* 83*/ "Has obtenido el Código Interruptor 3.\n", + /* 84*/ "Has obtenido el Código Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botón C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botón C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con éxito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con éxito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con éxito.\n", + /* 90*/ "El guarda ha sido desarmado con éxito.\n", + /* 91*/ "El guarda ha sido derribado con éxito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mantén el Botón R, entonces pulsa el Botón C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mantén el Botón R, entonces pulsa el Botón C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con éxito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician rápidamente.\n", + /*100*/ "Obtén los códigos de acceso examinando los terminales. \n- Usa los códigos en los terminales del muro.\n", + /*101*/ "El Código 1 ha sido obtenido.\n", + /*102*/ "El Código 2 ha sido obtenido.\n", + /*103*/ "El Código 3 ha sido obtenido.\n", + /*104*/ "El Código 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con éxito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botón Z repetidamente para golpear.\n", + /*108*/ "Ahora inténtalo contra un objetivo en movimiento...\n", + /*109*/ "Y por último contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con éxito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con éxito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botón B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prepárate para la misión.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 años 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reacción excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La más alta puntuación en entrenamiento, lo que llevó a la creación de un nuevo nivel. Es la encarnación del agente ideal del Instituto Carrington, de ahí su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 años 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revólver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuación más alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 años 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal científico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operación desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 años ? meses\n", + /*140*/ "|Análisis -\n\nDirectora de la Corporación dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrúpulos si con ello consigue superarse en su competición con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 años ? meses\n", + /*144*/ "|Análisis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece más una unión de interés. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos más granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporación dataDyne con habilidades de lenguaje y apertura de códigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un académico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 años\n", + /*152*/ "|Perfil -\n\nAlienígena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a petición de Daniel Carrington. Los Protectores están entrenados para dominar una gran variedad de armamento. Elvis es un terrófilo, es decir, está fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 años\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiración en la que Cassandra y Trent están involucrados. Poco más se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyección holográfica de un impresionante humano rubio de unos 30 años. Su unidad de modulación oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulación de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 años\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que está rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la petición de préstamo del Pelagic II a la Corporación dataDyne. La mayoría de comentaristas políticos piensa que es fácil de controlar, lo cual quizás sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de alienígenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todavía debe hacerse un contacto político formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza alienígena guerrera que luchó con los Maian durante siglos y sólo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeñas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religión.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de años, una gigantesca nave alienígena de inmenso poder, creada por una raza alienígena llamada Cetan, se hundió en el Océano Pacífico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople débil', que en teoría puede causar que las cadenas que unen las moléculas fallen. Aunque algunos hubieran creído en la innegable destrucción de la nave, un mensaje-cápsula fue enviado a casa, y partes vitales de los sistemas de navegación fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura alienígena centinela.\n\nOtra raza extraterrestre, los Maian, encontró vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terráquea), y la escaramuza resultante pronto floreció en una guerra total. Sólo tras cientos de años de lucha se logró un tratado de paz, aunque los fanáticos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, también, continuó siendo una causa que concernía a los Maian, los cuales veían con decepción cómo la Tierra sufría más y más crisis debido al crecimiento de la tecnología y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia sólo precipitaría guerras futuras en el planeta, y tranquilamente decidieron continuar en observación hasta que la raza madurara más.\n\nDaniel Carrington se adelantó a todos en el 1985 DC al contactar con una nave Maian en órbita sobre la Tierra. Propuso un plan que podía ayudar a ambas partes, resultando así un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona íntegra, los Maian permitieron a Carrington lanzar su tecnología al dominio público a través de sus grandes empresas de Investigación y Desarrollo.\n\nEntonces, en el 2006 DC, los fanáticos Skedar dieron con la cápsula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localización del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Océano Pacífico; de todos modos, para alcanzarla, necesitarían ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compañías que poseían los recursos para ayudarles a recuperar la nave hundida. En lo más alto de esa lista estaba la Corporación dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnología alienígena para convertirse en la mayor corporación sobre la faz del planeta. Todo lo que dataDyne tenía que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de códigos, que era justo lo que necesitaban. Se comenzó a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostró al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobación Presidencial para el préstamo de una nave de investigación a profundidad, fueron repetidamente rechazados. No existía la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., así que decidieron trazar un plan bastante más siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometía recompensas extra para Trent y Cassandra cuando la operación Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan último de los fanáticos Skedar era probar la 'fuerza nuclear de acople-débil' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, así que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne había creado inconscientemente algo que podía ver demasiado claro el peligro que implicaba una conspiración de tal magnitud: la sabia IA construida para abrir los códigos de acceso de la nave Cetan. Cuando se mostró disconforme con la misión para la que había sido diseñada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperación, y en un movimiento que podría sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adoptó el seudónimo de Dr. Caroll y contactó con el Instituto Carrington con una súplica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asignó una misión relacionada con la 'extracción' de un científico de un área de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Después del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella continúa con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su única vía de escape.\n\nEn respuesta a esta incursión, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como rehén dos días después en su villa privada. Demandan la devolución de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya está en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso drástico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunión de los conspiradores en el Edificio G5, una tapadera de la Corporación dataDyne. Es aquí donde averigua que Trent Easton, director de la ANS, y aquellos hombres nórdicos, que parecen tener el control del mortal plan, están involucrados. Cuando Trent revela el plan de usurpar la posición Presidencial, Joanna comunica por radio las novedades a la base, sólo para descubrir que otra tarea todavía más urgente requiere de ella, antes incluso de llevar a cabo cualquier acción contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al Área 51, en Nevada. Con la misión de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio médico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza alienígena comúnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegación Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del séquito Presidencial para acceder a la base aérea donde el Air Force One está ubicado, y consigue colarse con éxito en el avión. Nada más despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna está allí para detenerles. Apresura al Presidente a la cápsula de escape mientras un equipo de hombres de Trent registran detenidamente el avión, en un intento de arrastrar al desgraciado político a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en última instancia Elvis intenta romper el tubo estrellándose contra él a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la cápsula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones están bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: rápidamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballería'. Los planes Skedar han vuelto a ser frustrados, el Presidente está seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aquí no acaba la cosa. Descuidando toda precaución, dataDyne y los Skedar roban el navío de investigación del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacífico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qué se esconde tras el gran plan Skedar. Después de paralizar las operaciones de inmersión del navío y replegar el sumergible, bajan al fondo oceánico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cadáver de un guerrero Skedar... Parece que el equipo de asalto no las tenía todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazón de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apañan para restaurarle la personalidad, después de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nMás tarde, de vuelta en el Instituto Carrington, Joanna está a punto de salir hacia una recepción Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar están descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayoría de los empleados pudieron ponerse a salvo mientras Joanna mantenía la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como única compañía. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distracción necesaria para que Joanna escape. Luchando a través de la nave, logra localizar y desactivar los escudos de la bahía de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en órbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes habían encontrado 'el más sagrado' lugar Skedar en todos los años de Guerra interracial. Si el Templo es destruido, la moral Skedar será abatida, y se logrará una paz verdadera en vez de un inútil 'alto el fuego'. Joanna busca al líder Skedar, el más alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo está devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Está viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los últimos segundos de su intento de escapar. Elvis le entrega rápidamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiración desbaratada, los dos parten a la órbita más cercana.\n", + /*173*/ "Corporación dataDyne\n", + /*174*/ "La monolítica corporación que dataDyne ha llegado a ser comenzó su negocio como programadora de sistemas de IA. Cuando de verdad comenzó a crecer, fue cuando consiguió trabajos como contratista de los militares norteamericanos, y su joven y dinámica gerente Cassandra De Vries empezó a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cuánticos e IAs. Cuando la tercera compañía armamentística fue comprada por dataDyne, los beneficos se tornaron astronómicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporación fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnología anti-gravedad. Las ganancias obtenidas, así como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnología situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnológico actual, por razones que sólo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripción\n- Una pequeña cámara remota para exploración sigilosa. Realiza holografías espectroscópicas. Abre puertas proyectando un impulso de calor del tamaño de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Información.\n\nOperativa\n- El Botón Z toma una holografía. El Botón B abrirá cualquier puerta en el camino. Mantén el Botón R para mirar.\n", + /*178*/ "Descripción\n- Mejora la luz visible para producir una imagen del área circundante. También refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actívalo.\n\nOperativa\n- Selecciona la Visión Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripción\n- Dispositivo para apertura de códigos. Se aplica sobre el panel de control y busca la combinación hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en él hasta que la abras.\n\nOperativa\n- Sitúate cerca del panel de la puerta y pulsa el Botón B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripción\n- Se usa para ver a través de muros sólidos y objetos. Puede ver cosas que la Visión Nocturna y el Escáner de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Escáner de Rayos-X, busca los dos interruptores ocultos y actívalos para apagar la cuadrícula láser.\n\nOperativa\n- Elige el Escáner de Rayos-X de tu inventario para activarlo. Selecciónalo otra vez para desactivarlo.\n", + /*181*/ "Descripción\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultación esperándote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elígelo en tu inventario.\n", + /*182*/ "Descripción\n- Traslada datos termales en imágenes visibles. Puede ser usado en la oscuridad y también revela anomalías como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Escáner de Infrarrojos, encuentra la puerta oculta y ábrela.\n\nOperativa\n- Elige el Escáner de Infrarrojos en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*183*/ "Descripción\n- Localiza un objeto en el mapa radar del visor. Muestra la posición relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la señal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*184*/ "Descripción\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camaleónico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultación y dirígete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultación para activarlo. Reelígelo para desactivarlo.\n", + /*185*/ "Descripción\n- Emite una señal constante que sirve para bloquear cualquier dispositivo de comunicación electrónica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botón Z para lanzar la mina. Mantén el Botón R y mueve el Stick de Control para afinar tu puntería antes de lanzar.\n", + /*186*/ "Descripción\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrónicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo así una puerta secreta.\n\nOperativa\n- Sitúate en la terminal y pulsa el Botón B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botón Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMÁTICA\n Suelta el Botón Z cuando no tengas munición.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botón B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mantén el Botón R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mantén el Botón Z para disparar automáticamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botón C Arriba o el Botón C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mantén el Botón R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RÁPIDO\n Pulsa el Botón Z rápido para disparar más velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Sótano Laboratorio\0|Laboratorios subterráneos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporación dataDyne\n", + /*202*/ "Área 51\0|Cerca de Lago Seco, Nevada\n", + /*203*/ "Base Aérea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avión del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71 N 118 O\n", + /*206*/ "Pelagic II\0|Navío especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave alienígena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|Ágil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Anti-gravedad\n", + /*212*/ "Aeromoto\0|Vehículo aéreo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercóptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor aéreo robótico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave alienígena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes áreas: oficinas y laboratorios, talleres y hangares. Está bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporación dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los técnicos trabajan secretamente para situar a dataDyne en lo más alto.\n", + /*222*/ "Perteneciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. También tiene un observatorio, su propio generador eléctrico y una amplia bodega.\n", + /*223*/ "Es una sórdida y mugrienta parte de Chicago, ahora cerrada al tráfico. Es aquí donde la Corporación G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabación. Para dataDyne es el lugar más seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta sección de la gigantesca instalación conocida como Área 51 está situada al pie de las colinas de Lago Seco. Helipuertos exteriores y torres de comunicación indican el posible tamaño del complejo subterráneo.\n", + /*226*/ "Una de las muchas bases aéreas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases aéreas están en lugares remotos en regiones inhóspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular está optimizado para climas fríos, siendo muy útil cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Círculo Ártico, descansan los restos de un avión destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condición. Es el único navío de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construcción alienígena que reposa en el fondo oceánico desde hace millones de años.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente árido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeño, rápido, y altamente manejable transporte de agentes ha sido diseñado para uso en áreas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, más su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseñado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajón y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequeña unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las áreas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehículo de patrulla urbana y eliminación, con tripulación de dos hombres, y armado con un cañón en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseñado para guerrilla urbana. Usa una unidad anti-gravedad. Está fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programación de '1° dispara, después pregunta'.\n", + /*239*/ "Variación robótica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 fácilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad más que en el escudo.\n", + /*240*/ "Está diseñada para llevar a un único piloto Maian. Un pasajero se puede sentir atorado: si éste es humano, puede ser aún peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir señales de bloqueo sobre áreas considerables: éstas interrumpen las comunicaciones así como los equipos de detección.\n", + /*242*/ "Descripción\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mirándolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botón C Abajo\n-Mirar abajo: Pulsa el Botón C Arriba\n-Vista Libre: Mantén pulsado el Botón R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripción\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. Sé rápida, ya que cada botón se reiniciará en un tiempo límite.\n\nOperativa\n- Esquivar Izquierda: Botón C Izquierda\n- Esquivar Derecha: Botón C Derecha\n\n", + /*244*/ "Descripción\n- Agacharse puede abrir nuevas áreas de exploración.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obstáculos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mantén el Botón R, y pulsa el Botón C Abajo.\n- Arrastrarse: Una vez agachado, mantén el Botón R, y pulsa el Botón C Abajo.\n- Levantarse: Presiona el Botón R.\n\n", + /*245*/ "Descripción\n- Luchar contra múltiples oponentes en combates mano a mano puede ser difícil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puñetazo: Pulsa el Botón Z repetidamente cuando estés desarmado para lanzar una ráfaga de puñetazos.\n\n", + /*246*/ "Descripción\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mantén el Botón B, entonces pulsa el Botón Z para desarmar al enemigo.\n- Puñetazo KO: Golpea a un enemigo desprevenido por detrás.\n", + /*247*/ "Descripción\n- Lucha contra múltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripción\n- Lucha contra múltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dónde quieres ir antes de intentar la prueba. Establece tu posición en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados sólo si estás segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados sólo si estás seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*264*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*265*/ "La Cámara Espía puede ser difícil de controlar, así que tómate tu tiempo.\n", + /*266*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*268*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al blanco. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*269*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*271*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*274*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*275*/ "La Cámara Espía no es invisible: los enemigos la pueden descubrir, así que ten cuidado cuando entres en un área habitada. Recuerda que la Cámara Espía se quedará donde la dejes hasta que la recojas.\n", + /*276*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*278*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al objetivo. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*279*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*281*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y sólo si estás seguro del éxito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, así que cualquier error será tuyo. El modo secundario es golpear con su culata y es, por lo tanto, inútil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precisión de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es inútil durante la prueba de tiro.\n", + /*285*/ "La versión con silenciador de la Falcon 2 es una excelente arma, diseñada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precisión para asegurarte que nunca derrocharás tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisión, especialmente cuando se usa el modo secundario de ráfaga de 3 tiros. La única desventaja seria es el tamaño limitado de su cargador.\n", + /*287*/ "Esta típica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosión devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta versátil pistola ofrece dos diferentes sistemas de disparo para su munición: un disparo estándar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energía del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cuándo recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy útil si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepción. Las balas son tan especiales como el resto del arma; han sido diseñadas para hacerse añicos en el interior del oponente y así tumbarle rápidamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difícil de encontrar ya que es el arma más vendida de dataDyne en los últimos dos años, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisición de objetivos es excelente, y deberás familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Ciclón fue diseñada específicamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresión.\n", + /*293*/ "La flexibilidad Maian respecto al diseño ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos fácilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir daño en el mecanismo de disparo y en el cañón.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompañada de un ritmo de disparo rápido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultación: el entrenamiento ha sido alterado para reflejar esta característica en particular.\n", + /*295*/ "Este arma no sólo se parece a un ordenador PC portátil, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "Éste es el modelo que dataDyne presentó con éxito a los militares de EE.UU., aunque todavía tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo básico del rifle de asalto lleva una mina de proximidad debajo del cañón. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragón en modo secundario), y armas automáticas. Aunque poderoso, el cartucho de este rifle de asalto es pequeño. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante básico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisión.\n", + /*299*/ "Se trata de la variante pesada del Dragón sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqué... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opción aquí. Hay dos modos, explosión simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniería es un rifle de francotirador con silenciador con un zoom de alta tecnología. Lo único que puede interferir en la precisión de este arma es el zoom de francotirador. Asegúrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las técnicas actuales de ingeniería nos superan, todavía podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La función primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instantánea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy común, pudiendo ser encontrada en laboratorios médicos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante más cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseñada para usuarios bastante más fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algún oponente logra esquivar la lluvia de balas, sus cañones pueden usarse como trituradoras para infringir daño.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnología muy interesante en su interior. El modo secundario activa un campo magnético alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, así que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador portátil de mísiles Skedar puede disparar tanto cohetes sin guía, como por control remoto. A los Skedar les produce una perversa satisfacción cuando la cámara se acerca al objetivo, pero un agente del IC está más allá de esas cosas. Los cohetes guiados aceleran automáticamente, pero pueden ser decelerados para más maniobrabilidad. La detonación ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, está equilibrado para ser lanzado. La práctica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeño pero efectivo láser de muñeca con dos diferentes rayos. El modo primario genera una explosión a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activación a la detonación de la granada de fragmentación antipersonal en el modo básico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotará hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosión, tu visión se volverá borrosa y no podrás agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegúrate de lanzarla cuando estés lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosión no afectará al objetivo, y éste irá detrás tuyo. Mejorar tu habilidad en las pruebas evitará errores críticos. La función secundaria es un detector de trampas idéntico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocación correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si tú mismo no quieres tener problemas, usa el modo secundario de detección de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es así, podrá salvar tu vida.\n", + /*315*/ "La última variedad de minas remotas detonables, es esencialmente igual a las que ya tenías. El modo primario es poner las minas, mientras que el secundario es dar las órdenes de explosión. Si no puedes ver la mina, deberás confiar en el viejo método de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/earE.c b/src/files/lang/jap-final/earE.c similarity index 100% rename from src/files/lang/earE.c rename to src/files/lang/jap-final/earE.c diff --git a/src/files/lang/jap-final/earJ.c b/src/files/lang/jap-final/earJ.c new file mode 100644 index 000000000..25bb029b8 --- /dev/null +++ b/src/files/lang/jap-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nЀ׀߂„€…€Ö€Ë€ú€øÒ„ÿ…€…æºâ€Ý€×€ß‚„ÖÒŠ€Ð¸ƒÏ…ªÆâÏÓ€‰‚„€ß€÷€Ï€Õ¸‚ù¼ƒ‡ƒƒæºâ€Â„ÿ…€€Ó€÷€Ð¿àÓƒº»ƒÉ…ÅƒÊæ„‚ŸÄã̾á€Èãӂ䂅҃σ¤¸€‚±éÌÅØ¼óºä¼€ÂÈÃÒ………†ƒîÉÊÏ‚ÛàÒ…„ƒ§¸‚ƒ®ÄÇâÒð€Â»»¿€‚ÛàÓƒ¸‚‘‚’‚“ð€Â‚àó‚×´ÉáÆâÃÍÒλ߼…ƃ˜ƒµ¸ËÂÌÁã€Â‰‚„€ß€÷€Ï€Õ¸‚èãâÎ߀À´ÍƒûƒüËÓíð€Â\n\n|‚µ‚¶€‘€¾…Ç…·ƒßƒ°…ÚÒ„ÿ…€¸„‚„‹Çß\n\nЀ׀߂„€…€Ö€Ë€ú€øÏßãõ€‰‚„€ß†€Ñ€ÏÒ‚˜‡Ìó…Ç…·ƒßƒ°…Ú¸ƒˆ»É„ÙÅ»€Û‚„€øŠ…‡…ˆÒ„ÿ…€æÎÄãÌ»âȼð€Â…Ç…·‚¢€ùŽ€øæƒÞ»Òó€€Õ€ð€Ü€Ñ¸‚ù´Ì„‚„‹Å€„ÿ…€Ò‚„†ÍÎâÜÒÒƒœƒ¢¸…•…–Ç߀Âξ€ÃÒ€Û‚„€øŠÒ…äƒÛ„»ÓƒÿÒ„ÿ…€…Ϻâß¼ð€Â\n\n|‚µ‚¶€’€¾€×€÷‚„€å€Ï€þ€ú€Ê€ã¸‚ÂÄ\n\n€Ú‚„Œ€Ü€Ó€÷€ÐÒ€×€÷‚„€å€Ï€þ€ú€Ê€ãÒ’€ú€þ€ö€ð¸…É…ÊÅÌ€€Ý€Ö€Ì€÷€â€Æ€…€Û€Ü€â€ð‚»‚¼¸…Ë‚øÄÇâÒð€ÂÃãÏ˻̻Âõ€€ù‚„‚„ó…ëÄãÉ„ÿ…€……ÌÒ…®„‰ÁÖÍ‚·ÚÃÍæóÀâóºä¼€Â\n\n|‚µ‚¶€“€¾………†ƒîÉÊÒ…„ƒ§¸‚ƒ®Çß\n\n€Ý€×€ß‚„€’ó‚Úåã̻⅄ƒ§æ‰‚„€ß€÷€Ï€Õ҃‚¢¸‚ßÅÁ‚±‚²Å̾á‚ä‚…Ò€é€Ê€Õ‚„悉ƒŽ€ú€Ê€×Ò€Ù‚„Џ‚†…žóÀλó»â€ÂÈÃϻⅅ…†ƒîÉÊÏ…„ƒ§¸‚ƒ®ÅÌÜà¼Òð€Â‚§æƒ—à…„ƒ§¸‚ƒ®ÆâÃÍÜ‚¡‚¢ð怀Ѐö‚„€ð€Û€Ü€â€ðæƒÛ‚ÄÆâƒôƒõæºâ€Ž€ÂÁãèãÜ………†ƒî¸‚×Éλ߼πÂ\n\n|‚µ‚¶€”€¾…„ƒ§‚ҀЀрâ€ð¸‚ö‚ÝÇß\n\nЀ׀߂„€…€Ö€Ë€ú€øÒ„ì„íÏßãõ€€“ËÒ…„ƒ§’€ú‚€È€×€ãæ‚󃱂ý‚¼Íδ̻âȼð€ÂÈÒ€“ËÒ’€ú€ã€ß€Ñ’¸‚ö‚ÝÅÌ€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Øó‚ÕÊ…Í´ÌÜà»É»€Â\n\n|‚µ‚¶€•€¾Š€×€ß‚„€…€Ö€Ë€ú€ø¸ƒËÂß\n\n‚˜‡ÌÓ€”ËҀ݀ր̀÷€â€Æ…‚„€Ïσ˜¿ã̾ည€×€ß‚„€…€Ö€Ë€ú€øÓÃãàÒ€‘‚Æ…®Ò€Ý€×€ß‚„€”Ï»â€Â€Ý€×€ß‚„‚ýÏÓ€‚§Ò߼υ©‚¡ƒ¼Á„Ñ‚öÆâƒî¸ƒè‚øÆâÉÛҀۀ܀â€ðæ‚”ƒŽÄãÌ»â€Â‡Ë‚ÝÏ¿åÅÌ‚­ƒ Ò€Ý€×€ß‚„Ï»â‚Û¸ƒË‚ŸÆÒð€Â\n\nEND\n", + /* 1*/ "‚˜‡Ì„ÿ…€…\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nЀ׀߂„€…€Ö€Ë€ú€øÒ„ÿ…€…æºâ€Ý€×€ß‚„ÖÒŠ€Ð¸ƒÏ…ªÆâÏÓ€‰‚„€ß€÷€Ï€Õ¸‚ù¼ƒ‡ƒƒæºâ€Â„ÿ…€€Ó€÷€Ð¿àÓƒº»ƒÉ…ÅƒÊæ„‚ŸÄã̾á€Èãӂ䂅҃σ¤¸€‚±éÌÅØ¼óºä¼€ÂÈÃÒ………†ƒîÉÊÏ‚ÛàÒ…„ƒ§¸‚ƒ®ÄÇâÒð€Â»»¿€‚ÛàÓƒ¸‚‘‚’‚“ð€Â‚àó‚×´ÉáÆâÃÍÒλ߼…ƃ˜ƒµ¸ËÂÌÁã€Â‰‚„€ß€÷€Ï€Õ¸‚èãâÎ߀À´ÍƒûƒüËÓíð€Â\n\n|‚µ‚¶€‘€¾…Ç…·ƒßƒ°…ÚÒ„ÿ…€¸„‚„‹Çß\n\nЀ׀߂„€…€Ö€Ë€ú€øÏßãõ€‰‚„€ß†€Ñ€ÏÒ‚˜‡Ìó…Ç…·ƒßƒ°…Ú¸ƒˆ»É„ÙÅ»€Û‚„€øŠ…‡…ˆÒ„ÿ…€æÎÄãÌ»âȼð€Â…Ç…·‚¢€ùŽ€øæƒÞ»Òó€€Õ€ð€Ü€Ñ¸‚ù´Ì„‚„‹Å€„ÿ…€Ò‚„†ÍÎâÜÒÒƒœƒ¢¸…•…–Ç߀Âξ€ÃÒ€Û‚„€øŠÒ…äƒÛ„»ÓƒÿÒ„ÿ…€…Ϻâß¼ð€Â\n\n|‚µ‚¶€’€¾€×€÷‚„€å€Ï€þ€ú€Ê€ã¸‚ÂÄ\n\n€Ú‚„Œ€Ü€Ó€÷€ÐÒ€×€÷‚„€å€Ï€þ€ú€Ê€ãÒ’€ú€þ€ö€ð¸…É…ÊÅÌ€€Ý€Ö€Ì€÷€â€Æ€…€Û€Ü€â€ð‚»‚¼¸…Ë‚øÄÇâÒð€ÂÃãÏ˻̻Âõ€€ù‚„‚„ó…ëÄãÉ„ÿ…€……ÌÒ…®„‰ÁÖÍ‚·ÚÃÍæóÀâóºä¼€Â\n\n|‚µ‚¶€“€¾………†ƒîÉÊÒ…„ƒ§¸‚ƒ®Çß\n\n€Ý€×€ß‚„€’ó‚Úåã̻⅄ƒ§æ‰‚„€ß€÷€Ï€Õ҃‚¢¸‚ßÅÁ‚±‚²Å̾á‚ä‚…Ò€é€Ê€Õ‚„悉ƒŽ€ú€Ê€×Ò€Ù‚„Џ‚†…žóÀλó»â€ÂÈÃϻⅅ…†ƒîÉÊÏ…„ƒ§¸‚ƒ®ÅÌÜà¼Òð€Â‚§æƒ—à…„ƒ§¸‚ƒ®ÆâÃÍÜ‚¡‚¢ð怀Ѐö‚„€ð€Û€Ü€â€ðæƒÛ‚ÄÆâƒôƒõæºâ€Ž€ÂÁãèãÜ………†ƒî¸‚×Éλ߼πÂ\n\n|‚µ‚¶€”€¾Š€×€ß‚„€…€Ö€Ë€ú€ø¸ƒËÂß\n\n‚˜‡ÌÓ€”ËҀ݀ր̀÷€â€Æ…‚„€Ïσ˜¿ã̾ည€×€ß‚„€…€Ö€Ë€ú€øÓÃãàÒ€‘‚Æ…®Ò€Ý€×€ß‚„€”Ï»â€Â€Ý€×€ß‚„‚ýÏÓ€‚§Ò߼υ©‚¡ƒ¼Á„Ñ‚öÆâƒî¸ƒè‚øÆâÉÛҀۀ܀â€ðæ‚”ƒŽÄãÌ»â€Â‡Ë‚ÝÏ¿åÅÌ‚­ƒ Ò€Ý€×€ß‚„Ï»â‚Û¸ƒË‚ŸÆÒð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‰‚„€ß†€Ñ€Ï„“Ò€‡Š€×€ß‚„€…€Ö€Ë€ú€ø€ˆÍ…¼‚Àâ………†ƒî¿à€‚ä‚…€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ï„ã…œæºá€€‡ƒ•…½‰‚„€ß†€Ñ€Ï„·„“¿à‚¨‚ŸÅÌ…¾Å»€ˆÍÒƒƒ…¿æº´É€Â‚­‚¼‚ÛÓ„æ‚Ó’€ú‚€È€×€ãÒ€‡€ò€ö€øƒú€ˆÏ…À„¤¸…Á쀂¤„“Ï…Â…ÃÅÉȼð€ÂÆâÍ„÷„“Ó‚Û¸…ă¯Å€ÃÒ’€ú‚€È€×€ã¸ƒ—‚ȃÑÏ‚î‚öãàãâ߼π‚Û¸€î€Ñ€ÏŠ€Ù€Ï€ã€ú‚„€øÅß¼ÍÅÌ»âàÅ»Òð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nЀ׀߂„€…€Ö€Ë€ú€øÒ„ÿ…€…æºâ€Ý€×€ß‚„ÖÒŠ€Ð¸ƒÏ…ªÆâÏÓ€‰‚„€ß€÷€Ï€Õ¸‚ù¼ƒ‡ƒƒæºâ€Â‚ł҄ÿ…€€Ó€÷€ÐóÓ………†ƒîÉÊæ‚ª¿…„ƒ§¸ÅÌ»âß¼ðæ€‚ÛàÓƒ¸‚‘‚’‚“ð€Â‚àó‚×´ÉáÆâÃÍÒλ߼…ƃ˜ƒµ¸ËÂÌÁã€Â‰‚„€ß€÷€Ï€Õ¸‚èãâÎ߀À´ÍƒûƒüËÓíð€Â\n\n|‚µ‚¶€‘€¾…Ç…·ƒßƒ°…ÚÒ„ÿ…€¸„‚„‹Çß\n\nЀ׀߂„€…€Ö€Ë€ú€øÏßãõ€‰‚„€ß†€Ñ€ÏÒ‚˜‡Ìó…Ç…·ƒßƒ°…Ú¸ƒˆ»É„ÙÅ»€Û‚„€øŠ…‡…ˆÒ„ÿ…€æÎÄãÌ»âȼð€Â…Ç…·‚¢€ùŽ€øæƒÞ»Òó€€Õ€ð€Ü€Ñ¸‚ù´Ì„‚„‹Å€„ÿ…€Ò‚„†ÍÎâÜÒÒƒœƒ¢¸…•…–Ç߀Âξ€ÃÒ€Û‚„€øŠÒ…äƒÛ„»ÓƒÿÒ„ÿ…€…Ϻâß¼ð€Â\n\n|‚µ‚¶€’€¾Š€×€ß‚„€…€Ö€Ë€ú€ø¸ƒËÂß\n\n‚˜‡ÌÓ€”ËҀ݀ր̀÷€â€Æ…‚„€Ïσ˜¿ã̾ည€×€ß‚„€…€Ö€Ë€ú€øÓÃãàÒ€‘‚Æ…®Ò€Ý€×€ß‚„€”Ï»â€Â€Ý€×€ß‚„‚ýÏÓ€‚§Ò߼υ©‚¡ƒ¼Á„Ñ‚öÆâƒî¸ƒè‚øÆâÉÛҀۀ܀â€ðæ‚”ƒŽÄãÌ»â€Â‡Ë‚ÝÏ¿åÅÌ‚­ƒ Ò€Ý€×€ß‚„Ï»â‚Û¸ƒË‚ŸÆÒð€Â\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø¸ƒËÂß\n", + /* 10*/ "………†ƒîÉÊÒ…„ƒ§¸‚ƒ®Çß\n", + /* 11*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ã¸‚ÂÄ\n", + /* 12*/ "…„ƒ§‚ҀЀрâ€ð¸‚ö‚ÝÇß\n", + /* 13*/ "…Ç…·ƒßƒ°…ÚÒ„ÿ…€¸„‚„‹Çß\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ã¸‚ÂÄÅÉ\n", + /* 16*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ãÒ’€ú€þ€ö€ð…É…Ê‚ó‚ô\n", + /* 17*/ "€Ý€Ö€Ì€÷€â€Æ€…Š€ÐÒ€ú€Ê€×悆‚øÄãÉ\n", + /* 18*/ "€ñ€Ï€â€ä€Ï€Ü€…€Ú€Ñ€×€ø¸‚ÂÄÅÉ\n", + /* 19*/ "€×€÷‚„€å€Ï€þ€…€Ú€Ñ€×€ø¸‚ÂÄÅÉ\n", + /* 20*/ "‚ăۂ ‚¢€€ú€Ê€ãÒƒØƒÙæŒ‚‚„óÆ\n", + /* 21*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ãæ„ð„¬ÅÉ\n", + /* 22*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 23*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ãæ„ð„¬ÅÉ\n", + /* 24*/ "‚µ‚¶‚ñ‚ò\n€‚µ‚¶¸‚ó‚ôóÀØÇ¹\n", + /* 25*/ "¾ƒÓ€ƒžð€À\n", + /* 26*/ "ƒ¸‚Ì‚ÍÒ………†ƒîÏ„ý‚²æ‚ŸÉ\n", + /* 27*/ "…ЃÀæƒÂ‚¢ÅÌ»ØÇ¹\n", + /* 28*/ "€Û€Ü€â€ð¸€Û€Ë€Ê€ã†€Ò€ÏÅÉ\n", + /* 29*/ "…„ƒ§æ‚ƒ®ÄãÉ\n", + /* 30*/ "€Ð€ö‚„€ð‚ÂÄ\n", + /* 31*/ "€Ð€ö‚„€ð„ð„¬\n", + /* 32*/ "‚×Éλ󀂩¼ÃÍÓƒþÁ¿à€Ž\n", + /* 33*/ "¾ƒÓ€ƒ”Ò„ÿ…€…󂃂‹‚ª¸Ý´Ì»â¹ð€À\n", + /* 34*/ "߿伀¾‚Ý„ä»Åß¼€Ž\n", + /* 35*/ "Æèπр߀ф—Ϻ¼ï€´\n", + /* 36*/ "€Ð€×€Ý€Ü„Ú„Û€€Ý€Ö€Ì€÷€â€Æ€…€Ù‚„Šæƒ‡ƒƒ\n", + /* 37*/ "€Ü€û‚„Џ€Ú‚„€à‚€Ž\n", + /* 38*/ "", + /* 39*/ "€Ü€û‚„Š‚¹‚Ç€¾€ú€Ê€×¸‚†‚øÅØÆ\n", + /* 40*/ "€Ù€ç€×€Û€Í€Ï€Ó€ö‚„€¾‚Âö€÷€Ï€×惇ƒƒ\n", + /* 41*/ "€Ý€Ö€Ì€÷€â€Æ€…Š€ÐÒ€ú€Ê€×Ó\n‚æÏ‚†‚øÄãÌ»ØÆ\n", + /* 42*/ "…„ƒ§ÓÆóÏ‚ƒ®ÄãÌ»ØÆ\n", + /* 43*/ "¾¿Å»Î€À€…„ƒ§æ‚ƒ®ÄãÌ»â\n", + /* 44*/ "ƒž¿æ€×Ò€©€œ¸‚ÏÅÉÙÉ»ð\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "€ä€Ñ€ã€Ð€Ñ¸‚ÝÏ‚öãÉ\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "…äƒÛ€Û‚„€øŠ\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "…äƒÛ€Û‚„€øŠ¸‚ÝÏ‚öãÉ\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 58*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 59*/ "‰‚„€ß€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 60*/ "…Ñ‚¾„ׄ؀Ž\n", + /* 61*/ "€ñ€Ï€â€ä€Ï€Ü€é€Ê€àæ„×»É\n", + /* 62*/ "€ñ€Ï€â€ä€Ï€Ü€é€Ê€àÓ‚æÏ„×»Ì»ØÆ\n", + /* 63*/ "‚‰‚õ€´€´€ƒºƒ¬Ò…Ç…·‚¢æ„‚ŸÄãÌ»ØÆ\n", + /* 64*/ "¾»€‚ª¸Ý´Ìâ¹ð€À\n", + /* 65*/ "€Ö€€Ö€ïÓ‚ÉÉÃÍλ\n", + /* 66*/ "‚ƒ‚‹¾ƒÓ‚ªƒîð€À\n", + /* 67*/ "…„ƒ§¸‚ƒ®ÅÌÜà¼å€Â\n", + /* 68*/ "Ä´ÄÍ…„ƒ§Ò’€ö€þ¸…ÒÀÎÄ»€´\n", + /* 69*/ "…„ƒ§Ò€Ü€Ñ€Ê€à¸„–âÒ߀´\n", + /* 70*/ "å¿´É€‚ƒ®Æâ߀Ž\n", + /* 71*/ "„ñ‚‚ÓÝÛÌÁ『\n", + /* 72*/ "¾´ÅµâƒÏáÏ»ÉÅØÅ·¼€Ž\n", + /* 73*/ "ƒ”Ò…„ƒ§æ€´\n", + /* 74*/ "×à€…„ƒ§Ó‚ƒ®ÄãÉß\n", + /* 75*/ "ÃÿàÆèÏ‚ŸÌ»´ÌÁ〴\n", + /* 76*/ "€ü‚„Š€î€Ï€´\n", + /* 77*/ "‚‰ƒŽƒ¸„Õ¹óÝâ\n", + /* 78*/ "€Ñ€ß€Ñ„—Ϻ¼ï€Ž\n", + /* 79*/ "ºã€Ã¹ÎÓíÓ€À\n", + /* 80*/ "ܼ„ð„¬ÄãÌ»âß¼ð\n", + /* 81*/ "Ã。ª¿…‰ƒÛÅÉ€À\n", + /* 82*/ "ƒž¿æ€×Ò€©€œ¸‚ÏÅÉÙÉ»ð\n", + /* 83*/ "ºã€…ЃÀæ€À\n", + /* 84*/ "ÃÒ‚„€‚ÏÅÝæ´Ì€´\n", + /* 85*/ "…Ñ‚¾‚ ‚¢€…„ƒ§æØð€Ð€×€â€ÆóÆ€Â\n", + /* 86*/ "…„ƒ§€Ð€Ñ€â€ð€‘¸‚ö‚ÝÅÉ\n", + /* 87*/ "…„ƒ§€Ð€Ñ€â€ð€’¸‚ö‚ÝÅÉ\n", + /* 88*/ "…„ƒ§€Ð€Ñ€â€ð€“¸‚ö‚ÝÅÉ\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "€Õ€ð€Ü€Ñ\n", + /* 92*/ "€Õ€ð€Ü€Ñ\n", + /* 93*/ "€Õ€ð€Ü€Ñ¸‚ÝÏ‚öãÉ\n", + /* 94*/ "ÃÃÓ‚­Ü‚‰ƒŽæ¿É»€Ó€÷€Ðð€Â\nЀ׀߂„€…€Ö€Ë€ú€øÓ‚¼ÁÏ»âÏ‚þ»Î»€Â\n", + /* 95*/ "ÃÒ‚¼ÁÒ‚ª¿æ\nÆê»€Ó€ç€ø€ý‚„¸‚ù´Ì»âå\n", + /* 96*/ "€×€÷‚„€å€Ï€þ€ú€Ê€ãÒ’€ú€þ€ö€ð¸…É…ÊÇ߀Â\nÈãó…®ÖÍ‚ÚÂâÓíð€Â\n", + /* 97*/ "…Ç…·‚¢€ùŽ€øæƒÞ…ªçâ€Â‚–Ï‚Ÿä€´\n‚€Í€Ð€Ï€ä€€Õ€ð€Ü€Ñ¸‚ù½€Â\n", + /* 98*/ "…µ…¶€Ò€È”€ÏҀـς„€ã€ñ€Ï€ãæ„×»É\n", + /* 99*/ "‚—‚Ȃɀ‚Ì„½…Ó„Êæ€ú€Ê€×ÄãÉ\n", + /*100*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø€À\n", + /*101*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø€ÃÃóÆ¿€À\n", + /*102*/ "ܼ€‚–Ï‚ŸÌ܃ƄӄԿ΀À\n", + /*103*/ "½½€ÃÒƒìÒ‚—Óƒ…Ì…‹‚»ÂÉå€Â\n", + /*104*/ "Ê·´Í€º€ºÎÉÓ€Ž\n", + /*105*/ "ÄÆæ’€úÒ…Ô„Ó‚É„ð΀´\nÆèÏÃÃ¿àƒ‰éÎÁÌÓ€´\n", + /*106*/ "ƒ”Ó…ÕƒÔ΄ì„í¸‚Õ´Ì»â€Â\n‚Úü€Å´¿á‚¬´ÌÁã߀´\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/earP.c b/src/files/lang/jap-final/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/jap-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_f.c b/src/files/lang/jap-final/ear_str_f.c new file mode 100644 index 000000000..e34e6c7d1 --- /dev/null +++ b/src/files/lang/jap-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir échantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'être achevés dans les laboratoires voisins du sien. Récupérez les prototypes des trois expériences et rapportez-les à l'Institut Carrington pour une étude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arrêter les expériences\n", + /* 11*/ "Dérouter cycle maintenance\n", + /* 12*/ "Obtenir échantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons mécanisme.\n", + /* 15*/ "Robots de maintenance activés.\n", + /* 16*/ "Robots de maintenance reprogrammés.\n", + /* 17*/ "Portes sécurité déverrouillées.\n", + /* 18*/ "Cycle de maintenance activé.\n", + /* 19*/ "Cycle nettoyage activé.\n", + /* 20*/ "Opération refusée - robots occupés.\n", + /* 21*/ "Robots de maintenance désactivés.\n", + /* 22*/ "Objet crucial détruit.\n", + /* 23*/ "Système robots maintenance désactivé.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui êtes-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des systèmes actifs.\n", + /* 29*/ "Expérience interrompue.\n", + /* 30*/ "Alarme activée.\n", + /* 31*/ "Alarme désactivée.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une bêtise.\n", + /* 36*/ "ACCES REFUSE - code de sécurité requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localisé - dérivation serrure.\n", + /* 40*/ "Contact rompu - rétablissement connexion.\n", + /* 41*/ "Porte de sécurité déjà déverrouillée.\n", + /* 42*/ "Expérience déjà interrompue.\n", + /* 43*/ "Etrange - l'expérience est déjà arrêtée!\n", + /* 44*/ "Quelqu'un a cassé mon PC!\n", + /* 45*/ "Obtenir Vue nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vue nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vue nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir récepteur.\n", + /* 56*/ "\n", + /* 57*/ "Récepteur\n", + /* 58*/ "Un récepteur\n", + /* 59*/ "Récepteur obtenu.\n", + /* 60*/ "Connexion établie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance déjà ouvert.\n", + /* 63*/ "ATTENTION - radioactivité détectée.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous êtes qui, bordel?\n", + /* 67*/ "Arrêtez l'expérience.\n", + /* 68*/ "Eteignez-moi tout ça. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'éteindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes expériences!\n", + /* 74*/ "Voilà. C'est éteint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "Sécurité!\n", + /* 77*/ "J'appelle la sécurité.\n", + /* 78*/ "Oups. Je me suis trompé...\n", + /* 79*/ "Comment s'est arrivé?\n", + /* 80*/ "C'est déjà éteint on dirait.\n", + /* 81*/ "Vous avez joué avec ça, ou quoi?\n", + /* 82*/ "On a tout cassé mon équipement!\n", + /* 83*/ "Qu'est-il arrivé à mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - expériences en cours.\n", + /* 86*/ "Objet expérimental 1 obtenu.\n", + /* 87*/ "Objet expérimental 2 obtenu.\n", + /* 88*/ "Objet expérimental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus protégé - Le Dr. Caroll \ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'énergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! La radioactivité est élevée. \nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secrètes ouvert.\n", + /* 99*/ "Ennemi détecté - coffre d'armes fermé.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, êtes-vous ici?\n", + /*102*/ "Tout...tout danger est écarté?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps à perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales à \nrévéler et vous devez me protéger.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_g.c b/src/files/lang/jap-final/ear_str_g.c new file mode 100644 index 000000000..0628e05ce --- /dev/null +++ b/src/files/lang/jap-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darüber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu übergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt\n", + /* 15*/ "Wartungsroboter aktiviert\n", + /* 16*/ "Wartungsroboter umprogrammiert\n", + /* 17*/ "Sicherheitstüren entriegelt\n", + /* 18*/ "Wartungszyklus aktiviert\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind beschäftigt.\n", + /* 21*/ "Wartungsroboter deaktiviert\n", + /* 22*/ "Wichtiges Objekt zerstört\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmöglich\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schießen - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unfälle passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstür wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als hätte jemand meinen PC beschädigt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtgerät.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtgerät\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtgerät aufgenommen\n", + /* 50*/ "Finden Sie den Prototypen.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Prototyp aufgenommen\n", + /* 55*/ "Finden sie das Data Uplink-Gerät.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Gerät\n", + /* 58*/ "Ein Data Uplink-Gerät\n", + /* 59*/ "Data Uplink-Gerät aufgenommen\n", + /* 60*/ "Verbindung hergestellt\n", + /* 61*/ "Wartungsklappe wurde geöffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unfälle können passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als wäre es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrüstung zerstört!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstört!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geöffnet\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndürfen keine Zeit verlieren! Wir müssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmüssen mich beschützen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_i.c b/src/files/lang/jap-final/ear_str_i.c new file mode 100644 index 000000000..69d4b19ce --- /dev/null +++ b/src/files/lang/jap-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuterò!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti darò una mano.\n", + /* 35*/ "Eh sì! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza già aperta\n", + /* 42*/ "Esperimento già interrotto\n", + /* 43*/ "Strano: l'esperimento è già chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione già aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento è interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamerò la sicurezza!\n", + /* 78*/ "Eh sì! Succede...\n", + /* 79*/ "Com'è potuto succedere?\n", + /* 80*/ "Sembra che sia già spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos'è successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo è il principale settore di sicurezza: \nil Dr. Caroll non può essere lontano.\n", + /* 95*/ "C'è qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti darà una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, è qui dentro?\n", + /*102*/ "Si può uscire? Via libera?\n", + /*103*/ "Sì, nessun problema!\n", + /*104*/ "Che... cosa... lei è...\n", + /*105*/ "Molto professionale, mia cara, ma non c'è \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/ear_str_s.c b/src/files/lang/jap-final/ear_str_s.c new file mode 100644 index 000000000..22dcf0736 --- /dev/null +++ b/src/files/lang/jap-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnología Experimental\n\nEl Dr. Caroll nos informó de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios además del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluación.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnológicos\n", + /* 13*/ "Holografiar isótopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operación no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crítico de la misión destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIÓN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "¿Quién eres tú?\n", + /* 26*/ "Bajas de científicos inaceptables.\n", + /* 27*/ "El terminal no está activo.\n", + /* 28*/ "Quitando energía a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudaré.\n", + /* 33*/ "¿Qué demonios estás haciendo en mi laboratorio?\n", + /* 34*/ "Déjame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - código de seguridad requerido.\n", + /* 37*/ "Buscando el código.\n", + /* 38*/ ".", + /* 39*/ "Código localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "¡Qué extraño: el experimento ya está detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obtén Visión Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "V. Nocturna\n", + /* 48*/ "Maletín de De Vries\n", + /* 49*/ "Visión Nocturna obtenida.\n", + /* 50*/ "Obtén el escudo tecnológico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnológico\n", + /* 53*/ "Maletín de De Vries\n", + /* 54*/ "Escudo tecnológico obtenido.\n", + /* 55*/ "Obtén Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "C. Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexión establecida.\n", + /* 61*/ "La rejilla de mantenimiento está abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya está abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "¿Qué estás haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "¿Quién demonios eres?\n", + /* 67*/ "Detén el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagaré.\n", + /* 71*/ "Por favor, no me haga daño.\n", + /* 72*/ "Déjeme ayudarle.\n", + /* 73*/ "¡Mi experimento!\n", + /* 74*/ "Ya, el experimento está detenido.\n", + /* 75*/ "¡Deja este área AHORA!\n", + /* 76*/ "¡Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "¿Cómo pudo ocurrir?\n", + /* 80*/ "Parece que ya está apagado.\n", + /* 81*/ "¿Has estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "¿Qué le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexión perdida: experimentos todavía activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obtén la Cámara Espía.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "Cámara Espía\n", + /* 92*/ "Una Cámara Espía\n", + /* 93*/ "Cámara Espía obtenida.\n", + /* 94*/ "Éste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo está usando mucha energía por aquí.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitirá entrar.\n", + /* 97*/ "¡Sal, Joanna! Los niveles son demasiado altos. \nUsa la Cámara Espía.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "¿Dr. Caroll?\n", + /*101*/ "Dr. Caroll, ¿está usted aquí?\n", + /*102*/ "Pero, ¿es seguro salir?\n", + /*103*/ "Sí, todo despejado.\n", + /*104*/ "¿Qu... qué... eres...?\n", + /*105*/ "¡Muy profesional, querida, pero no hay tiempo \nque perder! ¡Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo información vital, y tú \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldE.c b/src/files/lang/jap-final/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/jap-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldJ.c b/src/files/lang/jap-final/eldJ.c new file mode 100644 index 000000000..3e706153a --- /dev/null +++ b/src/files/lang/jap-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï怃ÿ…Öυׅ؂ω‚„€ß†€Ñ€Ï҃łׂ™Ï¾Èå〄±…ÚÏ…ÛàåãÌÅØ´É€Â‰‚„€ß†€Ñ€ÏҀՀڀϊ€ö¿à…ܻɀñ€Ê€Ý‚„‚Ïßãõ€€‡€Ö€Ë€÷€Ï€ã€ÏÒƒéæ…ÝÅÂãõ€Š€×€ß‚„€…€Ö€Ë€ú€øÍ„Õõã̻‚€¢¸ÃÊàσ–Æß¼Ï€ˆÍÒÃÍð€Â‰‚„€ß†€Ñ€Ï„²ÓØðƒµò»Ì»Î»æ€…„ÓÈÒŠ€×€ß‚„€…€Ö€Ë€ú€øÓ€ƒÍ…Ø€ó€áàæ…‚ƒÈÅÌ»âƒÿ…ÖÒ‚Ï»âÒð€Â¾ÈàÁ€ó€áàÏ‚ÉË¿âƒÏ€€Ö€Ë€÷€Ï€ã€ÏæƒÓƒ…ÎƒŠƒçÏ…ÞÅÉÜÒÍ„ªåãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|‚µ‚¶€‘€¾€Ü€ä€Ñ‚„¸ƒ…Ì‚ÙÇ\n\n€Õ€Ú€ÏŠ€ö¿àÒƒï…Ḃ´Éƒ €Æèς䂅Ӄÿ…Ö҇˃ÃÏ„‚„‹‚™¸‚¦´É€Â‚Ûà¿àÒ„ì„íÏßစ߅àÒ‡Ëπ܀ä€Ñ‚„ÉÊæ‚”ƒŽÄãÌ»âÃÍæå¿´É€Â‚µ‚¶ƒ‚Ú¸ƒÓƒ…ςڼÉÛÏÓ€Øí€ó€áฅ‹‚»Â̾Áƒ‡ƒƒæºâ€Â\n\n|‚µ‚¶€’€¾…â‚‚‚ȃɀۀ܀â€ð¸‚Ò„„Çß\n\nƒÿ…ÖÒ…ãƒÉ‚‚ƒÒóºâ…â‚‚‚ȃɀۀ܀â€ð怃ͅ؃ۂÄÅ̻λ€Â‰‚„€ß†€Ñ€Ïæƒÿ…ÖҀـϑ€Ì‚„€ß€Û€Ü€â€ðÏ€Ð€×€Ý€ÜÆâÒ¸„žèÉÛ€€Ö€Ë€÷€Ï€ã€Ï惗à€Û€Ë€Ê€ã†€Ò€ÏÅÉÜÒÍ„ªåãâ€ÂƒÉ‚‚æ‚Ò„„Æãõ€‚˜‡ÌÒ…®ÒŠ€Ðæ„×Áðä¼€Â\n\n|‚µ‚¶€“€¾€é€Ê€Ö€Ï€þ¸„«„¬Çß\n\nÃãØó܉‚„€ß†€Ñ€ÏÒ€é€Ê€Õ‚„ÉÊÓ€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€ë€Å€Ñ€øÏ€Ð€×€Ý€ÜÅ߼̀…”‚…Î…äÙ¸‚Ú´ÌÀɀƒÿ…Ö‚ŽÒ€©€œÍ€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Û€Ü€â€ðÓƒå…ÑËÎæ´Ì»âÒó€ÃÃóÎà€é€Ê€Ö€Ï€þÜ…å…æóºä¼€ÂÜÅ€ó€áàæÈÒ߼΂څçÏ‚ŸÉƒŠ„ÎÓ€‚§Óƒ»ó‚üƒëÅÎÁÌÓÎàλ€Â€©€œÏÓ‚ä‚…ÒƒÔƒƒÎ‰‚„€ßÜ„ÁÛàãÌ»âÒó€‚Î…èÅλ߼τ®ƒ´æƒ‡ƒƒð€Â\n\n|‚µ‚¶€”€¾‚—ƒ¸…Ûà½ä\n\n‰‚„€ß†€Ñ€Ï҃łׂ™¸…Ûà½âÃÍ󱄶Æãõ€€ó€áà҂ֻ悪óºâ¿¸ƒþÀ‚ŸÆÃÍæ‚¡‚¢ð伀€ó€áàÒ‚ƒ„±¸ƒµ‚û€……é…êÄÇ€…Ûà½âÒð€Â\n\n|‚µ‚¶€•€¾€Ö€Ë€÷€Ï€ã€Ï¸‚¨‚ŸÇß\n\n€Ö€Ë€÷€Ï€ã€ÏðÂæ€Š€×€ß‚„€…€Ö€Ë€ú€øÒƒç…ظ„Å´Ì»â€Â‰‚„€ß†€Ñ€ÏÜ»íãÓÃÒƒÎσµò»Ì€€Ö€Ë€÷€Ï€ã€ÏÏÈÒ„ì„í¸…ë¿Ç߼̀ºàÞâ‚݃и‚ù´ÌÁâð伀Ѐ׀߂„€…€Ö€Ë€ú€øÒƒæƒŠƒçæ‹€ùɃ“ƒÎó€€Ö€Ë€÷€Ï€ã€ÏÒƒéÓ„ßåãÌÅØ¼¿ÜÅãλÒð€Â\n\nEND\n", + /* 1*/ "€Ö€Ë€÷€Ï€ã€ÏÒƒÿ…Ö\n\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï怃ÿ…Öυׅ؂ω‚„€ß†€Ñ€Ï҃łׂ™Ï¾Èå〄±…ÚÏ…ÛàåãÌÅØ´É€Â‰‚„€ß†€Ñ€ÏҀՀڀϊ€ö¿à…ܻɀñ€Ê€Ý‚„‚Ïßãõ€€‡€Ö€Ë€÷€Ï€ã€ÏÒƒéæ…ÝÅÂãõ€Š€×€ß‚„€…€Ö€Ë€ú€øÍ„Õõã̻‚€¢¸ÃÊàσ–Æß¼Ï€ˆÍÒÃÍð€Â‰‚„€ß†€Ñ€Ï„²ÓØðƒµò»Ì»Î»æ€…„ÓÈÒŠ€×€ß‚„€…€Ö€Ë€ú€øÓ€ƒÍ…Ø€ó€áàæ…‚ƒÈÅÌ»âƒÿ…ÖÒ‚Ï»âÒð€Â¾ÈàÁ€ó€áàÏ‚ÉË¿âƒÏ€€Ö€Ë€÷€Ï€ã€ÏæƒÓƒ…ÎƒŠƒçÏ…ÞÅÉÜÒÍ„ªåãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|‚µ‚¶€‘€¾€Ô€ã€÷ÏδɄ³‚Ô¸‚¨½\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Ü€ß€Ê€ë怂§æ…å…æÏ„Ñ‚öóÀâ߼π€Ô€ã€÷Ïδ̻ɀÂſłۂÜÓƒ•ØÄω‚„€ß†€Ñ€ÏÒƒ‚™ÉÊςւ×Äãß¼ÍÅÌ»â€ÂÆèÏÈÒƒ‚™ôܸ‚ւׯâÒð€Âƒé€´\n\n|‚µ‚¶€’€¾€Ü€ä€Ñ‚„¸ƒ…Ì‚ÙÇ\n\n€Õ€Ú€ÏŠ€ö¿àÒƒï…Ḃ´Éƒ €Æèς䂅Ӄÿ…Ö҇˃ÃÏ„‚„‹‚™¸‚¦´É€Â‚Ûà¿àÒ„ì„íÏßစ߅àÒ‡Ëπ܀ä€Ñ‚„ÉÊæ‚”ƒŽÄãÌ»âÃÍæå¿´É€Â‚µ‚¶ƒ‚Ú¸ƒÓƒ…ςڼÉÛÏÓ€Øí€ó€áฅ‹‚»Â̾Áƒ‡ƒƒæºâ€Â\n\n|‚µ‚¶€“€¾…â‚‚‚ȃɀۀ܀â€ð¸‚Ò„„Çß\n\nƒÿ…ÖÒ…ãƒÉ‚‚ƒÒóºâ…â‚‚‚ȃɀۀ܀â€ð怃ͅ؃ۂÄÅ̻λ€Â‰‚„€ß†€Ñ€Ïæƒÿ…ÖҀـϑ€Ì‚„€ß€Û€Ü€â€ðÏ€Ð€×€Ý€ÜÆâÒ¸„žèÉÛ€€Ö€Ë€÷€Ï€ã€Ï惗à€Û€Ë€Ê€ã†€Ò€ÏÅÉÜÒÍ„ªåãâ€ÂƒÉ‚‚æ‚Ò„„Æãõ€‚˜‡ÌÒ…®ÒŠ€Ðæ„×Áðä¼€Â\n\n|‚µ‚¶€”€¾€Ö€Ë€÷€Ï€ã€Ï¸‚¨‚ŸÇß\n\n€Ö€Ë€÷€Ï€ã€ÏðÂæ€Š€×€ß‚„€…€Ö€Ë€ú€øÒƒç…ظ„Å´Ì»â€Â‰‚„€ß†€Ñ€ÏÜ»íãÓÃÒƒÎσµò»Ì€€Ö€Ë€÷€Ï€ã€ÏÏÈÒ„ì„í¸…ë¿Ç߼̀ºàÞâ‚݃и‚ù´ÌÁâð伀Ѐ׀߂„€…€Ö€Ë€ú€øÒƒæƒŠƒçæ‹€ùɃ“ƒÎó€€Ö€Ë€÷€Ï€ã€ÏÒƒéÓ„ßåãÌÅØ¼¿ÜÅãλÒð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n†€å€Ó€ø€…€Ö€Ë€÷€Ï€ã€Ï怃ÿ…Öυׅ؂ω‚„€ß†€Ñ€Ï҃łׂ™Ï¾Èå〄±…ÚÏ…ÛàåãÌÅØ´É€Â‰‚„€ß†€Ñ€ÏҀՀڀϊ€ö¿à…ܻɀñ€Ê€Ý‚„‚Ïßãõ€€‡€Ö€Ë€÷€Ï€ã€ÏÒƒéæ…ÝÅÂãõ€Š€×€ß‚„€…€Ö€Ë€ú€øÍ„Õõã̻‚€¢¸ÃÊàσ–Æß¼Ï€ˆÍÒÃÍð€Â‰‚„€ß†€Ñ€Ï„²ÓØðƒµò»Ì»Î»æ€…„ÓÈÒŠ€×€ß‚„€…€Ö€Ë€ú€øÓ€ƒÍ…Ø€ó€áàæ…‚ƒÈÅÌ»âƒÿ…ÖÒ‚Ï»âÒð€Â¾ÈàÁ€ó€áàÏ‚ÉË¿âƒÏ€€Ö€Ë€÷€Ï€ã€ÏæƒÓƒ…ÎƒŠƒçÏ…ÞÅÉÜÒÍ„ªåãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|‚µ‚¶€‘€¾€Ô€ã€÷ÏδɄ³‚Ô¸‚¨½\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Ü€ß€Ê€ë怂§æ…å…æÏ„Ñ‚öóÀâ߼π€Ô€ã€÷Ïδ̻ɀÂſłۂÜÓƒ•ØÄω‚„€ß†€Ñ€ÏÒƒ‚™ÉÊςւ×Äãß¼ÍÅÌ»â€ÂÆèÏÈÒƒ‚™ôܸ‚ւׯâÒð€Âƒé€´\n\n|‚µ‚¶€’€¾…â‚‚‚ȃɀۀ܀â€ð¸‚Ò„„Çß\n\nƒÿ…ÖÒ…ãƒÉ‚‚ƒÒóºâ…â‚‚‚ȃɀۀ܀â€ð怃ͅ؃ۂÄÅ̻λ€Â‰‚„€ß†€Ñ€Ïæƒÿ…ÖҀـϑ€Ì‚„€ß€Û€Ü€â€ðÏ€Ð€×€Ý€ÜÆâÒ¸„žèÉÛ€€Ö€Ë€÷€Ï€ã€Ï惗à€Û€Ë€Ê€ã†€Ò€ÏÅÉÜÒÍ„ªåãâ€ÂƒÉ‚‚æ‚Ò„„Æãõ€‚˜‡ÌÒ…®ÒŠ€Ðæ„×Áðä¼€Â\n\n|‚µ‚¶€“€¾€Ö€Ë€÷€Ï€ã€Ï¸‚¨‚ŸÇß\n\n€Ö€Ë€÷€Ï€ã€ÏðÂæ€Š€×€ß‚„€…€Ö€Ë€ú€øÒƒç…ظ„Å´Ì»â€Â‰‚„€ß†€Ñ€ÏÜ»íãÓÃÒƒÎσµò»Ì€€Ö€Ë€÷€Ï€ã€ÏÏÈÒ„ì„í¸…ë¿Ç߼̀ºàÞâ‚݃и‚ù´ÌÁâð伀Ѐ׀߂„€…€Ö€Ë€ú€øÒƒæƒŠƒçæ‹€ùɃ“ƒÎó€€Ö€Ë€÷€Ï€ã€ÏÒƒéÓ„ßåãÌÅØ¼¿ÜÅãλÒð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "€Ô€ã€÷ÏδɄ³‚Ô¸‚¨½\n", + /* 6*/ "€Ü€ä€Ñ‚„¸ƒ…Ì‚ÙÇ\n", + /* 7*/ "…â‚‚‚ȃɀۀ܀â€ð¸‚Ò„„Çß\n", + /* 8*/ "€é€Ê€Ö€Ï€þ¸„«„¬Çß\n", + /* 9*/ "€Ö€Ë€÷€Ï€ã€Ï¸‚¨‚ŸÇß\n", + /* 10*/ "‚—ƒ¸…Ûà½ä\n", + /* 11*/ "€Ô€ã€÷Ïδ̻Ʉ³‚Ôæ‚ÙÄãÉ\n", + /* 12*/ "€Ü€ä€Ñ‚„¸ƒ…Ì‚ÙÅÉ\n", + /* 13*/ "€Ô€ã€÷Ïδ̻Ʉ³‚Ôæƒ¼„ςޅ¨ÅÉ\n", + /* 14*/ "…î…ï€Û€Ü€â€ðæ‚ÂÄ\n", + /* 15*/ "…î…ï€Û€Ü€â€ðæ€Û€Ë€Ê€ã†€Ò€Ï\n", + /* 16*/ "‚ȃɀۀ܀â€ðæ‚ÂÄ\n", + /* 17*/ "‚ȃɀۀ܀â€ðæ€Û€Ë€Ê€ã†€Ò€Ï\n", + /* 18*/ "…â…—æ‚Âö‚ÄÀ„ØÛÉ\n", + /* 19*/ "…⅗愬ÛàãÉ\n", + /* 20*/ "ƒÿ…Öσɂ‚æ‚Ò„„ÅÉ\n", + /* 21*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 22*/ "‚€Í€Ð€Ï€ä€€é€Ê€Õ‚„æ„Ñ‚öÅÌ»â\n€ó€áàæ‰‚„€ß¸‚ö‚ÝÆâƒÏ‚ÙÆ¹ð€´\n", + /* 23*/ "€é€Ê€Õ‚„æ€é€Ê€Ö€Ï€þ¸‚ó‚ôÅÉ\n", + /* 24*/ "€é€Ê€Õ‚„¸‚ÙÅÉ\n", + /* 25*/ "€Ö€Ë€÷€Ï€ã€ÏÒ‚¨ƒË‚ó‚ô\n", + /* 26*/ "‚µ‚¶‚ñ‚ò€ƒ…ÌÒ‚µ‚¶¸‚ó‚ôÆâÃÍæóÀØÇ¹\n", + /* 27*/ "€ö€Ê’€ã€Ê’€ü€Ï\n", + /* 28*/ "€¬€ö€Ñ€ë€ø\n", + /* 29*/ "‚—ƒ¸…Ûà½É\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Š€Ð€Ö‚„\n", + /* 33*/ "Š€Ð€Ö‚„\n", + /* 34*/ "Š€Ð€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 35*/ "…â‚‚‚ȃɀۀ܀â€ð¸‚Ò„„Æãõ€\n‚˜‡ÌÖ҃ɂ‚æ…ð…ñÄãâ¹ð´ÉåÑ€Â\n", + /* 36*/ "ƒæÎÀµ€„³‚Ôæ‚ÙÄãÌÅØ¼å\n", + /* 37*/ "À´ÍÃÃÏ€ÜӅă¯ÄãÌ»âÒÑ€Â\n", + /* 38*/ "€Ö€Ë€÷€Ï€ã€Ï¸ƒËÂâƒÏ€€é€Ê€Õ‚„ôܸ\n…‹‚»ÂÎÁʵ€Â\n", + /* 39*/ "€‘€˜€”€–€ï€Ê€Û€Í€Ï…•…–€Â\n…ò…½€Õ€Ú€ÏŠ€ö¿àƒÉƒŸæº´É€Â\np‰‚„€ß†€Ñ€Ï„“Ó€\n€ÜÒƒÿ…ÖφãÅ‚ö´É€Â\np€ó€áàÓ€€Ü¸„±…Úσ›á€\nЀ׀߂„€…€Ö€Ë€ú€ø¸ƒƒ…ôÅÉ€Â\n", + /* 40*/ "Ѐ׀߂„€…€Ö€Ë€ú€øÓ€ÜÍ\n‚ƒ…öσÿ…ÖσæÉÓíóºâ€Â\np€Üæƒÿ…ÖÒôÿς۸…ÞÅ\nØð€€ó€áàσµò¿ãÌλ߼ð€Â\n", + /* 41*/ "‚£‚¤Ó€…ì…íσëìâ€ë€÷¸ÅÎæà\nƒÿ…ÖÖ„Ñ‚öÆâƒÛ‚‘¸Í´Ì»â€Â\npƒ•‚Ò€ƒôƒõÏÄàÄãÌ»âÒÓ\nƒ”ÒƒéðÂóÓλ€Ž\n", + /* 42*/ "€Ü€€Ø€üÓÎ»óÆ¿€À\n", + /* 43*/ "º¯€ÂſŊ€×€ß‚„€…€Ö€Ë€ú€øæ\n„ããƒöàãÌÅØ´É€Â\npܼ…«ÅÒ‚ý\n‚ÕÊÃɽàããõ€Ž\n", + /* 44*/ "€ÜÒÇ»óÓλå€Â\nܴ̓ŒÁƒâøÀð´É€Â\n", + /* 45*/ "ƒ—ƒ˜¸…÷Û⃇ƒƒÓλï€Â\nЀ׀߂„€…€Ö€Ë€ú€øÜ\npƒ¿àƒ”Ï‚‰‚õÅ̻ɀÂ\npſŀó€áà€ƒ”惵‚ûÅÌ»âÍ„ª»\n…ÕƒÔ΄ì„í¸Ž€öŽ€öŵøá¾´Éï€Â\npƒ•…½€€Û€Õ€Ò€ €•Œ€øó\n…µ…¶Ò‚¤…ÃæºâàÅ»€Â\npƒÅ…ù󃚻怃åÊÏ\nÈÃÖƒ†¿´ÌÁã€Â\n", + /* 46*/ "‚ô‚†€€Ü€ÂЀ׀߂„€…€Ö€Ë€ú€øÓ\n‚ª¿ƒûƒüË„ì„í¸‚Õ´Ì»ÉÒ€À\n", + /* 47*/ "º¯€ÜÊä¹ð€Â‚§æ€Û€Õ€Ï‚ÚÁ…™‚ó\nÈ㸅û‚ìÅ̻ü€ÂÈãßဎ\np€ó€áàÓ€‚ÛÒ„±…ޏƒ‘ƄƄÇàÅ»€Â\n‹€Ê€×€Ð€Ê’Ó‚º‚éÅ̾Áȼð€Â\npÄÌÍ€€ó€áàÍ‚üƒ½ÆâÉÛÏ\nÈäÈ䀇€ë€ù€ÏŠ€ˆÒƒËÂæƒ‡ƒƒ¿€Ž€Â\n", + /* 48*/ "ƒÛ„„Ú„Û€…â…—æ‚Ä»Ì»ØÆ\n", + /* 49*/ "‚µ‚¶‚ñ‚ò€‚—ƒæ…Ûà½àãØÇ¹óÅÉ\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eldP.c b/src/files/lang/jap-final/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/jap-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_f.c b/src/files/lang/jap-final/eld_str_f.c new file mode 100644 index 000000000..85e9682a3 --- /dev/null +++ b/src/files/lang/jap-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tenté de pirater les fichiers de l'Institut. Leur tâche sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle opération, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des données vitales pour l'Institut ne sont pas endommagés.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'équipe d'assaut de la dataDyne nous donnerait une idée de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'échapper.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 3: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la négociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'éolienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "Négociatrice abattue.\n", + /* 12*/ "Snipers éliminés.\n", + /* 13*/ "Négociatrice en sécurité.\n", + /* 14*/ "Refroidisseurs activés.\n", + /* 15*/ "Refroidisseurs désactivés.\n", + /* 16*/ "Générateurs activés.\n", + /* 17*/ "Générateurs désactivés.\n", + /* 18*/ "Eolienne réactivée.\n", + /* 19*/ "Eolienne désactivée.\n", + /* 20*/ "Courant rétabli dans la villa.\n", + /* 21*/ "Objet crucial détruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \nla villa! Arrêtez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copié les fichiers vitaux.\n", + /* 24*/ "Hackers éliminés.\n", + /* 25*/ "Carrington sauvé.\n", + /* 26*/ "Objectifs incomplets - mission échouée.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlevé.\n", + /* 30*/ "Obtenir clé de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Clé de porte\n", + /* 33*/ "Clé de porte\n", + /* 34*/ "Clé de porte obtenue.\n", + /* 35*/ "Si je réactive l'éolienne, je pourrai \nrétablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la \nnégociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arrêter les hackers avant de \nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46. \nNous avons reçu un appel de Cassandra de Vries hier soir. \nUne équipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa privée sur la côte, \net épargnera sa vie en échange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll étaient tous deux dans la villa \npour un 'arrangement'. Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arrivée des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la négociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous blessé?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \noù se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais dû \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confié qu'il s'attendait \nà une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succès, \nont discuté alors que je faisais semblant \nd'être inconscient. Ils ont mentionné une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous préparer.\n", + /* 46*/ "Aucun problème, monsieur. Le Dr. Caroll \na-t-il pu vous révéler des informations \nimportantes?\n", + /* 47*/ "En effet, très importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-être encore \nl'aider, même si ces sadiques lui enlèvent \nsa personnalité. Il veulent en garder \nune sauvegarde à l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Opération refusée - éolienne active.\n", + /* 49*/ "Mission échouée - garde ennemi non capturé.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_g.c b/src/files/lang/jap-final/eld_str_g.c new file mode 100644 index 000000000..be60715cc --- /dev/null +++ b/src/files/lang/jap-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es würde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen könnten. Sollte dies der Fall sein, müssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht beschädigt werden dürfen, da sonst das Institut Daten der Prioritätsstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tatsächlichen Vorhaben. Sie dürfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterhändlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschützen!\n", + /* 7*/ "Aktivieren Sie den Generator!\n", + /* 8*/ "Stoppen Sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine Wache gefangen!\n", + /* 11*/ "Die Unterhändlerin wurde verloren.\n", + /* 12*/ "Die Scharfschützen wurden eliminiert.\n", + /* 13*/ "Die Unterhändlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Kühlsysteme wurden aktiviert.\n", + /* 15*/ "Kühlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmühle wurde aktiviert.\n", + /* 19*/ "Windmühle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstört.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie müssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunfähig gemacht.\n", + /* 30*/ "Finden Sie den Schlüssel!\n", + /* 31*/ "Schlüssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlüssel\n", + /* 34*/ "Schlüssel aufgenommen\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterhändler \nist verloren!\n", + /* 37*/ "Hier müssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, müssen diese Hacker \ngestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Küste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfür die KI schonen werden.\n", + /* 40*/ "Unglücklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als hätte Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterhändler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nüberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne-\nSchläger haben aus mir herausgeprügelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten länger durchgehalten hätte...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich hätte schneller \nsein müssen.\n", + /* 45*/ "Machen Sie sich keine Vorwürfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich wäre \nbewusstlos und haben darüber gesprochen, wohin sie \nihn bringen. Sie erwähnten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch möchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige nützliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schlächter seine Persönlichkeit \nverändern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzulässige Operation - Windmühle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_i.c b/src/files/lang/jap-final/eld_str_i.c new file mode 100644 index 000000000..2655e5787 --- /dev/null +++ b/src/files/lang/jap-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto più facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poiché contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderlo: colpiscilo facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice è stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si è messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricità nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington è stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotrò portare l'elettricità \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c'è solo \nla mia vita in gioco!\n", + /* 42*/ "È ferito, signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in più...\n", + /* 44*/ "Non è colpa sua, signore! Avrei \ndovuto fare più in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si è lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia lì, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c'è problema, signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconterò ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. È proprio ora \ndi contattare alcuni amici perché si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/eld_str_s.c b/src/files/lang/jap-final/eld_str_s.c new file mode 100644 index 000000000..824e87b8b --- /dev/null +++ b/src/files/lang/jap-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos esporádicos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo será mucho más fácil si lo intentan desde la villa, debido a la conexión directa con el Instituto. Si se hace ese intento, necesitarás responder rápidamente. Asegúrate de que los terminales no son dañados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dará una idea de sus intenciones reales. Recuerda no matarles: déjalos inconscientes si puedes, ya que esto nos asegurará que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Tres: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador eólico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeración han sido activados.\n", + /* 15*/ "Los sistemas de refrigeración han sido desactivados.\n", + /* 16*/ "Los sistemas de energía han sido activados.\n", + /* 17*/ "Los sistemas de energía han sido desactivados.\n", + /* 18*/ "La torre eólica ha sido activada.\n", + /* 19*/ "La torre eólica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crítico de la misión destruido.\n", + /* 22*/ "¡Joanna! Grimshaw al habla. ¡Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misión fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle Fr\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obtén la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador eólico, \ntendremos energía en el sótano inferior.\n", + /* 36*/ "¡Tengo que ser rápida, o matarán \nal negociador!\n", + /* 37*/ "Aquí es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misión de la Agente Dark, 18:46 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetarán su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo interés'. Parece que Daniel \nencontró un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrón de dataDyne \nirrumpió allí.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dará una oportunidad de sorprender \nal escuadrón de dataDyne. Esta vez no sólo mi \nvida está en juego.\n", + /* 42*/ "Señor, ¿está herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nescondía al Dr. Caroll. Si hubiera aguantado \nunos minutos más...\n", + /* 44*/ "No fue su culpa, señor. Debí ser \nmás rápida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndejó caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunión \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que estés allí, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no será un problema, señor. Así que, \n¿el Dr. Caroll le dio alguna información \nútil para usted?\n", + /* 47*/ "Oh, claro que sí. Ciertamente lo hizo, y \nte haré un breve resumen cuando estés de \ncamino a Chicago. Todavía podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. Él cree que ellos \nguardarán una copia en un lugar seguro. Es \ncuestión de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operación denegada - el molino está activo.\n", + /* 49*/ "Misión no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunE.c b/src/files/lang/jap-final/gunE.c new file mode 100644 index 000000000..f1f4f9168 --- /dev/null +++ b/src/files/lang/jap-final/gunE.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", + /*256*/ "ECM Mine\n", + /*257*/ "Falcon 2\n", + /*258*/ "Suitcase\n", + /*259*/ "Skedar Bomb\n", + /*260*/ "Reprogrammer\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunJ.c b/src/files/lang/jap-final/gunJ.c new file mode 100644 index 000000000..493cdb3ce --- /dev/null +++ b/src/files/lang/jap-final/gunJ.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "‚ÙÅɆÇ", + /* 2*/ "‚ÙãÉ†Ç 1\n", + /* 3*/ "‚ÙãɆÇ", + /* 4*/ " ‚Ò", + /* 5*/ "ƒ—…‘†Ç", + /* 6*/ "ƒ„‚Ý\n", + /* 7*/ "€ë€Å€ø€Ù€Ï€’\n", + /* 8*/ "€ë€Å€ø€Ù€Ï€’ƒ‘…Ï\n", + /* 9*/ "€ë€Å€ø€Ù€Ï€’„¯…Œ\n", + /* 10*/ "MagSec4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357€î€þ€ä€ð\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "€ë€È€å€×€Ü\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Š€ö€€Ï\n", + /* 18*/ "€¬Š€ö€€Ï\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "€Ú€Ñ€×€ú€Ï\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "€Õ€÷€Ü€ã€§\n", + /* 24*/ "€ö€Ê’€ã€Ê’€ü€Ï\n", + /* 25*/ "€Û€Í€Ê€ã€ü€Ï\n", + /* 26*/ "€÷‚„‚„\n", + /* 27*/ "€«€ö€Ï€à€Ë\n", + /* 28*/ "‰‹€Ü€ß‚„\n", + /* 29*/ "€Ü€ù€Ñ€ó‚„\n", + /* 30*/ "€î€Ñ€Ð€Ï‚Ýá¶¼…¤\n", + /* 31*/ "€ë€Å‚„€Ú€Ñ€ã\n", + /* 32*/ "€¬€ö€Ñ€ë€ø\n", + /* 33*/ "€×€ú€Ü€Ò\n", + /* 34*/ "€ã€ö€Ï€Ö€ö€Ñ\n", + /* 35*/ "€Ù€Ï‹€Ê€ã€ä€Ñ€ë\n", + /* 36*/ "‚Ýá¶¼…¤\n", + /* 37*/ "€§€ð\n", + /* 38*/ "ƒ“„ù…£…¤\n", + /* 39*/ "€Ý€Ï€Ú‚„…£…¤\n", + /* 40*/ "€÷€ò‚„€ã…£…¤\n", + /* 41*/ "€ž€œ€¦€î€Ñ€Ï\n", + /* 42*/ "€ë€ö€Ê€Û€Ì‹€Ï\n", + /* 43*/ "€ô€å€ë€É‚„€ð\n", + /* 44*/ "€ú€Ø€Ê€ã\n", + /* 45*/ "€í‚„€ï€Ï€þ€ú€Ø€Ê€ã\n", + /* 46*/ "€ €ö€Ï€à€ËÒ…¤\n", + /* 47*/ "€ù‚„‚„\n", + /* 48*/ "‡\n", + /* 49*/ "€Ú€Ñ€Ö€Ê€×€ü€Ï\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT(9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "€â€Ü€ß‚„\n", + /* 59*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 60*/ "€Õ€ð€Ü€Ñ\n", + /* 61*/ "€¦.€Ü€Ñ\n", + /* 62*/ "€ð€Ü€Ñ\n", + /* 63*/ "Š€Ð€Ù‚„†\n", + /* 64*/ "…£†¨\n", + /* 65*/ "€±€Ü€Ö€Ë€Ï\n", + /* 66*/ "€Ô‚„€ã€Ô“\n", + /* 67*/ "€Ð€ß€Ê€Û€Ì\n", + /* 68*/ "€ô€å€ë€É‚„€ð\n", + /* 69*/ "IR€Ü€Ö€Ë€Ï\n", + /* 70*/ "€«€ã€ö€Ê€Õ\n", + /* 71*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /* 72*/ "ƒ—…‘†¨\n", + /* 73*/ "€Ü€Ñ€×€ú‚„€×\n", + /* 74*/ "‚„€Ü€ã‘€ø\n", + /* 75*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 76*/ "HR€Ü€Ù‚„’\n", + /* 77*/ "€Ÿ€’„¯…Œ\n", + /* 78*/ "€Ÿ€’ƒ‘…Ï\n", + /* 79*/ "€Ÿ€Ú€Ñ€ã\n", + /* 80*/ "€«€ö€Ï€à€Ë\n", + /* 81*/ "€Ý€Ï€Ú‚„€›\n", + /* 82*/ "€Ú€Ñ€Ö€Ê€×\n", + /* 83*/ "€ä€Ñ€ë\n", + /* 84*/ "DY357\n", + /* 85*/ "€Û€Ï€þ€ø€Û€Í€Ê€ã\n", + /* 86*/ "„ã…·\n", + /* 87*/ "ƒÞ‚ÿ„ã…·\n", + /* 88*/ "‚Ò…³„ã…·\n", + /* 89*/ "€Û€Ï€þ€ø€Û€Í€Ê€ã\n", + /* 90*/ "€ù‚„€ø€ü€Ï\n", + /* 91*/ "€ú€Ø€Ê€ã…¤\n", + /* 92*/ "€í‚„€ï€Ï€þ€ú€Ø€Ê€ã\n", + /* 93*/ "€ú€Ø€Ê€ã€Õ€ñ€ö\n", + /* 94*/ "€þ€÷€Ê’€Ð€ß€Ê€×\n", + /* 95*/ "…£…¤€Û€È€ø\n", + /* 96*/ "€ü€ÑŠ€Û€Í€Ê€ã\n", + /* 97*/ "€î€ü‚€Ïƒ……·\n", + /* 98*/ "€ €ö€Ï€à€Ë\n", + /* 99*/ "€Ò€É‚„€ø€Û€Í€Ê€ã\n", + /*100*/ "€Ï€à\n", + /*101*/ "‚̂͂†‚ø\n", + /*102*/ "€ú€Ê€×€Ô€Ï\n", + /*103*/ "ƒ¹ƒ“€Ü€Ù‚„’\n", + /*104*/ "€é‚„€ë€…€î€ü‚€Ï\n", + /*105*/ "†€ø€Û€Í€Ê€ã\n", + /*106*/ "€þ€ö€Ñ€Ï†‚„\n", + /*107*/ "‡‹†©‡Œ\n", + /*108*/ "€÷‚„€Ú€ø„®‚ö\n", + /*109*/ "€Ü€ö€Ê€Û€Ì\n", + /*110*/ "‚݆°é€ä€Ñ€ë\n", + /*111*/ "€Ú‚„€à\n", + /*112*/ "€Ö€ø\n", + /*113*/ "€Ü€ú‚„\n", + /*114*/ "€è‚„€î€ø\n", + /*115*/ "€é€Ñ€…€Ñ€Ï€×€ã\n", + /*116*/ "€Ü€Ñ€×€ú‚„€×\n", + /*117*/ "ƒ—‚ă‚à\n", + /*118*/ "€Ý€Ï€Ú‚„…£…¤\n", + /*119*/ "ƒôƒõƒ°‚È‚É\n", + /*120*/ "ƒ“„ù…£…¤\n", + /*121*/ "€Ý€Ï€Ú‚„…£…¤\n", + /*122*/ "€÷€ò‚„€ã…£…¤\n", + /*123*/ "‚Ã…£\n", + /*124*/ "€”†Û€ê€Ì‚„ƒ\n", + /*125*/ "€Ý€Ï€Ú‚„‘€Ï‚„€ø\n", + /*126*/ "ƒ“„ù…£‚È\n", + /*127*/ "€Ý€Ï€Ú‚„…£‚È\n", + /*128*/ "€“„ã…·\n", + /*129*/ "€à€Ë‚„‚€Ð€Ê’\n", + /*130*/ "ŵæÙ\n", + /*131*/ "…Á‡\n", + /*132*/ "€ù‚„‚„€ø€Ü\n", + /*133*/ "€Û€Í‚„€ã€ù€Ï‚\n", + /*134*/ "€Ñ€Ï€×€ã…£‚È\n", + /*135*/ "…†Ñ€ò‚„Š\n", + /*136*/ "€÷€ò‚„€ã€Ð€Ñ\n", + /*137*/ "€±…²€ò‚„Š\n", + /*138*/ "‡É‚–…²€ò‚„Š\n", + /*139*/ "ƒ‚„€ð\n", + /*140*/ "‚±‚²€ò‚„Š\n", + /*141*/ "€Ù€ç€×€Û€Í€Ï\n", + /*142*/ "€ß‚„€ÿ€Ê€ã€Ü€Ö€Ë€Ï\n", + /*143*/ "€ô€å€ë€É‚„€ð‚̓ó\n", + /*144*/ "…£…¤†ˆ‚•\n", + /*145*/ "„¯…Œ€Ü€Ù‚„’\n", + /*146*/ "€Ú€Ñ€ù€Ï€Ú‚„\n", + /*147*/ "†æ…˜€î€ü‚€Ï\n", + /*148*/ "€ù‚„‚„‚ë„¥\n", + /*149*/ "by ‰‚„€ß†€Ñ€Ï„“\n", + /*150*/ "by €Ö€Ë€÷€Ï€ã€Ï‚£‚¤\n", + /*151*/ "by €à€È€Ü€ö€Ê€×‚„\n", + /*152*/ "by €Ü€Ø†‚„\n", + /*153*/ "by €î€Ñ€Ð€Ï\n", + /*154*/ "by ‚€Í‚„€Ïƒ„“\n", + /*155*/ "€Ò€È”€ÏæÎ»ÍÀóÜ€‚§Ó€ß€ë΀ë€Å€Ñ€ß‚„ÏÎქâ€Â€Ï€à¸‚ù´Ìƒ³‚ݸ€è€Ê€×€Ð€Ò€ã€ÜÅÁӂ̂͂†‚øÅ̃³‚ÝҀҀȔ€Ïó‚í‚׸ÆâÒð€Â\n", + /*156*/ "… ‚¹óƒ¤…»Ò‚•Â £‚¤ó‚­ÜßÁ‚ùåãÌ»â‚àð€Â€ù‚„‚„‚ë„¥¸‚ù´Ìƒº‚‚Î…¤‡¸‚×ÊÃÚ¿€€þ€÷€Ê’€Ð€ß€Ê€×ó‚—¸€è€Ê€×†€Ò€ÏÄÇâÒð€Â\n", + /*157*/ "€ë€Å€ø€Ù€Ï€’Ò‚·…¦€ò‰€øó€€Ú€Ñ€ù€Ï€Ú‚„ƒÂ‚¢Íƒº‚‚΂΂ς‚¸†Õ‚ÔƒŽ½Ì»â€Â\n", + /*158*/ "€ë€Å€ø€Ù€Ï€’Ò‚·…¦€ò‰€øó€€’‡Ÿƒ‚„€ðҀ܀ä€Ñ‚„€Ü€Ù‚„’¸„Ë„ÀÅ€€ë€Å€ø€Ù€ÏÒ… ‚¹Î…·‚׸…ƃ˜Ï‚ȆŒóÀâ€Â\n", + /*159*/ "„¦„ƒˆÒ‘€Ü€ã€øÒ…¼ƒÛó€„õ†¶‡¡‚Õ„¦Ïß´Ì…ãÏ‚ùåãÌ»â€Â€Û€Ï’€øÎƒ‚„€ðƒÂ‚¢¸‚մ̾ဃ䀒‚Ì„½€ò‚„ŠÏ¾»ÌÓ€“„ã…·æóÀâ€Â\n", + /*160*/ "€Ü€Ø†‚„ϾÈåãɃ“Ó€Ã㸂ÝÏ‚öãâ€à€Ë€Ï€Ü¿ÜÅãλ€ÂƒÆÀ΀î€ü‚€Ï͇¢ÒË»É‚à‚«¸‚մɃ»âøÀ€é€ÏŠ€ü€Ïð€Âƒä€’‚Ì„½€ò‚„ŠÒ€à€Ë‚„‚€Ð€Ê’¸‚ù¼Í„ã…·ƒßÓ‡Ìæâæ€ƒº‚‚΀û‚„ó‚—σƆ̂׸„”½âóºä¼€Â\n", + /*161*/ "‰‚„€ß†€Ñ€ÏÒ€€²€“€•€—Ó€„„‘ó‚­Ü€û€ë€øÎ€é€ÏŠ€ü€Ïð€Âƒº‚‚΂΂ς‚ó…«‚…Òƒ°Ó‡®ƒÏÅ€‚—¸…å…æÏÕ´ÍõÅÌÁãâð伀¾ƒ¥ƒ´…”ƒˆÏ€Õ€Ü€ß€ð€ò‰€øÜƒÛàã̾င„ž„ŸÒ€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÓ€‚„€øŠ€ò‰€ø¸‚Õ´Ì»âÍ»¼€Ò€û€Úóºâ€Â\n", + /*162*/ "DY357-LXÓ„„ž„ŸÒ„ „¡„¢€€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏƒˆÒ€Õ€Ü€ß€ð€ò‰€øóºâ€Â‡ Å»€ß€Ñ€ü‚„€Ü€Ö€ÏÒ€þ€÷€Ê’Ï„å½Ì€ÃÒ€‚„€øŠ€ü€ÏÓ…¤Ò€Ü‘‚„Šæ‚­‚ÿÏÎâß¼‚à‚«Ï…É…Êæ„å½Ìºá€‚ƒ‚׃‡…‘󃳂ݸ‚ÙÆÃÍæóÀâ€Â\n", + /*163*/ "€î€Ñ€Ð€ÏҀ܀߀φ‚„ŠÎ€Ò€È”€Ïð€ÂÃÒ‘€Ü€ã€øÓ€€Û€Ï€þ€ø€Û€Í€Ê€ãÍ…£…¤€Û€È€ø¸€„÷ì€Ó€ç€ø€ý‚„‚ùƒˆ‡ªó‚È…·óÀâ€Â\n", + /*164*/ "‰‚„€ß†€Ñ€ÏÒŽ€Ü€ã€Ý€ö‚„Íδɀڀî€Û€Ï€ü€Ï€Â€“€’„ã‚ÈÒ€î€ü‚€ÏÏ„­ƒÿƒÂ‚¢¸„Ë„À€Â„—҃Ҁ߂„€ÿ€Ê€ã¸‡£„ÇÅ€€ú€Ê€×€Ô€ÏÆâÃÍæóÀâÒð€ÂÃ҃‚¢Ó‡¤ƒÏÒ…·‚ׂݸ€’€úҀ܀ä€Ñ‚„ςʽÌÅØ´É€Â„õ‡¥„ã…·‚ÿƒ¬€¾€™€€¦¤¡\n", + /*165*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤ó‚­ÜßÁ‚ùƒˆÄãÌ»â€ö€Ñ€ë€ø€Â„µ»…·ƒ«ÍƒÆÀ΀î€ü‚€Ï€Ú€Ñƒó€ƒÆ‚Ê‚ù»ƒ¾‚ÝÒß»€Ò€È”€Ïóºâ€Âƒä€’‚Ì„½€ò‚„ŠóÓ€ƒ‚„€ð€Ð€Ê’ÅÉØØó‚ÄÀØåâÃ͸‚¡‚¢ÏÅÌ»â€Â„õ‡¥„ã…·‚ÿƒ¬€¾€—€•€¦¤¡\n", + /*166*/ "Ê·´Í‚ÉÉÍÃ䀀܀߀φ‚„ŠÎ€ö€Ñ€ë€øóºâ怃䀒‚Ì„½€ò‚„Šæ‚ÂÄÄãâÍ€‚àÏßÁÏɀ݀πڂ„…£…¤Ö͂ʂ«Æâ€Â„õ‡¥„ã…·‚ÿƒ¬€¾€—€€¦¤¡\n", + /*167*/ "Š€ö€€Ï҂ʆÿ€ò‰€ø€Â€Ý€Ï€Ú‚„…£…¤Ò¿åáÏ€„àÄ΀ €ö€Ï€à€Ë¸„Ë„ÀÅ̻⃸ƒ¹ÏƒûƒüË‚àð€Â„õ‡¥„ã…·‚ÿƒ¬€¾€—€€¦¤¡\n", + /*168*/ "ØÉÅÌ܉‚„€ß†€Ñ€ÏÒ€é€Ñ€â€×€…€Ò€È”€Ïð€Â„àÄ„—Ò€î€ü‚€Ï¸‚ÕË‚ƒ‚ɇ¤ƒÏÒ€ö€Ñ€ë€øð怀û€ë€øÎ‚΂ς‚Ò׿πƒôƒõƒ°‚Ȃɀò‚„Џ‚̓ŽÅÌ»â€ÂÃÒ€ò‚„ŠÏÆâÍ€…£…¤ÝƒÂ‚àÎôÒƒôƒõƒ°¸„€„ÅÅÌÁãâ€Â\n", + /*169*/ "ƒÆƒÇƒÈÒ‰€Æ€ü‚„ŠƒˆÏ„ׂÈÄãɀڀр׀ú€ÏÓ€€â€úÎô¸…¤„•Æâ…øÏ‚®ãÉ‚¢‚‚¸‚ȆŒÆâ€Âƒ¸ƒ¹ƒ“ÏÓ„ã…·‚ÿƒ¬¸€’‡Ÿƒ‹‡ËÏÅ€€î€ü‚€Ï¸€‘†Û†Úàíó‚ù»ƒÝÉÆÍ»¼ÃÍÜóÀâ€Â„õ‡¥„ã…·‚ÿƒ¬€¾€™€€¦¤¡€‚­ƒÆ€’€€€¦¤¡\n", + /*170*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò…µ…¶€Ò€È”€Ï€Â¾ôäÁøÀ„ã…·‚ÿƒ¬ÍƒÆÀ΀î€ü‚€Ï¸‚Õ´Ì»â€Âƒä€’‚Ì„½€ò‚„ŠÓ€Ü€Ñ€×€ú‚„€×ó€€î€ü‚€Ï‚ŽÒ…¤†¨¸€Ó€ç€ø€ý‚„ÍÅÌ‚ùƒˆÆâ€Â„õ‡¥„ã…·‚ÿƒ¬€¾€‘€‘€€¦¤¡\n", + /*171*/ "ÃãÜ€î€Ñ€Ð€Ï†ˆ‚ðҀҀȔ€Ï€Â€Ü€ß€Ï†‚„ŠÎ„ã…·€ò‚„ŠÒ†˜Ï€€é€Ñ€…€Ñ€Ï€×€ã…¤æ‚ù½â€ò‚„Šæºâ€ÂÃãÓƒº»‚΂ς‚ó€…«‚…Òƒ°Îà‡®ƒÏÆâ€ÂÃÒ€ò‚„ŠÒ…þƒÎÓ„ã…·‚ÿƒ¬æ‡ÌæâÃÍÍ€€Û€Í€Ê€ãÒ€û‚„Òƒê‚Äó€ƒé‚…¥æ‡ÌæâÃÍð€Â„õ‡¥„ã…·‚ÿƒ¬€¾€™€€¦¤¡€ƒƒä€’‚Ì„½€ò‚„Š€¾€“€€¦¤¡€„\n", + /*172*/ "€ö€Ê’€ã€Ê’€©€œÏ‚ɽâ߼φˆ‚ðÄãÉ€Ú€î€Û€Ï€ü€Ï€Â€©€œÒ†ÿ¸ÅÌ»âÍÀÓ‚È…·æóÀλ€Âƒä€’‚Ì„½€ò‚„ŠóÓƒ—‚ă‚àÍÅÌ‚”ƒŽÆâÃÍæóÀâ€Â„õ‡¥„ã…·‚ÿƒ¬€¾€‘€€€¦¤¡\n", + /*173*/ "‰‚„€ß†€Ñ€ÏÒ‚‰ƒŽƒƒˆÏ„ׂÈÄãɀҀȔ€Ï€Â€™‚È‚öáÒ€î€ü‚€Ï¸‚ÕÊ€€Û€Ï€þ€ø€Û€Í€Ê€ã͆€ø€Û€Í€Ê€ã¸‚È…·ÆâÃÍæ‚Ÿƒâ€Â…Ñ‚¼‚‘ƒ†À€Â\n", + /*174*/ "‚ù»ÃÎÇℱÏÍ´ÌÓƒ¸ƒ¹Ïƒº‚‚΀ҀȔ€Ïðæ€‚ƒ‡‚ƒÑÏÓ‚ù»ÏÁ»€ÂſŃς¸ÏºÕãâ‚—¸‚ƒ…ËÆâÏÓû´ÉáҀҀȔ€Ï€Â‚­ƒÆÒ„ã…·‚ÿƒ¬Ó€‘€˜€€¦¤¡ÏÜÎâ€Â\n", + /*175*/ "ÍÌ܀쌂„΀ҀȔ€Ï€ÂƒÏƒ¹Ò€ú€Ø€Ê€ãÏ„å½Ì€€ß‚„€ÿ€Ê€ã¸€ú€Ê€×€Ô€ÏÅ̀킄€ï€Ï€þ€ú€Ø€Ê€ã¸‚È…·ÆâÃÍÜóÀâ€Â\n", + /*176*/ "‰‚„€ß†€Ñ€ÏÏߴ̆ˆ‚ðÄãÉ€…ŒÁØó…£…¤¸‚È…·Æâ€Û€Ü€â€ð€Âƒä€’‚Ì„½€ò‚„ŠÏÓ€ã€÷€Ê€Ö‚„΃‚¢æ‚̓ŽÄãÌ»â€Â‚È…·ÄãâÍ…¤Ó†§ÎôÏÁ´Ë»Ì€†Ç†Ûƒ Ï‚˜ƒúÏ‚ØÊÌ…£‚ÈÆâÒð€Â\n", + /*177*/ "€Ü€Ø†‚„Ó€‚—惻ã¾Òһ̻âÒ¸‚ÉâÒæƒÆ†±Àóºâ€ÂÈ㸄нầ܀ù€Ñ€ó‚„҃䀒‚Ì„½€ò‚„ŠÏ€€ú€Ø€Ê€ã€Õ€ñ€öƒÂ‚¢æË»Ì»âÒÏÓ„Áƒ¥æ»Á€Â€‡½ìÀ€ˆæ€ú€Ø€Ê€ã¿àƒ‡‚°óƒ‰éß¼ÍÆâÒ¸‚ÉâÒÓ€‚ÛàÏÍ´Ì‚­ƒÞÒÔÍÍÀÎÒð€Â\n", + /*178*/ "€ë€Å‚„€Ú€Ñ€ãÓ€î€Ñ€Ð€ÏÒ€±€Ü€Ö€Ë€ÏÍ€×͹ô‚ªó܇®ƒÏÆâ€ö€Ñ€ë€øÒ…‡…ˆæ„ÎåÄ´É€é€Ñ€÷€ÊŠ€…€Ò€È”€Ïð€ÂÃҀ܀ق„’Óƒ¨ƒéƒêƒë¸€Ú‚„€àÅÌ€ú€Ê€×€Ô€ÏóÀâæ€ÈÒ€Ú‚„€à€Ü‘‚„ŠÓƒ€Á€‚ÄÁ‚—ÏÓ˻̻Âλ€Â\n", + /*179*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤æƒÛ´ÉÃÒ‡ž„»Ó€ƒÞƒß‚¢Îƒ‚„€ð̓ނÿÎ…¤‡ó€‚­ƒÞҀ܀ä€Ñ‚„€ö€Ñ€ë€øÍ„Õõãâß¼ÏδɀÂŵæÚֻ͂æƒÓ„ÇÆâ€Â\n", + /*180*/ "ÃÒ€×€ú€Ü€ÒÓ€†¾»…·ƒ«Ò‘€Ü€ã€ø€Ú€ÑƒÒ€ò‰€øó€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Ó‚„‚€È€Ï€ãÒ€÷€Ü€ãς̓ŽÄãâ€Â‚–¿à‚ÉÌÜå¿àÎ»ß¼Ï…Ž„ÁóÀ€€•„·Ò‡Í‡‹†©‡Œ€ÈÅÌ‚ƒ‚׃‡…‘€Û€Í€Ê€ãÒ€‡€Ö€ø€ˆ¸…ÇËÃÍæóÀâ€Â\n", + /*181*/ "„ã…·‚¡‚¢Î‰‹€Ñ€Ü󀆃ƒ“ÏӀҀȔ€ÏÍÅÌ܃⃈óÀâæ€„·ƒÓ‡‹†©‡Œ„®…·ƒˆÒ€Ü’€ù‚„ÍÅ̆ˆ‚ðÄãÉÜÒð€Âƒä€’‚Ì„½€ò‚„ŠóÓ€‡‹†©‡Œ¸€ë€øó„®‚öŃ鸃ôƒõ΃؃ÙÏÆâæ€…Ñ‚¼‚‘óÅ¿‚ù½Î»€Â\n", + /*182*/ "ƒÆÀÁ̃ôƒõ΀ـϋ€Ê€ã€ä€Ñ€ë€Â†°éÉ€ä€Ñ€ëæ€ê€Ê€ãÆãõ€‚—Ó€–†Û̓ü´Ì»àãλÓíð€Â‰‚„€ß†€Ñ€ÏÏ„µÁ‚îÂËæãÌÀɀҀȔ€Ïóºâ€Â\n", + /*183*/ "‚­„ÙÒ‚Ýá¶¼…¤ó€€”†Û€ê€Ì‚„ƒ€ÜÅÁÓ‹€Ò€ÏŠÅÌ…£‚ÈÆâ€Ý€Ï€Ú‚„‘€Ï‚„€øÒ€’ËÒ€ò‚„Џ‚ù´Ì†°éâÃÍæóÀâ€Â\n", + /*184*/ "”‚„€ß€ø€ß€Ñ’Ò‚ƒß„ƒ…£…¤€Â€ê€Ê€ãÅɃ“ƒÎ󅣂ÈÄÇÌÜ»»Å€€Ý€Ï€Ú‚„…£…¤ÍÅ̃ˆ»âÃÍÜóÀâ€Â\n", + /*185*/ "†¾»ƒ“„ù€ê€Ì‚„ƒÒ˻Ʌ£…¤€Âƒä€’‚Ì„½€ò‚„ŠÏÓƒôƒõƒ°‚ȂɃ‚¢Ü‚̓ŽÅÌ»â€Â\n", + /*186*/ "‚ÄÀ¸…Á„ÅÅ̂Å£Äãâ…£…¤€Âƒä€’‚Ì„½€ò‚„ŠÏÓƒôƒõƒ°‚ȂɃ‚¢Ü‚̓ŽÅÌ»â€Â\n", + /*187*/ "€÷€ò€Ù€Ïó‚Ã…£óÀâ…£…¤€Â€÷€ò€Ù€ÏӃ䀒‚Ì„½€ò‚„Šó‚Ã‚ÄÆâ€Â\n", + /*188*/ "ƒÉ„ƒƒÂ„½¸‚±‚²Æâ‰‹€Ñ€Ü€Âƒ›áËÂàãɀۀ܀â€ðÏ€Ó€ö‚„¸‚¦áÃÚ€Â\n", + /*189*/ "€ù‚„‚„Ó€÷€Ü€ãς̓ŽÄã€ÈҀۀ̀ʀãÓƒ¸ƒ¹Ï… ‚¹óºâ€Â„µ†É„̃ˆÒ€ù‚„‚„€ø€Ü€ÜÅÁÓ‚ƒ„džɄÌÏ€Ó€ç€ø€ý‚„¸…ƒ‚ÄÇâ€Û€Í‚„€ã€ù€Ï‚¸‚È…·ÆâÃÍæóÀâ€Â\n", + /*190*/ "€Ù€Ï‹€Ê€ãƒˆÏ„ׂÈÄãɆ¨ó€†€„䄃χ¦‚߸„”½âÃÍÏßဃ“‚ýÒƒàãæƒ€Á…Áìàãâß¼ÏÎâ€Â\n", + /*191*/ "€ä€Ñ€ã€Ü€Ù‚„’†„Ò‡ž„»Ò‚­„Ù‹‚„‚€Í€Ïó€…†‰óÜÓ´Àá‚Ðáæ‚É½â€Âƒ¨ƒéƒêƒëÒºâÜÒÓ„€„ÅÄãâ€Â\n", + /*192*/ "ƒêƒÔ‚‚€â€×€è€ú‚‚„¸‚ù´É‚­Ü„àÄ»‡ž„»ó€…€†›Ò„‚Ú‰‹€Ñ€Ü€Â€ò‹€Ñ€ø€Õ€ñ€ö¸‚մ̾ကí€ú€þ€ö€ðƒ¡ƒ¢Ò…•…–æóÀâ€Â\n", + /*193*/ "ô¹Îƒ°ó܇§†ÑóÀ↾†É„̀܀ق„’€Â‚ÐáÒ‡š‡›¸€Û€Ï’€øÎ€Ñ€ñ‚„‚ÏÅÌ†ÓƒÍÆâ€Â\n", + /*194*/ "†¬…σʉ‚„€ß͇ɂ–…²€Ü€Ö€Ë€å€Ï€þ¸ƒˆ»É€Ü€Ù‚„’€Â‚ÐáÒ‡š‡›¸€×€÷€ÐÏ‚ÉÇâÍ„÷ƒ“Ï€€Ñ€ù€ý€Ì€ö‚„΃°¸„‚ŸÆâÃÍæóÀâ€ÂØÉ€€Ü€Ñ€×€ú‚„€×Îô¸‚ù´Ì…Þã̻ₗ¸€‚È‚ÉÆâÃÍÜóÀâ€Â\n", + /*195*/ "€Ó€Ñ€÷€Ð€ÏÒ€×€÷€Ü€ß€øæ‚ÕË€‡¬¸†Áéâ„­ƒß¸‚ù´É‰‹€Ñ€Ü€Âƒó̻⃳‚ÝÒØåáÏ€×€ú‚„€Ö€Ï€þ€…€ë€Æ‚„€øŠ¸ËÁáðÅ€‚Ðá¿à‚ɽÎÁÆâ€ÂÃÒ€ë€Æ‚„€øŠÓ‚ÄƒÑ€Ó€ç€ø€ý‚„¸‚îÂâÍ…þÁÎâÒó€‚ข״ÉáÆâÍ€ÅõàÁƒÜƒÝ惑½ÌÅØ¼€Â\n", + /*196*/ "„µ†É„̃ˆÒŒ‚€Ì€Ð€ø€Ü€Ö€Ë€ä‚„€Â†Õ„—Ò‚ö‚‚€Þ‚„€Ü¿àÒ„ì„í¸„Îƒ±Åɀрñ‚„‚拀т„φӆ—Äãâ€Âƒ‚„€ðƒÂ‚¢‚»À€Â\n", + /*197*/ "×͹ôƒ…€ß€Ñ’҃Ʉƒ‰‚„€ß¸…žÙƒ›âÃÍæóÀ€€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€é€Ê€Õ‚„Ö͉‚„€ß¸ƒÉ‚¦óÀâ€ÂÃ㸂ù´Ì‚£‚¤Ò€é€Ê€Õ‚„æ€ú‚„€Õ€ø€Û€Ü€â€ðÖ̓å…Ñ€Ð€×€Ý€ÜÆâÃÍÜóÀâ€Â\n", + /*198*/ "€û€ë€øÎ€ù‚„†‚„‰‹€Ñ€Ü€Âô¹ÎÜÒ܀߂„€ÿ€Ê€ãÏóÀâ€Â„±‚ý€€Ò€È”€Ï€€Ð€Ñ€â€ð€ƒŠƒçÎôæ„нàãâÍÃäð伿€Â\n", + /*199*/ "ƒÆƒÇƒÈ҃ͅØÒƒÖƒ×ƒØƒÙ€…ªƒöÒ† ‡–…•…–ÎôÒ„ì„íæ€÷€Ð€ø€ß€Ñ€ðÏ…ð…ñÄãâ€ÂƒÆƒÇƒÈæ…ŒÁÒ„±êÙÒοϻÌÜ€ƒ‡ƒƒÎ„ì„í¸„Â‚ŸóÀâ€Â\n", + /*200*/ "€Û€Ï’€øÎ…ƒÚ‚†…ž€Û€Ü€â€ð€Â‡¤ƒÏ҃Ʉƒ€ú€Ê€×Îà†Ç†Ûó‚Îâ€ÂÜÊä¹€Õ€ýҀ߀ђÏÜßâÒðæ€Ž\n", + /*201*/ "€î€Ñ€Ð€ÏÒ‚·¹ð† ‡–€â€×€è€ú‚‚„Ïß —‚Ă݅ˆ€Û€Ü€â€ð€Â„’‚ƒÒ„¤…úƒÎÓ€€î€Ñ€Ð€Ïƒ³‚ÝÏÅ¿‚ù½Î»Í»¼ÃÍóºâ€Â\n", + /*202*/ "„à‡¨Ò’€ö€Ü€à€Ê€×…£…¤€Â‚ʂ˂ ‚¢Î€ß€Ñ€î‚„æ‚̓ŽÄã̾ကâ€ë€ú€Ï€…€Ù‚„€â€Æ€Ï€þÄãÉ…£…¤æÓÛ‚ÁØãÌ»â€Â\n", + /*203*/ "‚§Üƒµò»Ì»âƒÏá€ÃãÓ‡‰‚ƒ‡£ƒ†ƒßÒ€ë€Ì‚„‚€Í€Ï…£…¤ð€Â…£‚Èæ‡Ìσ†»Ì‚ÃÃâ߼π݀ʀãÅÌÁã€ÂȼÆãõ€‰‚„€ß†€Ñ€ÏÒ‚˜‡Ì„ÿ…€…æ‚΂ÏÄ「€øƒ…‚‹æÁíãâÃÍóºä¼€Â\n", + /*204*/ "ƒÏƒ¤Ò€÷€ù‚„”€Ñ€Ï€ãÍÅ̃›á‚»Âàãâ„àÄ΂͂•€Â‚ƒ‡‚҃ɃÊχ©‚ÀÅÌ€…ŒÁÏ»â€Ó‚„‚€È€Ï€ãÍ‚£‚¤Ò…µ…¶€÷€Ï€×¸‚¹ƒüóÀâ€Â\n", + /*205*/ "ÃÒ‚Í‚•Ò‚Ž‚ÏÓ…µ…¶æ…ÞÄã̻‎ƒ—…£€Û€Ü€â€ð惩ÙÃØãÌ»âÒð€ÂØÉÃÒ‚Í‚•ÏÓ‡ª„ƒƒÏƒ¤Ò…‡…ˆæ‚ùåã̾ဃσ¤Òƒ¤…»ƒßÓƒ¸ƒ¹ÏƒÞ»€Â\n", + /*206*/ "‡ª„ƒƒÏƒ¤Ò…‡…ˆ¸ƒâƒˆÅ€ƒ›áËÂɀ߂„€ÿ€Ê€ãÒ… ‚¹Î…È‚•„ì„í¸…ð…ñÆâ€Â„÷ì…‡…ˆÓ€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò‚ȃ¤„½ÏÜ‚ùåãÌ»â€Â\n", + /*207*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂÒ€ë€ö€Ñ€ã’€ö€Ï̓σ¤…•…–€¾ßö…ƒÚ€Ö‚„€Â\n", + /*208*/ "‰‚„€ß†€Ñ€ÏÉÊæ“€ö‚€Ê€×€’¸‚ù´Ì‚Ú´É„‰„Š„€„‹Òƒ……•…–€Â€Þ€ä‚„€î€Ê‘€Ï€þ€‚˜…Ú‰‚„€ß€€Ó€Ñ€÷€Ð€ÏÏ‚Æâ‰‚„€ß€ƒù‚‹€Ú€Ï’€øÎô€Â\n", + /*209*/ "€š€¢€ƒŠ€×€ß‚„€…€Ö€Ë€ú€ø€„Ò€ƒ‹ƒÒ€‡„±…Ž€ˆ€Ù‚„ŠÒ‹€Ê€×€Ð€Ê’€Â€ñ€ò€÷‚„ƒ‘ƒö€…€Ð€ø€€÷ƒ€ð…Ʌʃ҃؃ـ„ÿ…€„—ƒÑÒÙ‚ùƒˆ¸…©‚¡€Â€ò€ö€øæƒÞ»„ª„и‚ÕË€Ù‚„ŠÏËÀƒôƒõ€Â‰‚„€ß†€Ñ€Ï€¢€¼€¬€¼€œ€¼€ž€¼€¨€¼€€’€“€½€–€½€’€“\n", + /*210*/ "€Ó€÷€Ð€•€‘ó€ã€ù€Ï€ãæ„ÿ…€Å̻Ƀ»äÅ»…¦…†‚àó€€ß‚„€ÿ€Ê€ãÏ‚Æâ…Á‚Ḇ҅³ÄÇÌÅØ¼€Â…ò„¸Ò„³‚ÔÓƒ•„¸Ò‚—€Ž\n", + /*211*/ "‚§Ò‡¤ƒÐÒ„›óÓλï€Â‚Ê‚ÍÅÉ»ÍÀÏ‚ù´ÌÁã€Â\n", + /*212*/ "€Ý€Ï€Ú‚„\n", + /*213*/ "ƒ“„ù\n", + /*214*/ "€÷€ò‚„€ã\n", + /*215*/ "ƒÂ‚à\n", + /*216*/ "…£…¤\n", + /*217*/ "€Ö€Ï€þ€ú€Ø€Ê€ã\n", + /*218*/ "‰‚„€ß€÷€Ï€Õ\n", + /*219*/ "ƒÆƒÇƒÈ€ò€å€ß‚„\n", + /*220*/ "€Ô‚„€ã€Ô“\n", + /*221*/ "€Ü€Ø†‚„€ð\n", + /*222*/ "ƒÏƒ¤€÷€Ï€Õ\n", + /*223*/ "‚ȃ¤„½\n", + /*224*/ "ƒÉ„ƒ€î‚„€Õ\n", + /*225*/ "€ë€ö€Ñ€ã’€ö€Ï\n", + /*226*/ "„ÿ…€‰‚„€ß\n", + /*227*/ "‹€Ê€×€Ð€Ê’‰‚„€ß\n", + /*228*/ "€Õ‚„Š€Ö‚„\n", + /*229*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /*230*/ "€ç€Ê€×€ù€Ü\n", + /*231*/ "€©€ò€å€ß‚„\n", + /*232*/ "‚„€Ü€ã\n", + /*233*/ "€±€Ü€Ö€Ë€Ï\n", + /*234*/ "HR€Ü€Ù‚„’\n", + /*235*/ "ƒÉ„ƒ€î‚„€Õ\n", + /*236*/ "€Õ€ð€Ü€Ñ҂ʆÿ‹‚„‚€Í€Ïó€€Õ€ñ€öƒÂ‚¢Ò¿åáσރ߂¢Î’€ö€Ü€à€Ê€×…£…¤¸‚̓ŽÅÌ»â€Â\n", + /*237*/ "€Õ€ð€Ü€Ñ҂ʆÿ‹‚„‚€Í€Ï󀆅ƒ¦¸€î€êÄÇ↨¸€ß‚„€ÿ€Ê€ãςȅ·Æâ€Â\n", + /*238*/ "€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÒ€ç€Ê€×€ù€Ü€ÂŒ€ø‚ŽÒ‚Œ„ù€Ó€÷€ÐπЀ׀݀ÜóÀâ€Ý€Ï€Ú‚„æË»Ì»â€ÂÈҀ݀πڂ„Ó€ç€Ê€×€ù€ÜÒƒçƒáƒî惨ÀÌ»â‚ýÒك‚¢Æâ€Â", + /*239*/ "€Õ€Ú€ÏŠ€ö€…‰€÷‚„ƒÒܼ€‘ËÒ€ç€Ê€×€ù€Ü€Â€ô‚„‚„€¢€€¾€%s€€Ü€û‚„Š€¾€%s\n", + /*240*/ "…äƒÛ€Û‚„€øŠ\n", + /*241*/ "€Û‚„€øŠÓ‚–¿àÒ‚í‚׸…Á„ÅÅ€‚ƒƒ“ƒÑ΀û‚„€ë€Æ‚„€øŠ¸ƒÛ႟ÆÃÍÏß´Ì€€ô‚„‚„¸‚¬â€Ð€Ñ€â€ðóºâ€Â€Û‚„€øŠÒ€Ó€ç€ø€ý‚„ÏÓ„ùáæºá€‚ƒ„ÇÒ†€ñ‚„‚¸‚îÂâ͂΅èÆâ€Â€Û‚„€øŠÓ‚մ̻ĽÆãõƒ—‚ăÑς̓óÄãâæ€ÃÒ…äƒÛ„»Ó€ØðƒÂ‚¢Å̻λ€Â\n", + /*242*/ "‚„€Ü€ã‘€ø\n", + /*243*/ "‰-€ß€÷€Ï€Õ\n", + /*244*/ "€ä€Ñ€ã€Ð€Ñ\n", + /*245*/ "Š€Ð€Ù‚„†\n", + /*246*/ "ƒ—…‘†¨\n", + /*247*/ "‡‹†©‡Œ\n", + /*248*/ "€Ô‚„€ã€Ô“\n", + /*249*/ "Backup Disk\n", + /*250*/ "‚Œ„›\n", + /*251*/ "€©€œ€ü€Ï\n", + /*252*/ "€÷€ò‚„€ã€›\n", + /*253*/ "€Û€Í€Ê€ã‚à\n", + /*254*/ "€¬€ö€Ñ€ë€ø\n", + /*255*/ "ƒ“„ù…£…¤\n", + /*256*/ "€ž€œ€¦\n", + /*257*/ "€Ÿ€’\n", + /*258*/ "€Ð€ß€Ê€Û€Ì\n", + /*259*/ "€Ü€Ø†‚„€›\n", + /*260*/ "‰-€ß€÷€Ï€Õ\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gunP.c b/src/files/lang/jap-final/gunP.c new file mode 100644 index 000000000..fcacb1fa3 --- /dev/null +++ b/src/files/lang/jap-final/gunP.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_f.c b/src/files/lang/jap-final/gun_str_f.c new file mode 100644 index 000000000..dd505e733 --- /dev/null +++ b/src/files/lang/jap-final/gun_str_f.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "L-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbalète\n", + /* 34*/ "Tranquil.\n", + /* 35*/ "Couteau combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retard.\n", + /* 39*/ "Mine prox.\n", + /* 40*/ "Mine télécom.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "Tête cherch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Spécial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vue nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Décodeur\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner X\n", + /* 66*/ "Medkit\n", + /* 67*/ "Mallette\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "Récepteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette ciblée\n", + /* 93*/ "Radioguidage\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guidés\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "Désarmer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Moitié chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer empoisonné\n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantanée\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "Déployer sentinelle\n", + /*118*/ "Autodestruct. prox.\n", + /*119*/ "Détecteur danger\n", + /*120*/ "Explosif retard.\n", + /*121*/ "Explosif prox.\n", + /*122*/ "Explosif télécom.\n", + /*123*/ "Détonation\n", + /*124*/ "Fusible 4 secs\n", + /*125*/ "Pinball prox.\n", + /*126*/ "Détonation retard.\n", + /*127*/ "Détonation prox.\n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir chargé\n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Impulsion\n", + /*133*/ "Courte portée\n", + /*134*/ "Détonation impact\n", + /*135*/ "Ampli lumière\n", + /*136*/ "Caméra mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue télescopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Même sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou désarmer un ennemi pour lui voler son arme.\n", + /*156*/ "Précis et fiable, c'est l'arme de base des opérations de l'Institut. La visée laser sert à localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 amélioré, bénéficiant d'un silencieux très utile.\n", + /*158*/ "Un Falcon 2 amélioré, bénéficiant d'un scope d'agrandissement x2 pour profiter d'une grande précision.\n", + /*159*/ "Un pistolet de l'armée dernier cri utilisé par les forces de l'ordre. Il possède un léger zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de prédilection de tout Skedar qui se respecte. Un grand chargeur et un canon rayé font de ce pistolet une arme de poing formidable, surtout grâce à son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles possèdent un facteur de pénétration élevé et repoussent la cible de leur poids et leur puissance. Des modèles customisés sont fabriqués pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en possède un plaqué or.\n", + /*162*/ "Le DY357-LX a été conçu à la demande du directeur de la NSA, Trent Easton. En plus de posséder une crosse en peau de tigre, ce pistolet d'or possède un canon rayé et utilise des balles à haute vélocité. C'est une arme meurtrière.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne très répandu. Cette arme automatique tire des rafales de calibre 32 et possède une capacité spéciale: verrouiller une cible. Elle fait du profane un tireur d'élite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une portée et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se déplacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un côté vicieux: lorsque le mode secondaire est activé, il devient une mine de proximité aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutôt qu'un explosif de proximité, il possède un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut possédant un chargeur plus petit et un impact puissant, qui peut détecter les explosifs, les armes sentinelles et autres pièges du même ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Conçu pour les gardes du corps, le Cyclone a été choisi par le service de sécurité du Président grâce à son efficacité en matière de répression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide à 2000 cpm.\n", + /*170*/ "L'arme secrète de l'Institut Carrington. Elle tire à une cadence phénoménale et contient énormément de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme dévastatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du génie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides pénétrant facilement les obstacles vous séparant d'une cible. Seul désavantage du mode secondaire: la cadence de tir est plus lente et la précision est diminuée par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transformé en mitrailleuse. Il peut être utilisé comme PC mais un contrôle minutieux révélera la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriquée par les services de sécurité. Un chargeur de 9 balles est couplé à un mode de tir simple ou double, faisant de cette arme un atout en combat rapproché.\n", + /*174*/ "Conçu pour être manié par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une véritable machine à déchiqueter, très efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais à tête chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue portée fabriqué par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projetée, la bombe se fixe sur un mur ou un plafond. Après quelques secondes, elle se détache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette commandée à distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les éléments solides. Le traceur peut repérer et verrouiller une forme de vie mais ne peut compenser les déplacements rapides d'un ennemi en pleine course.\n", + /*179*/ "Bénéficiant d'un puissant zoom et de balles haute vélocité, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure précision.\n", + /*180*/ "Cette arbalète est une arme de courte portée montée sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu'à 5 carreaux anesthésiants ou mortels.\n", + /*181*/ "Un appareil à tir rapide utilisé en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un sédatif. Les utilisateurs sont informés qu'une dose trop importante peut entraîner la mort.\n", + /*182*/ "Un très long couteau de combat. Il contient un réservoir de poison se brisant à l'impact et tuant la cible en moins de 6 secondes. Une arme signée dataDyne.\n", + /*183*/ "Une version améliorée de la grenade. Elle peut être utilisée avec un détonateur de 4 secondes ou en tant que bombe à effet de ricochet.\n", + /*184*/ "Une bombe à neutrons à faible zone d'effet. Elle peut se déclencher à l'impact ou être réglée en mode de proximité.\n", + /*185*/ "Une mine dotée d'un détonateur de courte durée. Elle possède un détecteur et évaluateur à activer en mode secondaire.\n", + /*186*/ "Une mine dotée d'un détonateur de proximité. Elle possède un détecteur de menace activé en mode secondaire.\n", + /*187*/ "Une mine à déclencher à distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil électronique de brouillage, capable d'engendrer une panne électrique sur n'importe quel système sur lequel il est fixé.\n", + /*189*/ "Un laser de poignet meurtrier et ultra précis. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentré à courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorbée, elle permet des réactions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumière ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en matière d'anti-gravité. Il possède un lien audio/vidéo avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte portée pouvant voir à travers toute matière - même le plomb - et produisant une représentation chromatique simplifiée des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modulé par ultrason pour donner une image claire des environs et la position des irrégularités de structure. Il peut aussi localiser les ennemis occultés ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacités d'un cristal extraterrestre pour créer une champs de réfraction de la lumière autour de l'utilisateur. Il ne peut fonctionner si une turbulence cinétique pénètre dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue portée. Le viseur affiche une image composite de deux sources d'entrée. Il possède aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles données et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'établir un lien direct entre eux et le terminal connecté.\n", + /*198*/ "Un pisteur puissant à paramétrer sur les humains, les armes, les objets, ou encore les emplacements géographiques.\n", + /*199*/ "Un scanner médical modifié contenant les dernières données de l'état de santé du Président ainsi qu'un résumé de tous les traitements administrés. Il peut monitorer les fonctions vitales du Président à distance même s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout électronique. Il ouvre les serrures codées en quelques secondes mais un système très élaboré lui prendra plus de temps.\n", + /*201*/ "Une merveille médicale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul défaut: il ne reconnaît et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive couplée à une horloge scellée et impossible à désamorcer, le tout revêtu de shrapnel en téflon.\n", + /*203*/ "Une bombe à fusion directionnelle à placer de telle façon que la charge est pointée vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard à fixer sur tout relais de communication qui permet d'imiter le signal officiel, établissant ainsi le lien entre l'Institut et l'agent même dans une zone de brouillage. Il fait partie intégrante du système de communication local ciblé.\n", + /*205*/ "Le fonctionnement de ce mouchard spécial est tenu secret. Le mécanisme d'auto-destruction couvre la majeure partie de l'appareil. Il est très probable qu'il soit un exemple de communication moléculaire quantique, ceci expliquant son efficacité.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra précises à l'armement en orbite, ceci minimisant les risques de dommages collatéraux. La même technologie est utilisée pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils détaillent les points de navigation et les codes de communication ainsi que les codes et fréquences de l'Air Force One. Les codes de cryptage y sont aussi donnés.\n", + /*208*/ "Toutes les données se rattachant aux recherches océaniques conduites par la dataDyne sur le navire détourné Pelagic II y figurent. Il contient le relevé sonar, les données géologiques, les données sur les artefacts extraterrestres, les échantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalité de l'IA Dr. Caroll avant conditionnement cérébral. A utiliser pour étude seulement ou projections théoriques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un mélange chimique altérant la perception de la cible. Le bien devient le mal, les méchants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 signé Trent Easton.\n", + /*211*/ "Un uniforme différent du vôtre. Portez-le et jouez la comédie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "Méga Roquette\n", + /*218*/ "Récepteur\n", + /*219*/ "Scan Prés.\n", + /*220*/ "Autochirur.\n", + /*221*/ "Bombe skedar\n", + /*222*/ "DérouteComms\n", + /*223*/ "Pisteur\n", + /*224*/ "Ampli cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette\n", + /*227*/ "Disque sauv.\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan X\n", + /*234*/ "ScanHorizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a été remplacé par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantané chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une clé-émetteur ouvrant les portes à courte portée, qui permet l'accès aux zones non-autorisées. Le modèle Mk3 ne fonctionne que si son propriétaire est en vie. Niveau de sécurité AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier protège son utilisateur en détectant les attaques et en générant momentanément un champ de force concentré pour repousser l'attaque. Le bouclier possède une quantité d'énergie limitée. Il ne protège pas l'utilisateur indéfiniment. Les boucliers sont généralement activés lorsqu'ils sont portés, bien que celui-ci soit un prototype inachevé.\n", + /*242*/ "Boosts combat\n", + /*243*/ "Récepteur\n", + /*244*/ "Vue nocturne\n", + /*245*/ "Décodeur\n", + /*246*/ "Pilule\n", + /*247*/ "Tranquil.\n", + /*248*/ "Autochirur.\n", + /*249*/ "Disque sauv.\n", + /*250*/ "Costume\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Mine télécom.\n", + /*253*/ "Fusil pompe\n", + /*254*/ "Fusil sniper\n", + /*255*/ "Mine retard.\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_g.c b/src/files/lang/jap-final/gun_str_g.c new file mode 100644 index 000000000..9ae509d20 --- /dev/null +++ b/src/files/lang/jap-final/gun_str_g.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Hits", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Betäubungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitzünder-Mine\n", + /* 39*/ "Annäherungs-Mine\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granaten\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Gerät\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tür-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Röntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FS XR-20\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "A-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuerstoß\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schüsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "Zielaufschaltung\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verstärkung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Selbstschussanlage\n", + /*118*/ "Annäherungsfunktion\n", + /*119*/ "Gefahrenmelder\n", + /*120*/ "verzögerte Explosion\n", + /*121*/ "Expl. bei Näherung\n", + /*122*/ "ferngez. Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zündung\n", + /*125*/ "Annäherungs-Pinball\n", + /*126*/ "Verzögerte Detonation\n", + /*127*/ "Expl. bei Näherung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerstöße\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Kontakt-Detonation\n", + /*135*/ "Restlichtverstärker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Röntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Störsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Kann angelegt werden\n", + /*144*/ "Sprengsätze müssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalldämpfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein würdiger Gegner. Setzen Sie Ihre Fäuste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschließend können Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schüsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zusätzlich über einen Schalldämpfer verfügt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Präzisions-Fernrohr noch zusätzlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Militär-Pistole, die hauptsächlich von Friedenstruppen eingesetzt wird. Die Waffe verfügt über eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab (Sekundär).\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein großes Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekundär-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verstärkt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die stärkste Handfeuerwaffe der Welt. Jede Kugel verfügt über einen hohen Penetrations-Faktor und schleudert das Ziel zurück. Modifizierte Modelle werden nur für spezielle Kunden angefertigt. NSA-Chef Trent Easton verfügt angeblich über eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell für Trent Easton angefertigt. Neben einem mit Tigerleder überzogenen Griff verfügt diese Pistole über einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfügt über ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schützen zu einem Profi. Vorausgesetzt natürlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazität aus. Die Sekundär-Funktion ermöglicht es dem Schützen, sich zu bewegen, während er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit Überraschungseffekt. Die Sekundär-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfügt die Waffe über einen kleinen Granat-Werfer. Hervorragend als Unterstützung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkörpern, Selbstschußanlagen und Ähnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell für Bodyguards. Die Cyclone wird auch von der Leibwache des Präsidenten eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhöht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfügt über eine hohe Feuerrate und ein großes Magazin. Die Sekundär-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit größter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schüsse möglich, die Deckungen durchbrechen können. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rückstoßes die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe hält auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfügt aber nur über ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe für die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gefährlichen Nahkampf-Instrument.\n", + /*174*/ "In den Händen von jemandem, der den starken Rückstoß ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend für Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und für sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekundärfunktion umhüllt die Granate mit einer klebrigen Substanz, welche die Haftung an Wänden und Decken ermöglicht. Einige Sekunden später fällt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverständlich, dass sie mit der Sekundär-Funktion ihres Raketenwerfers ein Geschoss fernsteuern können. So können sie sich an den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Röntgen-Scanner und einem Gewehr, das durch feste Objekte schießen kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-Fähigkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmögliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht größer als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Gründen der Geheimhaltung verringert werden. Die Munition umfasst bis zu fünf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr großes Kampfmesser. Es enthält eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzögerter Detonation als auch mit Annäherungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Annäherung erfolgen.\n", + /*185*/ "Eine Mine mit verzögerter Detonation. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezündet werden. Die Sekundär-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Störsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Störung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfügt über perfekte Präzision. Man kann mit ihm entweder Langstrecken-Energiestöße oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation für die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich höhere Reaktionsfähigkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Geräten, das nicht nur Restlicht verstärkt, um eine klarere Wahrnehmung der Umgebung zu ermöglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mögliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Gerät beinhaltet die kleinstmögliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung für spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularitäten zu untersuchen. Der Anwender erhält ein erstaunlich detailliertes Bild der Gegebenheiten. Außerdem durchdringt der Scanner auch jegliche Art von Tarnkappen-Technologie und andere optische Täuschungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Träger unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Störungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Geräts können nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchgerät, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenstände und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Präsidenten anzeigt. Es werden auch ältere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch über größere Entfernungen zu erfassen. Dies ist auch möglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlösser normalerweise innerhalb von Sekunden knackt. Selbstverständlich hängt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Dieses Instrument erstellt eine automatische Diagnose und führt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschützt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr böse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwüstet, und der Rest des Gebäudes stürzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Gerät angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurückverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen höchster Bedrängnis hat sich der Einsatz hervorragend bewährt. Ein unverzichtbares Zubehör für jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehütetes Geheimnis. Fest steht, dass der Selbstzerstörungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die phänomenale Verlässlichkeit des Geräts erklären würde.\n", + /*206*/ "Quantenmolekulare Technologie ermöglicht außerordentlich akkurate Zielerfassung für Orbitalwaffen. Dadurch wird der Schadensradius auf den nötigen Umfang beschränkt. \n", + /*207*/ "Detaillierte Flugpläne, Kommunikationscodes und Frequenzen für die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgeführt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persönlichkeit der künstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Löschung und cerebralen Restrukturierung durchgeführt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realitätswahrnehmung der Zielperson umkehrt. Gut wird zu Böse, Böse wird zu gut, Freund und Feind tauschen die Plätze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Präsidenten-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilgerät\n", + /*225*/ "Flugpläne\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlüsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "PräsidentScan\n", + /*232*/ "Adrenalin\n", + /*233*/ "R-Scanner\n", + /*234*/ "H-Scanner\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfügt über ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Annäherungs-Schlüsselkarte, um Sperrzonen betreten zu können. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schützt den Träger, indem er automatisch Gefahren erkennt und ein temporäres Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfügt über einen begrenzten Energievorrat. Die Schutzfunktion kann also nur über eine bestimmte Zeitspanne gewährleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als wäre dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ "Data Uplink\n", + /*244*/ "Nachtsicht\n", + /*245*/ "Decoder\n", + /*246*/ "Suizid-Pille\n", + /*247*/ "B-Gewehr\n", + /*248*/ "Medipack\n", + /*249*/ "Backup\n", + /*250*/ "Verkl.\n", + /*251*/ "Laptop\n", + /*252*/ "F-Mine\n", + /*253*/ "Schrotfl.\n", + /*254*/ "Sniper\n", + /*255*/ "Z-Mine\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_i.c b/src/files/lang/jap-final/gun_str_i.c new file mode 100644 index 000000000..a0f12d74c --- /dev/null +++ b/src/files/lang/jap-final/gun_str_i.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "A mani nude\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Fucile a pompa\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina orologeria\n", + /* 39*/ "Mina prossimità\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "TeleVista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a raffica\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a scoppio\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "Localizza-Obiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Pistola sentinella\n", + /*118*/ "Autodistr. di pross.\n", + /*119*/ "Rilevatore minaccia\n", + /*120*/ "Esplosivo a orol.\n", + /*121*/ "Esplosivo di pross.\n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di pross.\n", + /*126*/ "Detonazione a orol.\n", + /*127*/ "Detonazione di pross.\n", + /*128*/ "Triplice esplosione\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a impulsi\n", + /*133*/ "Laser a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa è l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. È dotata di zoom e di modalità secondaria di sparo a triplice esplosione.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne è la pistola più potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX è stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocità e forza.\n", + /*163*/ "È la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne è il fucile mitragliatore più venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocità media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalità secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocità media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalità secondaria diventa una mina di prossimità molto simile ad una pistola. Velocità media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimità è dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocità media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocità media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone è stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocità di fuoco può essere raddoppiata, scaricando il caricatore in un secondo. Velocità media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocità di fuoco fenomenale e straordinaria capacità del caricatore. La modalità secondaria è una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocità media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Può sparare colpi ordinari alla velocità degli altri fucili mitragliatori, ma anche scariche ad alta velocità in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalità secondaria sono la ridotta velocità di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocità media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando è chiuso, non può sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo può essere scoperto: il PC si avvia, ma la sua memoria è solo un quarto del normale.Velocità media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalità di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocità massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno più lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalità secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. È dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalità secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista è un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo può puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocità del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocità, quest'arma del Carrington Institute è uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra è un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si può ripiegare per nasconderla e può sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza può essere usato anche come arma benché progettato come spray dermico per la somministrazione di sedativi. È bene ricordare che scaricare l'intero serbatoio può avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Può essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimità.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Può essere fatta esplodere al momento dell'impatto o con esplosione di prossimità.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*186*/ "Una mina con miccia di prossimità. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione è la sua modalità secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui è applicato.\n", + /*189*/ "Il laser viene portato al polso ed è estremamente preciso. Può emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione più recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine più chiara dell'ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo è il più avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine più chiara dell'area circostante e identificare qualsiasi irregolarità strutturale. Inoltre può localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualità di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilità.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilità.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record più aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. È in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi è in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocità vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio è che funziona solo sui Maian; l'altro è la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sarà inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; è parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice è di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilità del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando così i danni collaterali. La stessa tecnologia è usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalità dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realtà percepita dall'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non è il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScannerPres\n", + /*232*/ "Booster\n", + /*233*/ "Scanner-X\n", + /*234*/ "Telescanner\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione è stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra è ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. È dotato di riserva energetica limitata, quindi può proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ "C. Dati\n", + /*244*/ "Vista Nott.\n", + /*245*/ "Decodif.\n", + /*246*/ "Compressa suicidio\n", + /*247*/ "Sedativo\n", + /*248*/ "AutoChirurgo\n", + /*249*/ "Disco Backup\n", + /*250*/ "Travest.\n", + /*251*/ "PistLaptop\n", + /*252*/ "Mina distanza\n", + /*253*/ "Fuc.Pompa\n", + /*254*/ "Fuc.Cecch.\n", + /*255*/ "Mina Orol.\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/jap-final/gun_str_s.c b/src/files/lang/jap-final/gun_str_s.c new file mode 100644 index 000000000..0e34e078e --- /dev/null +++ b/src/files/lang/jap-final/gun_str_s.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragón\n", + /* 18*/ "SuperDragón\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Ciclón\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Rifle Fr\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo Combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "Láser\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visión Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Escáner Rayos-X\n", + /* 66*/ "Paquete Médico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Escáner IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletín\n", + /* 72*/ "Píldora Suicidio\n", + /* 73*/ "Disp. Ocultación\n", + /* 74*/ "Reforzador\n", + /* 75*/ "Conector de Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo único\n", + /* 86*/ "Fuego rápido\n", + /* 87*/ "Fuego en ráfaga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartuchos\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puñetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Dispara Medio Cargador\n", + /*105*/ "Disparo Doble\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyección Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador Objetivos\n", + /*112*/ "Muerte Instantánea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultación\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestrucción Prox.\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonación\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonación temporal\n", + /*127*/ "Detonación Proximidad\n", + /*128*/ "Ráfaga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Rayo Bajo-Alcance\n", + /*134*/ "Detonación por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "Cámara Móvil\n", + /*137*/ "Visión de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescópica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensión de Cartucho\n", + /*148*/ "Mira Láser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puños para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira láser para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja añadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisión de la Falcon.\n", + /*159*/ "Una pistola de tecnología militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de ráfaga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es más que posible que lleve una de éstas. Un amplio cargador y su cañón rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la más poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetración increíble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante bañada en oro.\n", + /*162*/ "La DY357-LX fue diseñada especialmente para el director de la ANS, Trent Easton. Además de tener una atractiva empuñadura de genuina piel de tigre, este arma dorada incluye un cañón optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortífera.\n", + /*163*/ "El arma Maian estándar. Se trata de un arma flexible, una pistola que dispara proyectiles estándar o proyectiles explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un clásico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una característica especial: la habilidad de designar y fijar objetivos en la línea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 dpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamaño de su cargador hacen de ella un arma muy útil; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 dpm.\n", + /*166*/ "Un rifle de asalto estándar con un giro diabólico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 dpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragón: en vez de un explosivo de proximidad, es un pequeño lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 dpm.\n", + /*168*/ "Es otra pieza de alta tecnología de dataDyne. Ordinariamente es un rifle de asalto con un cargador más bien pequeño y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 dpm.\n", + /*169*/ "Diseñado para ser usado por guardaespaldas, el Ciclón ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede más que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 dpm. Descarga a 2000 dpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultación que funciona con la munición del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 dpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseño de armas de fuego Maian. Puede disparar tiros estándar tan rápido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar fácilmente en objetos para encontrar al objetivo al otro lado. La única desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisión sufre con la potencia del disparo. Ratio de disparo normal: 950 dpm., (f/s: 300 dpm).\n", + /*172*/ "Una ametralladora diseñada para parecer un PC portátil. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 dpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difícil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 dpm.\n", + /*175*/ "Es un arma incómoda. Dispara tanto un cohete estándar como un cohete más lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, ésta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes básico, así pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un híbrido Maian de un dispositivo de escáner de Rayos-X emparejado con un rifle que puede disparar a través de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan rápido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jamás hechos. Agáchate para una mayor precisión.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la muñeca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los más usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego rápido, que puede ser usado como arma en un caso de emergencia, pero que está diseñado en principio como un inyector dérmico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versión ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace añicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que sólo podía haber sido creada por dataDyne.\n", + /*183*/ "Es una versión mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un área muy pequeña. Puede detonar por impacto o ser fijada en detonación por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activación es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos eléctricos más comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El láser está montado en la muñeca y su precisión es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energía en corto alcance.\n", + /*190*/ "Son estimulantes genéticos diseñados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reacción'.\n", + /*191*/ "Lo último en la línea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicación más pequeña de la tecnología anti-gravedad, esto es lo último en dispositivos para fisgar. Tiene una conexión de audio/vídeo con función de grabación y la posibilidad interna de holografiar espectroscópicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a través de algunos materiales, incluso el acero, produciendo una representación cromática simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasónicos para ofrecer no sólo una imagen clara del área colindante, sino también la ubicación de irregularidades estructurales. También puede localizar enemigos que empleen tecnología de ocultación u otros desconciertos ópticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales alienígenas para crear un campo refractivo alrededor del portador. Funciona mientras sólo existan pequeñas perturbaciones kinéticas en el campo límite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un escáner binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. También cuenta con función zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexión directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de parámetros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un escáner médico modificado que contiene la más moderna información acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo esté en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrónicamente, habitualmente en cuestión de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla médica Maian puede auto-diagnosticar y realizar operaciones quirúrgicas sin necesidad de cortes. Una desventaja es que sólo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequeña carga de explosivo plástico, completada con un temporizador sellado, e incrustada dentro de una capa de teflón con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusión direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasará los laboratorios de investigación de dataDyne y causará que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeño 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la señal oficial, permitiendo la conexión entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propósitos, es parte de la localización de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestrucción. Se especula que esto es un ejemplo de comunicación molecular cuántica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnología de comunicación cuántica para proveer información precisa de los objetivos a las armas orbitales, ayudándolas a minimizar los daños colaterales. La misma tecnología es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los códigos de comunicación y frecuencias del Air Force One: incluso las claves actuales de encriptación.\n", + /*208*/ "Todos los datos relacionados con la investigación en el fondo oceánico desarrollada por dataDyne con el navío de operaciones submarinas Pelagic II. El contenido incluye mapeados de sónar, datos geológicos, datos del artefacto alienígena, muestras del casco, etc.\n", + /*209*/ "Es la última grabación del estado de personalidad de la inteligencia artificial, que se llama a sí misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene sólo proyecciones teóricas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cóctel químico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus papeles. Se trata de otra de las investigaciones 'oscuras' del Área 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Llévalo para pretender no ser tú.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Controlador\n", + /*223*/ "'Bicho' R.\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigación\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magnética\n", + /*229*/ "Maletín\n", + /*230*/ "Collar\n", + /*231*/ "Esc. Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la Cámara Espía el dispositivo de grabación ha sido reemplazado por un poderoso explosivo plástico.\n", + /*237*/ "Este modelo de la Cámara Espía usa una toxina nerviosa paralizadora para que los blancos queden en estado catatónico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Está equipado con una llave de proximidad que permite el acceso a áreas restringidas. El modelo Mk3 sólo funciona si el propietario está vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando momentáneamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energía limitada, así que sólo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ "C. Datos\n", + /*244*/ "V. Nocturna\n", + /*245*/ "Decodif.\n", + /*246*/ "P. Suicidio\n", + /*247*/ "Tranquiliz.\n", + /*248*/ "AutoCirujano\n", + /*249*/ "Disco S.\n", + /*250*/ "Disfraz\n", + /*251*/ "Arma PC\n", + /*252*/ "Mina Remota\n", + /*253*/ "Escopeta\n", + /*254*/ "Rifle Fr\n", + /*255*/ "Mina Tiempo\n", + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/impE.c b/src/files/lang/jap-final/impE.c similarity index 100% rename from src/files/lang/impE.c rename to src/files/lang/jap-final/impE.c diff --git a/src/files/lang/jap-final/impJ.c b/src/files/lang/jap-final/impJ.c new file mode 100644 index 000000000..d80a01f11 --- /dev/null +++ b/src/files/lang/jap-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚€Í€Ð€Ï€äàÏß´Ì€È҃ƻÎâ„…„¯Ý€Ý€ß€Ï€Û€Ê’¸‚΂ÏÄãɀ܀؆‚„ÉÊӀրˀ÷€Ï€ã€Ï‚£‚¤ÖÒ€÷Ž€Ï‚¸„ׄØÅ€ÈÒ„·„“Œ€øÖ̈́тíÅɀ‚ ƒ´¸Ë¿ã€„ž†·‚‹‚Œæ‡Ë‚ÝÁƒÂ‚¢Å̻λ‚€‚€Í€Ð€Ï€äÓ‚¬âÃÍÒóÀâÜÒ¸‚¹…„Ï‚¬àÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ó€áàÓ‚óƒ…ς䂅҂ ƒ´¸Ë»ÌÀÉ€Í€Ð€Ï€ä€´‚¬âÃÍæóÀℱ݃°Óƒ…Ì‚¬áÎæà€‚ž‚ŸÆâÒð€Âῖ©´ÌÜ€‚£‚¤Ó†üƒ°óÓÎÁ„±óƒ±áƒü´Ì»âÒð¿à€Ž€Â\n\n|‚µ‚¶€‘€¾ƒ—‚ă‚ฃۂÄÇß\n\n‚£‚¤Œ€øÒƒƒƒçƒƒƒçÏÓƒ—‚ÄƒÂ‚àæ†ˆ‚•ÄãÌ»â€ÂƒÍ…ØÈãÓƒÛ‚ÄÅ̻λÒó€€Ù€Ï€ã€ú‚„€ø€ç€ø¸…‰ƒÛÅ€ƒÛ‚ÄÄÇÌÁã€Â‚—¸‚׆ïÆâƒÆÀ΃ËÂÍÎâóºä¼€Â\n\n|‚µ‚¶€’€¾„±…Ú¸ƒËÂä\n\n„Ñ‚öƒîÒ‚ª„±¿Ó€‚£‚¤Ò€Ü€ß€Ê€ë¸„±…Úσ›´Ì»â€ÂóÀâð„ÜÁÒ„±…Ú¸ƒËÂâÒð€ÂŒ€øÒ‡ËÒ‚½Ü€à€È€Ê€×Æâ߼πÂ\n\n|‚µ‚¶€“€¾…„ƒ§‚ҀҀȔ€Ï¸‚ÒƒÕÇß\n\n€ë€É€Ü€ß‚„…サһⅷ‚ׇ„‡…ƒŠÏÓ…„ƒ§‚Ò€î€Û€Ï€ü€ÏÒ…äƒÛ„»æºâ€ÂÃãÓ‚—Ò‚ÝÏ„üÆåÂÏÓ»¿Î»€ÂÎîÎàÃҀҀȔ€ÏÏӀ܀р׀ú‚„€×Í„÷ìƒÛƒˆ¸ÆâƒÂ‚¢æºâ¿àð€ÂÃ㸂҃ÕÅ€‡…„‚‘€â€Ü€ã€ˆ¸‚Ú¼Òð€Â\n\n|‚µ‚¶€”€¾ƒÔƒƒƒÂ…¶¸†¢ƒ˜Çß\n\n€Ö€Ë€÷€Ï€ã€ÏÒ€Ô€ë€Æ€ÜÒ„™„ÊÏ€†Ç†‘ƒÏ‚Ûæ€î€Ñ€Ð€Ï†ØÒ…ƒÚƒÏƒ¤¸‚†…žÆâÉÛÏ‚ùƒˆÅɀЀø€€÷ƒ€ð悺‚éÄãÌ»â€ÂÃãÓ€‰‚„€ß†€Ñ€Ï„“݀܀؆‚„Ò‚ÝÏ„üâƒÏ€‚û‚üφ¢ƒ˜ÄãÎÂãõÎàλ€Â€ù‚„‚„¸‚ù´Ì„™„ÊÒŠ€Ð¸†õÀ„–âÒð€Â\n\n|‚µ‚¶€•€¾…£‚ȸ„žé\n\n€‡…£…¤‚Ȃɀ´€ˆ€‚䂅Ҁ݀πڂ„Ïßãõ€€ì€÷”‚„€ãϺâ€Ü€Ø†‚„ÒƒÁ‚ÚƒÂÏÓ…£…¤æ€Ý€Ê€ãÄãÌ»âß¼ð€ÂÃã¸„ð„¬ÆâÏÓ‰‚„€ß€÷€Ï€Õ¸‚ù´Ì€ƒÁ‚ÚƒÂҀـϑ€Ì‚„€ßπҀрø€Ü¸€Ñ€Ï€Ü€ã‚„€øÆâſλ€ÂȼÆãõƒÁ‚ÚƒÂӇ˃ÃÖ̓Áö‡Ëæ´Ì…£‚ÈÅ€‚£‚¤Ï„ý‚²¸„”½âÃÍÓλðä¼€Â\n\nEND\n", + /* 1*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€ø\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚€Í€Ð€Ï€äàÏß´Ì€È҃ƻÎâ„…„¯Ý€Ý€ß€Ï€Û€Ê’¸‚΂ÏÄãɀ܀؆‚„ÉÊӀրˀ÷€Ï€ã€Ï‚£‚¤ÖÒ€÷Ž€Ï‚¸„ׄØÅ€ÈÒ„·„“Œ€øÖ̈́тíÅɀ‚ ƒ´¸Ë¿ã€„ž†·‚‹‚Œæ‡Ë‚ÝÁƒÂ‚¢Å̻λ‚€‚€Í€Ð€Ï€äÓ‚¬âÃÍÒóÀâÜÒ¸‚¹…„Ï‚¬àÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ó€áàÓ‚óƒ…ς䂅҂ ƒ´¸Ë»ÌÀÉ€Í€Ð€Ï€ä€´‚¬âÃÍæóÀℱ݃°Óƒ…Ì‚¬áÎæà€‚ž‚ŸÆâÒð€Âῖ©´ÌÜ€‚£‚¤Ó†üƒ°óÓÎÁ„±óƒ±áƒü´Ì»âÒð¿à€Ž€Â\n\n|‚µ‚¶€‘€¾ƒ—‚ă‚ฃۂÄÇß\n\n‚£‚¤Œ€øÒƒƒƒçƒƒƒçÏÓƒ—‚ÄƒÂ‚àæ†ˆ‚•ÄãÌ»â€ÂƒÍ…ØÈãÓƒÛ‚ÄÅ̻λÒó€€Ù€Ï€ã€ú‚„€ø€ç€ø¸…‰ƒÛÅ€ƒÛ‚ÄÄÇÌÁã€Â‚—¸‚׆ïÆâƒÆÀ΃ËÂÍÎâóºä¼€Â\n\n|‚µ‚¶€’€¾„±…Ú¸ƒËÂä\n\n„Ñ‚öƒîÒ‚ª„±¿Ó€‚£‚¤Ò€Ü€ß€Ê€ë¸„±…Úσ›´Ì»â€ÂóÀâð„ÜÁÒ„±…Ú¸ƒËÂâÒð€ÂŒ€øÒ‡ËÒ‚½Ü€à€È€Ê€×Æâ߼πÂ\n\n|‚µ‚¶€“€¾…„ƒ§‚ҀҀȔ€Ï¸‚ÒƒÕÇß\n\n€ë€É€Ü€ß‚„…サһⅷ‚ׇ„‡…ƒŠÏÓ…„ƒ§‚Ò€î€Û€Ï€ü€ÏÒ…äƒÛ„»æºâ€ÂÃãÓ‚—Ò‚ÝÏ„üÆåÂÏÓ»¿Î»€ÂÎîÎàÃҀҀȔ€ÏÏӀ܀р׀ú‚„€×Í„÷ìƒÛƒˆ¸ÆâƒÂ‚¢æºâ¿àð€ÂÃ㸂҃ÕÅ€‡…„‚‘€â€Ü€ã€ˆ¸‚Ú¼Òð€Â\n\n|‚µ‚¶€”€¾…£‚ȸ„žé\n\n€‡…£…¤‚Ȃɀ´€ˆ€‚䂅Ҁ݀πڂ„Ïßãõ€€ì€÷”‚„€ãϺâ€Ü€Ø†‚„ÒƒÁ‚ÚƒÂÏÓ…£…¤æ€Ý€Ê€ãÄãÌ»âß¼ð€ÂÃã¸„ð„¬ÆâÏÓ‰‚„€ß€÷€Ï€Õ¸‚ù´Ì€ƒÁ‚ÚƒÂҀـϑ€Ì‚„€ßπҀрø€Ü¸€Ñ€Ï€Ü€ã‚„€øÆâſλ€ÂȼÆãõƒÁ‚ÚƒÂӇ˃ÃÖ̓Áö‡Ëæ´Ì…£‚ÈÅ€‚£‚¤Ï„ý‚²¸„”½âÃÍÓλðä¼€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚€Í€Ð€Ï€äàÏß´Ì€È҃ƻÎâ„…„¯Ý€Ý€ß€Ï€Û€Ê’¸‚΂ÏÄãɀ܀؆‚„ÉÊӀրˀ÷€Ï€ã€Ï‚£‚¤ÖÒ€÷Ž€Ï‚¸„ׄØÅ€ÈÒ„·„“Œ€øÖ̈́тíÅɀ‚ ƒ´¸Ë¿ã€„ž†·‚‹‚Œæ‡Ë‚ÝÁƒÂ‚¢Å̻λ‚€‚€Í€Ð€Ï€äÓ‚¬âÃÍÒóÀâÜÒ¸‚¹…„Ï‚¬àÑõÎàλ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n€ó€áàÓ‚óƒ…ς䂅҂ ƒ´¸Ë»ÌÀÉ€Í€Ð€Ï€ä€´‚¬âÃÍæóÀℱ݃°Óƒ…Ì‚¬áÎæà€‚ž‚ŸÆâÒð€Âῖ©´ÌÜ€‚£‚¤Ó†üƒ°óÓÎÁ„±óƒ±áƒü´Ì»âÒð¿à€Ž€Â\n\n|‚µ‚¶€‘€¾„±…Ú¸ƒËÂä\n\n„Ñ‚öƒîÒ‚ª„±¿Ó€‚£‚¤Ò€Ü€ß€Ê€ë¸„±…Úσ›´Ì»â€ÂóÀâð„ÜÁÒ„±…Ú¸ƒËÂâÒð€ÂŒ€øÒ‡ËÒ‚½Ü€à€È€Ê€×Æâ߼πÂ\n\n|‚µ‚¶€’€¾…„ƒ§‚ҀҀȔ€Ï¸‚ÒƒÕÇß\n\n€ë€É€Ü€ß‚„…サһⅷ‚ׇ„‡…ƒŠÏÓ…„ƒ§‚Ò€î€Û€Ï€ü€ÏÒ…äƒÛ„»æºâ€ÂÃãÓ‚—Ò‚ÝÏ„üÆåÂÏÓ»¿Î»€ÂÎîÎàÃҀҀȔ€ÏÏӀ܀р׀ú‚„€×Í„÷ìƒÛƒˆ¸ÆâƒÂ‚¢æºâ¿àð€ÂÃ㸂҃ÕÅ€‡…„‚‘€â€Ü€ã€ˆ¸‚Ú¼Òð€Â\n\n|‚µ‚¶€“€¾…£‚ȸ„žé\n\n€‡…£…¤‚Ȃɀ´€ˆ€‚䂅Ҁ݀πڂ„Ïßãõ€€ì€÷”‚„€ãϺâ€Ü€Ø†‚„ÒƒÁ‚ÚƒÂÏÓ…£…¤æ€Ý€Ê€ãÄãÌ»âß¼ð€ÂÃã¸„ð„¬ÆâÏÓ‰‚„€ß€÷€Ï€Õ¸‚ù´Ì€ƒÁ‚ÚƒÂҀـϑ€Ì‚„€ßπҀрø€Ü¸€Ñ€Ï€Ü€ã‚„€øÆâſλ€ÂȼÆãõƒÁ‚ÚƒÂӇ˃ÃÖ̓Áö‡Ëæ´Ì…£‚ÈÅ€‚£‚¤Ï„ý‚²¸„”½âÃÍÓλðä¼€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ƒ—‚ă‚ฃۂÄÇß\n", + /* 6*/ "„±…Ú¸ƒËÂä\n", + /* 7*/ "…„ƒ§‚ҀҀȔ€Ï¸‚ÒƒÕÇß\n", + /* 8*/ "ƒÔƒƒƒÂ…¶¸†¢ƒ˜Çß\n", + /* 9*/ "…£‚ȸ„žé\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "ƒÔƒƒƒÂ…¶\n", + /* 13*/ "ƒÔƒƒƒÂ…¶\n", + /* 14*/ "ƒÔƒƒƒÂ…¶¸‚ÝÏ‚öãÉ\n", + /* 15*/ "ƒ—‚ă‚ฃۂÄ\n", + /* 16*/ "„±…ÚÒ„ý‚²æ„ÜÆçØÆ\n", + /* 17*/ "„±…ÚÒ‚¨‚Ÿ‚ó‚ô\n", + /* 18*/ "ƒÔƒƒƒÂ…¶Ò†¢ƒ˜‚ó‚ô\n", + /* 19*/ "€Ö€Ë€÷€Ï€ã€Ïæ‚ÙÄãÉ\n", + /* 20*/ "‚€Í€Ð€Ï€ä€´€…Ž„Á„Êæ‚í‚׸‚îÂ̻‴\n", + /* 21*/ "ƒ—‚ă‚à€Û€Ü€â€ð¸‚Â‚Ã‚ÄÆâ¹ð€ƒé€´\n", + /* 22*/ "€Ü€Ø†‚„æ€Ü€ß€Ê€ë¸„±…Úσ›´Éï€Â\n", + /* 23*/ "€Ô€ë€Æ€ÜÏ‚ãá‚ÛฃËÂÌÁã\n", + /* 24*/ "€ó€áàÓ„ÙÅ»€Û‚„€øŠ…‡…ˆ¸\n‚ù´Ì»âß¼ð€Â\n", + /* 25*/ "€ë€É€Ü€ß‚„æ…äƒÛÅÌ»â„ÙÅ»‚Ì„½æ\nÀ´ÍƒûƒüËÓíð€Â\n", + /* 26*/ "ÅØ´É€Âƒ”Ò€Ô€ë€Æ€ÜÒ€Ž€ÂÜÅºãæ€ó€áàÒ‚ÝÏ€Ž€Â\n", + /* 27*/ "Æèςڴ̀ë€Å€Ñ€ø¸‚΂ÏÅÌÁã€Â\n", + /* 28*/ "ƒÆ‚ÊÎÃÍÏδÉó€áàæ…£…¤¸Å¿ÂÉß¼ð€Â\n", + /* 29*/ "ÆèÏ‚ÉËÂÌ€Œ€øÒ‚–Ïðƹð€´\n", + /* 30*/ "€Ð€×€Ý€Ü¸…©‚¡ÄãÌ»ØÇ¹€Â\n", + /* 31*/ "ƒ¸ƒ¹ƒˆ‚Ý‚Ä€Ü€Ñ€Ê€àæ‚Ã‚ÄÄãÉ\n", + /* 32*/ "ßÁÝ´É‚€Í€Ð€Ï€ä€´€Ã´ÊÜ×ù‚ó‚ôð€Ž€Â\n", + /* 33*/ "‚­ƒ Ò€Û€Ë€ã€øæ‚§¸‚ç´Ì»â€Âƒè¹ð€´\n", + /* 34*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΂͂•æ‚΂ÏÄãÉ\n", + /* 35*/ "ȼ€ƒ—‚ă‚àσËÂÌÜàåÎÀµ€Ž€Â\n", + /* 36*/ "Ããæ€ë€É€Ü€ß‚„æ…äƒÛÅ̻ɀó€áÑ€Â\n", + /* 37*/ "ƒµ¸ËÂÎ»Í€Ž€Â\nÙ¹ÎÒƒéæƒ”Ï¿¿´Ì»âå€Â\n", + /* 38*/ "\n", + /* 39*/ "…£…¤æ…£‚ÈÅÌÅØ´É€Ž\n", + /* 40*/ "‰‹€Ü€ß‚„¸‚ÝÏ‚öãÉ\n", + /* 41*/ "„¥ƒŽÓ»»¿€‚€Í€Ð€Ï€ä€À€€î€Ñ€Ð€ÏÒ\n‡È†Ó݃ƃǃȸ‚çÉÇâåÂÏÓ»¿¹€Â\n", + /* 42*/ "€Ó€€À€€“€ƒ˜ƒ¿àÃÃÏ»â倴\n‚çÉÇÌ»âÒÓ€€ÜÒ‚ÔóÅ·€´\n", + /* 43*/ "óÜ‚€Í€Ð€Ï€ä€€ì€Ð€Ü€ß€Ñ€øÜ\n€Ö€ñÎ»Í€Ž€ÃҀ܂„€áÜ€Ž\n", + /* 44*/ "€Ð€Ê€àÏÓ€€ø‚„€ð€ï€ö‚„æÎ»Í\n»»ÒÏÑ€Â€Š€ÖŠ€ÖÅØÆ€À\n", + /* 45*/ "º¯€Âƒ”Ó„µ†‘€ƒ•„¸ÒÃÒ„¸¸\ní´Í‚ç´Ì»ÉÒð€Â\np€î€Ñ€Ð€ÏÍ„±‡ÀÍÒ€ë€ù€ÏŠ€÷‚„΂Ÿ‚¤»€Â\npܼÆè€í€û€Ñ€ã€é€Ò€Üó\nÈãæƒÍ…„ÒÜÒÍÎ‎\n", + /* 46*/ "‚ªÒ…Ïð€´\n", + /* 47*/ "‚œ‚ð倎\n", + /* 48*/ "ÅËû€ó€áàÑ€Â\n€Ü€ß€Ê€ë¸ƒËÂÎÀµ€´\n", + /* 49*/ "ƒŒÁ‚Ÿ‚ÈÅÌ€´\nƒ”ӀЀãó»»¿à€´\n", + /* 50*/ "ٹ΀ƒ¼„óÑ€Ž\n", + /* 51*/ "‰‚„€ß€÷€Ï€Õ惇ƒƒóÆ\n", + /* 52*/ "…Ñ‚¾‚ó‚ô\n", + /* 53*/ "€Ý€Ö€Ì€÷€â€Æ€Û€Ü€â€ðπЀ׀݀܂\n", + /* 54*/ "€Ù€Ï‘€Ì‚„€ß€Ò€Ñ€ø€ÜҀрπ܀や€øƒ±„¶\n", + /* 55*/ "ƒÁ‚ÚƒÂҀӀς€Ï„Ø‚Ä\n", + /* 56*/ "‰‚„€ß€÷€Ï€ÕÒ…Ñ‚¾æ„–ãØÅÉ\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 60*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 61*/ "‰‚„€ß€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/impP.c b/src/files/lang/jap-final/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/jap-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_f.c b/src/files/lang/jap-final/imp_str_f.c new file mode 100644 index 000000000..a8f4a5f67 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ils dérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - Détruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilisé il y a des années pour briser les codes de communications Maian. Il doit être détruit à tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ils dérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 2: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 3: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver les défenses automatiques\n", + /* 6*/ "Libérer les otages\n", + /* 7*/ "Récupérer l'arme expérimentale\n", + /* 8*/ "Détruire les informations sensibles\n", + /* 9*/ "Désactiver la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activés.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauvés.\n", + /* 18*/ "Informations sensibles détruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqués. \n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages. \n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau système de bouclier. \n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut être utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont accès...\n", + /* 27*/ "Allez-y en premier, Joanna, et détruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont placé une bombe. \n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Accès refusé - Echec autorisation. \n", + /* 31*/ "Mesures d'urgences lancées.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La dernière navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial détruit.\n", + /* 35*/ "Les défenses automatiques vont m'aider.\n", + /* 36*/ "Voilà sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages \ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y \nprends mal.\n", + /* 39*/ "La bombe a explosé...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Prête, Joanna? Nous ne pouvons pas faire attendre la délégation maian. Le Président non plus, bien sûr.\n", + /* 42*/ "Moi prête? Pardon? Je suis prête depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Très. J'attends ce moment depuis si longtemps. L'Institut a été fondé pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons à la Maison Blanche... Le rêve deviendra alors réalité...\n", + /* 46*/ "D'où cela venait-il?\n", + /* 47*/ "Du rez-de-chaussée...\n", + /* 48*/ "Il y en a qui ne savent pas s'arrêter. Tout le monde doit évacuer!\n", + /* 49*/ "Mettez-vous à l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'espère juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le récepteur.\n", + /* 52*/ "Connexion établie.\n", + /* 53*/ "Dérivation systèmes de sécurité.\n", + /* 54*/ "Virus téléchargé avec succès.\n", + /* 55*/ "Moteurs du vaisseau activés.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir récepteur.\n", + /* 58*/ "\n", + /* 59*/ "Récepteur\n", + /* 60*/ "Un récepteur\n", + /* 61*/ "Récepteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_g.c b/src/files/lang/jap-final/imp_str_g.c new file mode 100644 index 000000000..6e6667657 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Büro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kom-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen können. Setzen Sie den Laser ein, um sich den Weg durch die Tür zu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigung!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die Versuchs-Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen\n", + /* 15*/ "Selbstschussanlage aktiviert\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstört.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Büros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nnützlich erweisen könnte.\n", + /* 26*/ "Verdammt! Mein Büro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge überstürzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Gebäude raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstört.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir können die Maianische Delegation nicht warten lassen. Den Präsidenten natürlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug auswählen...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervös?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Für diesen Zweck wurde das Institut gegründet. In wenigen Minuten sind wir im Weißen Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wüsste jemand nicht, wann er genug hat. Wir müssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie können später zurückkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das können.\n", + /* 51*/ "Sie benötigen das Data Uplink-Gerät.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Gerät!\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Gerät\n", + /* 60*/ "Ein Data Uplink-Gerät\n", + /* 61*/ "Data Uplink-Gerät aufgenommen\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_i.c b/src/files/lang/jap-final/imp_str_i.c new file mode 100644 index 000000000..d31e9e8dd --- /dev/null +++ b/src/files/lang/jap-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso usò per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanandosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington è stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione è disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuterà a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Così almeno non saprò se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba è esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero già pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com'è, Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "Sì, molto. Sono anni che aspetto questo momento. L'istituto è stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriverà il grande momento...\n", + /* 46*/ "Da dove viene questo rumore?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C'è qualcuno che non capisce quando è ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Può tornare a prendermi più tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus è stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/jap-final/imp_str_s.c b/src/files/lang/jap-final/imp_str_s.c new file mode 100644 index 000000000..ec9b06cd2 --- /dev/null +++ b/src/files/lang/jap-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Destruir Información Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que usó para descifrar los códigos de comunicación Maian hace unos años. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el láser para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas automáticas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir información sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obtén información sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Información sensible\n", + /* 13*/ "Información sensible\n", + /* 14*/ "Información sensible obtenida.\n", + /* 15*/ "Arma automática activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La información sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y sálvalos.\n", + /* 24*/ "Están usando una nueva forma de tecnología de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodría ser útil.\n", + /* 26*/ "Maldición. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve allí primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encuéntrala y sácala del edificio.\n", + /* 30*/ "Acceso denegado: autorización fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La última nave te está esperando. Deprisa.\n", + /* 34*/ "Objeto crítico de la misión destruido.\n", + /* 35*/ "Las autodefensas me ayudarán de veras.\n", + /* 36*/ "Así que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabré si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "¿Preparada, Joanna? No podemos hacer esperar a la delegación Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "¿Preparada? ¿Qué quieres decir? Llevo preparada desde hace media hora. \n¡Tú nos has entretenido!\n", + /* 43*/ "Pero ya sabes cómo va, Joanna... Tengo que estar seguro de que mi pelo está bien, y también estaba el traje...\n", + /* 44*/ "Deberían alejarte de los espejos. ¿Nervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes años. El contacto, amigable, entre Humanos y Maian es para lo que se fundó el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrirá finalmente...\n", + /* 46*/ "¿De dónde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cuándo retirarse. ¡Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "¡Largo! Les mantendré alejados... ¡Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexión.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con éxito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexión con la nave se ha cortado.\n", + /* 57*/ "Obtén el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "C. Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/junE.c b/src/files/lang/jap-final/junE.c similarity index 100% rename from src/files/lang/junE.c rename to src/files/lang/jap-final/junE.c diff --git a/src/files/lang/junJ.c b/src/files/lang/jap-final/junJ.c similarity index 100% rename from src/files/lang/junJ.c rename to src/files/lang/jap-final/junJ.c diff --git a/src/files/lang/junP.c b/src/files/lang/jap-final/junP.c similarity index 100% rename from src/files/lang/junP.c rename to src/files/lang/jap-final/junP.c diff --git a/src/files/lang/jun_str_f.c b/src/files/lang/jap-final/jun_str_f.c similarity index 100% rename from src/files/lang/jun_str_f.c rename to src/files/lang/jap-final/jun_str_f.c diff --git a/src/files/lang/jun_str_g.c b/src/files/lang/jap-final/jun_str_g.c similarity index 100% rename from src/files/lang/jun_str_g.c rename to src/files/lang/jap-final/jun_str_g.c diff --git a/src/files/lang/jun_str_i.c b/src/files/lang/jap-final/jun_str_i.c similarity index 100% rename from src/files/lang/jun_str_i.c rename to src/files/lang/jap-final/jun_str_i.c diff --git a/src/files/lang/jun_str_s.c b/src/files/lang/jap-final/jun_str_s.c similarity index 100% rename from src/files/lang/jun_str_s.c rename to src/files/lang/jap-final/jun_str_s.c diff --git a/src/files/lang/lamE.c b/src/files/lang/jap-final/lamE.c similarity index 100% rename from src/files/lang/lamE.c rename to src/files/lang/jap-final/lamE.c diff --git a/src/files/lang/lamJ.c b/src/files/lang/jap-final/lamJ.c similarity index 100% rename from src/files/lang/lamJ.c rename to src/files/lang/jap-final/lamJ.c diff --git a/src/files/lang/lamP.c b/src/files/lang/jap-final/lamP.c similarity index 100% rename from src/files/lang/lamP.c rename to src/files/lang/jap-final/lamP.c diff --git a/src/files/lang/lam_str_f.c b/src/files/lang/jap-final/lam_str_f.c similarity index 100% rename from src/files/lang/lam_str_f.c rename to src/files/lang/jap-final/lam_str_f.c diff --git a/src/files/lang/lam_str_g.c b/src/files/lang/jap-final/lam_str_g.c similarity index 100% rename from src/files/lang/lam_str_g.c rename to src/files/lang/jap-final/lam_str_g.c diff --git a/src/files/lang/lam_str_i.c b/src/files/lang/jap-final/lam_str_i.c similarity index 100% rename from src/files/lang/lam_str_i.c rename to src/files/lang/jap-final/lam_str_i.c diff --git a/src/files/lang/lam_str_s.c b/src/files/lang/jap-final/lam_str_s.c similarity index 100% rename from src/files/lang/lam_str_s.c rename to src/files/lang/jap-final/lam_str_s.c diff --git a/src/files/lang/leeE.c b/src/files/lang/jap-final/leeE.c similarity index 100% rename from src/files/lang/leeE.c rename to src/files/lang/jap-final/leeE.c diff --git a/src/files/lang/jap-final/leeJ.c b/src/files/lang/jap-final/leeJ.c new file mode 100644 index 000000000..208097f5c --- /dev/null +++ b/src/files/lang/jap-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€øó҂턞҂€ƒµ¸‚ñ´É‚€Í€Ð€Ï€äÓ€„—¸‚áØÅɃ“€€Ü€Ø†‚„Ò†ê†ëƒùÒ‚ó…ÛàåãÒ‚«Íδ̻âÃÍσµò»É€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n‚€Í€Ð€Ï€ä€´\n€ï‚„Ó€ô‚„Ò‚À´Ì»â†ê†ëƒù¸ƒ ä¿à†Ä´Ì»â€´€í€û€Ñ€ã€é€Ò€Üó€ô‚„Éʸ‚ç´Ì»É€’„±Ò€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„Ü‚ƒ…öιð€Â€ï‚„ÉÊæÈÊàÒƒùÏ‚Àá‚ÁÚÒ¸‚Ý„ä´Ì߀ÂÈÒ†ê†ëƒù¸‚À´ƒ›ä¼€Â\n\n|‚µ‚¶€‘€¾ƒÃ‚ý€Û‚„€øŠ‚Œ†·‚Í‚•¸‚΂Ï\n\n†ê†ëƒùӃÂý€Û‚„€øŠó‚¬àã̾ဂ–‚¿àÒ„Ñ‚ö憯…¨óºâ€ÂƒÃ‚ý€Û‚„€øŠÒ‚Œ†·‚Í‚•¸‚΂ÏÅ€€Ó€øŒ€ÜÉÊæ†ê†ëƒùÏŠ€Ê€Ö€Ï€þÅ€‚Àá‚ÁÛâß¼ÏÇÑõÎàλ€Â\n\n|‚µ‚¶€’€¾…Ž„Á„ÊÒ€é€Ê€à¸„×Â\n\nŠ€Ê€Ö€Ï€þ€Û€Ü€â€ðӃσ¹Îàƒ—‚Äó€Ù€Ï€ã€ú‚„€øÄãÌ»âÒðæ€ƒ•Ó€ñ€Ñ€Ï€÷€Ê‚¿àÒƒ¯„¬‚Œ†·æºá€ƒÂ‚¢Å̻λ߼ð€Â…Ž„Á„ʸ‚ɇÌäÆƒŠƒçϺâ€ú‚„€Õ€ø€…€Ù€Ï€ã€ú‚„€ø¸ƒâƒˆÅÌ€é€Ê€à¸„×ÁÒð€ÂȼÆãõ€Ó€øŒ€ÜÉÊÓ†ê†ëƒùÏŠ€Ê€Ö€Ï€þÅ‚Àá‚ÁÚÃÍæóÀâðä¼€Â\n\n|‚µ‚¶€“€¾€äŒ€Û€Ü€â€ðπЀ׀݀ÜÇß\n\n€Ó€øŒ€ÜÍ‚¿Ï€€Ü€ß‚„€î€Ê’Òºâ€äŒ€ø‚„€ð¸‚Ȃɀ½‚·‚öÇ߀ÂȼÆãõ‚ÛӀ䌀ۀ܀â€ðπЀ׀݀ÜÅ€ÃÒƒùæôÃσ†¿´Ì»â¿¸€à€È€Ê€×óÀâóºä¼€ÂØÉ€Ü€ß‚„€î€Ê’ÏӀ܀؆‚„Ò„·„邘܆—ÄãâÓíð€ÂÈÒ„ì„íæºãõ€€î€Ñ€Ð€Ï„¦æ€Ü€Ø†‚„ÖÒ…Ÿ‚í‚׸ſÂâÃÍæóÀâðä¼€Â\n\n|‚µ‚¶€”€¾‚Ä‚‚€Û€Ü€â€ð¸‚΂ÏÇß\n\n€ñ€Ñ€Ï€÷€Ê‚¿àƒÍƒØÒƒÁ‚Ú€Ù‚„€Ü¸‚Ê‚ËÄãÌÅØ¼Í€‚ä‚…Ò‚À´ƒ›á‚ðƒœæ‚ñ‚òÅÌÅØ¼‚¡‚¢ƒßæºâ€Âƒ•Ò¼ÊςĂ‚€Û€Ü€â€ð¸‚΂ÏÅ€€Ó€Ï‚€Ï¸„ð„¬ÄÇÌÅØ½€Â\n\n|‚µ‚¶€•€¾€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Çß\n\n€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Æãõ€ÃÒ†ê†ëƒùÒ‚À´ƒ›áƒÛ‚‘Ó‚ó‚ôð€Â\n\nEND\n", + /* 1*/ "€Ü€Ø†‚„†ê†ëƒù\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€øó҂턞҂€ƒµ¸‚ñ´É‚€Í€Ð€Ï€äÓ€„—¸‚áØÅɃ“€€Ü€Ø†‚„Ò†ê†ëƒùÒ‚ó…ÛàåãÒ‚«Íδ̻âÃÍσµò»É€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n‚€Í€Ð€Ï€ä€´\n€ï‚„Ó€ô‚„Ò‚À´Ì»â†ê†ëƒù¸ƒ ä¿à†Ä´Ì»â€´€í€û€Ñ€ã€é€Ò€Üó€ô‚„Éʸ‚ç´Ì»É€’„±Ò€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„Ü‚ƒ…öιð€Â€ï‚„ÉÊæÈÊàÒƒùÏ‚Àá‚ÁÚÒ¸‚Ý„ä´Ì߀ÂÈÒ†ê†ëƒù¸‚À´ƒ›ä¼€Â\n\n|‚µ‚¶€‘€¾ƒÃ‚ý€Û‚„€øŠ‚Œ†·‚Í‚•¸‚΂Ï\n\n†ê†ëƒùӃÂý€Û‚„€øŠó‚¬àã̾ဂ–‚¿àÒ„Ñ‚ö憯…¨óºâ€ÂƒÃ‚ý€Û‚„€øŠÒ‚Œ†·‚Í‚•¸‚΂ÏÅ€€Ó€øŒ€ÜÉÊæ†ê†ëƒùÏŠ€Ê€Ö€Ï€þÅ€‚Àá‚ÁÛâß¼ÏÇÑõÎàλ€Â\n\n|‚µ‚¶€’€¾€äŒ€Û€Ü€â€ðπЀ׀݀ÜÇß\n\n€Ó€øŒ€ÜÍ‚¿Ï€€Ü€ß‚„€î€Ê’Òºâ€äŒ€ø‚„€ð¸‚Ȃɀ½‚·‚öÇ߀ÂȼÆãõ‚ÛӀ䌀ۀ܀â€ðπЀ׀݀ÜÅ€ÃÒƒùæôÃσ†¿´Ì»â¿¸€à€È€Ê€×óÀâóºä¼€ÂØÉ€Ü€ß‚„€î€Ê’ÏӀ܀؆‚„Ò„·„邘܆—ÄãâÓíð€ÂÈÒ„ì„íæºãõ€€î€Ñ€Ð€Ï„¦æ€Ü€Ø†‚„ÖÒ…Ÿ‚í‚׸ſÂâÃÍæóÀâðä¼€Â\n\n|‚µ‚¶€“€¾‚Ä‚‚€Û€Ü€â€ð¸‚΂ÏÇß\n\n€ñ€Ñ€Ï€÷€Ê‚¿àƒÍƒØÒƒÁ‚Ú€Ù‚„€Ü¸‚Ê‚ËÄãÌÅØ¼Í€‚ä‚…Ò‚À´ƒ›á‚ðƒœæ‚ñ‚òÅÌÅØ¼‚¡‚¢ƒßæºâ€Âƒ•Ò¼ÊςĂ‚€Û€Ü€â€ð¸‚΂ÏÅ€€Ó€Ï‚€Ï¸„ð„¬ÄÇÌÅØ½€Â\n\n|‚µ‚¶€”€¾€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Çß\n\n€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Æãõ€ÃÒ†ê†ëƒùÒ‚À´ƒ›áƒÛ‚‘Ó‚ó‚ôð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€øó҂턞҂€ƒµ¸‚ñ´É‚€Í€Ð€Ï€äÓ€„—¸‚áØÅɃ“€€Ü€Ø†‚„Ò†ê†ëƒùÒ‚ó…ÛàåãÒ‚«Íδ̻âÃÍσµò»É€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n‚€Í€Ð€Ï€ä€´\n€ï‚„Ó€ô‚„Ò‚À´Ì»â†ê†ëƒù¸ƒ ä¿à†Ä´Ì»â€´€í€û€Ñ€ã€é€Ò€Üó€ô‚„Éʸ‚ç´Ì»É€’„±Ò€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„Ü‚ƒ…öιð€Â€ï‚„ÉÊæÈÊàÒƒùÏ‚Àá‚ÁÚÒ¸‚Ý„ä´Ì߀ÂÈÒ†ê†ëƒù¸‚À´ƒ›ä¼€Â\n\n|‚µ‚¶€‘€¾ƒÃ‚ý€Û‚„€øŠ‚Œ†·‚Í‚•¸‚΂Ï\n\n†ê†ëƒùӃÂý€Û‚„€øŠó‚¬àã̾ဂ–‚¿àÒ„Ñ‚ö憯…¨óºâ€ÂƒÃ‚ý€Û‚„€øŠÒ‚Œ†·‚Í‚•¸‚΂ÏÅ€€Ó€øŒ€ÜÉÊæ†ê†ëƒùÏŠ€Ê€Ö€Ï€þÅ€‚Àá‚ÁÛâß¼ÏÇÑõÎàλ€Â\n\n|‚µ‚¶€’€¾€äŒ€Û€Ü€â€ðπЀ׀݀ÜÇß\n\n€Ó€øŒ€ÜÍ‚¿Ï€€Ü€ß‚„€î€Ê’Òºâ€äŒ€ø‚„€ð¸‚Ȃɀ½‚·‚öÇ߀ÂȼÆãõ‚ÛӀ䌀ۀ܀â€ðπЀ׀݀ÜÅ€ÃÒƒùæôÃσ†¿´Ì»â¿¸€à€È€Ê€×óÀâóºä¼€ÂØÉ€Ü€ß‚„€î€Ê’ÏӀ܀؆‚„Ò„·„邘܆—ÄãâÓíð€ÂÈÒ„ì„íæºãõ€€î€Ñ€Ð€Ï„¦æ€Ü€Ø†‚„ÖÒ…Ÿ‚í‚׸ſÂâÃÍæóÀâðä¼€Â\n\n|‚µ‚¶€“€¾€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Çß\n\n€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Æãõ€ÃÒ†ê†ëƒùÒ‚À´ƒ›áƒÛ‚‘Ó‚ó‚ôð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ƒÃ‚ý€Û‚„€øŠ‚Œ†·‚Í‚•¸‚΂Ï\n", + /* 6*/ "…Ž„Á„ÊÒ€é€Ê€à¸„×Â\n", + /* 7*/ "€äŒ€Û€Ü€â€ðπЀ׀݀ÜÇß\n", + /* 8*/ "‚Ä‚‚€Û€Ü€â€ð¸‚΂ÏÇß\n", + /* 9*/ "€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•Çß\n", + /* 10*/ "ƒÃ‚ý€Û‚„€øŠæ…þØ´É\n", + /* 11*/ "…Ž„Á„ÊÒ€é€Ê€àæ„×»É\n", + /* 12*/ "€Ó€øŒ€Üæ‚ÙÄãÉ\n", + /* 13*/ "€äŒ„ì„í¸ƒ¥É\n", + /* 14*/ "€Ó€ùŽ‚„€ß‚„ƒÛ‚Ä\n", + /* 15*/ "…Ž„Á„ÊҀ܀؆‚„¸ƒ…Ì‚ÙÅÉ\n", + /* 16*/ "‚€Í€Ð€Ï€ä€ƒÃ‚ý€Û‚„€øŠ¸…þÛÌ߀Â\n‚Ï‚öãλ¹ð€Â\n", + /* 17*/ "…Ž„Á„ÊÒ€é€Ê€à¸…»¹ð߀ÂȼÅÉà‚Ï‚öãâ¿à€Â\n", + /* 18*/ "€¨€¤€Â‡Ë‚ÝÁ‚Àá‚ÁÛÉß€Â…Ž„Á„Ê󂤾¼€Â\n", + /* 19*/ "‚€Í€Ð€Ï€ä€ƒÆ„Ó„Ôð´É¿»€À\n", + /* 20*/ "ĺÃ㸀ÂÀ´ÍƒûσüË¿à€Ž\n", + /* 21*/ "AR34€ö€Ñ€ë€ø¸‚´É\n", + /* 22*/ "倇ËÏ‚Úü€Â\n„׻̻â€Ó€ùŽ‚„€ß‚„ó€Íẽ킯ςڴÌÌ€Â\n", + /* 23*/ "‚Ä‚‚€Ó€ç€ø€ý‚„€Û€Ü€â€ðæ‚΂ÏÄãÉ\n", + /* 24*/ "ƒµ¸ËÂÌ€‚€Í€Ð€Ï€ä€´€ô¼Ü€ó€áง¼àÇÉÙÉ»€Ž\n", + /* 25*/ "€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•ÅÉ\n", + /* 26*/ "‚¯Ï‚Ú´Ì€‚€Í€Ð€Ï€ä€Â‚ÐáÒƒÓƒ…¸€à€È€Ê€×Æâ߀Â\nĺƒ ó‚¤¾¼€Â\n", + /* 27*/ "€Ó€øŒ€Ü€´€ƒÌÁãÉÒÑ€Â\nƒÃ‚ý€Û‚„€øŠ‚Œ†·‚Í‚•¸‚ÏÆåÑ€Â\n", + /* 28*/ "ĺ̀¾ƒãÓ…Ž„Á„ÊÒ€é€Ê€àÑ€Â\n", + /* 29*/ "ÃÒ€î€Û€Ïæ€äŒ€Û€Ü€â€ððå\n€Ü€Ø†‚„Ҁ܀߂„€î€Ê’ܺâÅ€Â\n", + /* 30*/ "ÃÒ‚¯Ò€ñ€Ñ€Ï€÷€Ê‚¸‚Œ„•ÅÌÅØ½õ\nÃÒƒùÓƒ”ÉÊÒÜÒðå€Â\n", + /* 31*/ "ĺ€Ü´Í‡ËÏ‚·Ü¼€Ž\n", + /* 32*/ "€Ò€Ò€Ç€Ž\nô¼Ýà€îƒ»ƒçÒ߼рŽ\n", + /* 33*/ "¾ÔÄÅ÷áÑ€¾‚÷€à€Ë€Ï€Â\nƒ”ÒÃÍÓ‚á½Ì»âåßÑ€Â\n", + /* 34*/ "€Ð€Ï€ßÓ€´€ƒ‰éÉÍ„ª´Ì»Éå€Â\nºã¿àƒæƒŠƒçæË¿Ûο´ÉÅ€Ž\n", + /* 35*/ "ȼ€¾ƒÉÊÓÑ€Â€Ž€ŽóÜ\n€Ü€Ø†‚„¿àÓƒ‰éàãο´É€Ž\n", + /* 36*/ "ƒÉå€Â€ó€áà߀´\nƒ”æ€Ô€ã€÷ÏÎâ¿à€ƒ‰éÎÄ»€´\n", + /* 37*/ "€Õ€Ú€ÏŠ€ö€ô¼ÅÌ€Ž€À\n", + /* 38*/ "ƒ”Ӄ⃈ÄãÉðÂð´É€Ž€Â\n‚€Í€Ð€Ï€ä€€ó€áà¿à‚˜†ä¸‚¬âÒ߀Â\n", + /* 39*/ "€ý€Ë‚„‚„‚„€´€´€´\n", + /* 40*/ "€û€€†ê†ë¿à†˜Ò‡”†ø¸‚ÉâιÌ\nÜÊ乆ŠÛÌ€Âὶրù€ÑÎÒ€Ž\n", + /* 41*/ "€é€ù€ù€À\n", + /* 42*/ "ƒ¤ì€Ž€ƒ¤ìàãλ€´€´\n", + /* 43*/ "€Ó€øŒ€Ü€À€ô¼ÅÉÒ€À\n", + /* 44*/ "ôÃÖ‚ÚÁÒ€À\n", + /* 45*/ "‚˜†ÓÏ…éáÎÀµ€ÂË»ÌÀÌ€´\n", + /* 46*/ "ƒ»ó€ÃÒƒŠ¸„Ìãß¼€´\n", + /* 47*/ "…Ž„Á„ÊÒ€é€Ê€àÓ€ú€Ê€×ÄãÌ»ØÆ\nƒÃ‚ý€Û‚„€øŠæØðƒÂ‚¢‚\n", + /* 48*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΂͂•æ‚΂ÏÄãÉ\n", + /* 49*/ "…¤„–。͂•¸‚΂ÏóÀØÇ¹\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "€ç€Ê€×€ù€Ü\n", + /* 53*/ "€ç€Ê€×€ù€Ü\n", + /* 54*/ "€Õ€Ú€ÏŠ€öÒ€ç€Ê€×€ù€Ü¸‚ÝÏ‚öãÉ\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/leeP.c b/src/files/lang/jap-final/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/jap-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_f.c b/src/files/lang/jap-final/lee_str_f.c new file mode 100644 index 000000000..4f1edeef8 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe système d'accostage est d'habitude contrôlé en auto: il a dû être dévié depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 5: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 4: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le système de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Accéder aux systèmes de navigation\n", + /* 8*/ "Saboter les systèmes de propulsion\n", + /* 9*/ "Contrôler le pont\n", + /* 10*/ "Boucliers du vaisseau baissés.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation récupérées.\n", + /* 14*/ "Ascenseur activé.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers \net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna. \n", + /* 20*/ "Prends ça. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur. \nPrends l'autre.\n", + /* 23*/ "Moteurs coupés.\n", + /* 24*/ "Attention Joanna! Ils sont en colère je crois...\n", + /* 25*/ "Pont capturé.\n", + /* 26*/ "Vas-y, Joanna. Je sécurise le périmètre. \nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer \nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires skedars.\n", + /* 30*/ "Si nous contrôlons le pont, le vaisseau sera à notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma chère.\n", + /* 34*/ "Vous! Vous ne vous êtes pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars était plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais créer une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout ça, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilisée. Vous êtes ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la première fois que je vois une planète depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "Où vas-tu?\n", + /* 45*/ "Nous devons descendre à la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar fermées - boucliers actifs.\n", + /* 48*/ "Objet crucial détruit.\n", + /* 49*/ "Munitions épuisées - panneaux ne peuvent être détruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_g.c b/src/files/lang/jap-final/lee_str_g.c new file mode 100644 index 000000000..a38c4b6ed --- /dev/null +++ b/src/files/lang/jap-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Öffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brücke aus auf manuelle Bedienung umgestellt worden sein. Öffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermöglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild außer Betrieb!\n", + /* 6*/ "Öffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brücke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geöffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nkönnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore öffnen, sonst können wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schön dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brücke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns später.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brücke einnehmen, gehört das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befürchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Schätzchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie wären entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das dürfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Möglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschön!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir müssen die Oberfläche erreichen! Folge mir!\n", + /* 46*/ "Wir müssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstört.\n", + /* 49*/ "Die Konsolen können ohne Munition nicht zerstört werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_i.c b/src/files/lang/jap-final/lee_str_i.c new file mode 100644 index 000000000..a1124b6b1 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco è normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis è stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncosì potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinché possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sarà utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "È ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sarà nostra.\n", + /* 31*/ "È ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c'è di peggio, immagino! Guarda un po' chi c'è qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. È sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta lì! Se riesco a distrarli, avrai la possibilità di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perché lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilità di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! È la prima volta che vedo un altro pianeta dallo spazio! È fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba è?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collana\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/lee_str_s.c b/src/files/lang/jap-final/lee_str_s.c new file mode 100644 index 000000000..be7bf3c60 --- /dev/null +++ b/src/files/lang/jap-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma automática: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podrá terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegación\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La información de navegación ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar \npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te veré en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrarás útil...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomaré este ascensor; \ntú toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "¡Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora sólo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta máquina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave será nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferiría no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Sólo mira a quién tienes por compañía.\n", + /* 34*/ "¡Tú! Creía que habías escapado. No encontramos ningún rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me escondía de los Skedar, como tú y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. ¡Espera aquí! Crearé una distracción; te daré la oportunidad de escapar. Úsala o moriremos ambas.\n", + /* 37*/ "¿Por qué haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. Tú eres mi mejor baza para vengarme.\n", + /* 39*/ "¡¡¡Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. Ésta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "¿Hmmmm?\n", + /* 42*/ "No... ¡No puedo creerlo!\n", + /* 43*/ "¿Elvis? ¿Qué pasa?\n", + /* 44*/ "¿Dónde vas?\n", + /* 45*/ "¡Tenemos que bajar a la superficie! ¡Sígueme!\n", + /* 46*/ "¡Tenemos que salir de aquí!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todavía activos.\n", + /* 48*/ "Objeto crítico de la misión destruido.\n", + /* 49*/ "Munición agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obtén el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/lenE.c b/src/files/lang/jap-final/lenE.c similarity index 100% rename from src/files/lang/lenE.c rename to src/files/lang/jap-final/lenE.c diff --git a/src/files/lang/lenJ.c b/src/files/lang/jap-final/lenJ.c similarity index 100% rename from src/files/lang/lenJ.c rename to src/files/lang/jap-final/lenJ.c diff --git a/src/files/lang/lenP.c b/src/files/lang/jap-final/lenP.c similarity index 100% rename from src/files/lang/lenP.c rename to src/files/lang/jap-final/lenP.c diff --git a/src/files/lang/len_str_f.c b/src/files/lang/jap-final/len_str_f.c similarity index 100% rename from src/files/lang/len_str_f.c rename to src/files/lang/jap-final/len_str_f.c diff --git a/src/files/lang/len_str_g.c b/src/files/lang/jap-final/len_str_g.c similarity index 100% rename from src/files/lang/len_str_g.c rename to src/files/lang/jap-final/len_str_g.c diff --git a/src/files/lang/len_str_i.c b/src/files/lang/jap-final/len_str_i.c similarity index 100% rename from src/files/lang/len_str_i.c rename to src/files/lang/jap-final/len_str_i.c diff --git a/src/files/lang/len_str_s.c b/src/files/lang/jap-final/len_str_s.c similarity index 100% rename from src/files/lang/len_str_s.c rename to src/files/lang/jap-final/len_str_s.c diff --git a/src/files/lang/lipE.c b/src/files/lang/jap-final/lipE.c similarity index 100% rename from src/files/lang/lipE.c rename to src/files/lang/jap-final/lipE.c diff --git a/src/files/lang/jap-final/lipJ.c b/src/files/lang/jap-final/lipJ.c new file mode 100644 index 000000000..efb97af94 --- /dev/null +++ b/src/files/lang/jap-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Ó‚ä‚…Ò„‚ö惵ò¿ãλ߼πóÀâðƒŒÁ€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÅÎÂãõÎàλ€Â‚Ê‚ÍÆâÃÍ󀂵‚¶¸€Ü€ð‚„ƒÏ‚·ÛâÃÍæóÀâð伿€„µƒ“‚ý‹€ùíÏ»âÒÓ…¨Å»ð伀‡˂Ýσ⃈Æâ¹ð€Âƒ•‚Ò҃̂ØÏ‚Æâ„§‚˜Ò…•…–¸ƒ…̃‘Ńöá€ÈÒ†˜Òƒ¨„փɂØÍÅ̻λ¿¸€ßÁ‚¹‚ÇÆâÒð€Âƒ“‚ý惼»€Âƒ»óÁã€Â\n\n|‚µ‚¶€‘€¾‰‚„€ßŽ‚„€Ü¸‚΂ÏÇß\n\nƒ•‚Ò€€Ó€÷€Ð€•€‘Ò…‡…ˆ€à‚„€ðæ‚ö‚ÝÅɃ…„ì„í¸€‚ÛàÒ‰‚„€ßŽ‚„€Ü¿àƒ‘ŃöàÎÁÌÓÎàλ€Â‰‚„€ßŽ‚„€Ü悺„ÖÄãÌ»â„ÿ…€…ÒŠ€ÐÓ€¾ÈàÁ€ú€Ê€×ÄãÌ»â€Â‰‚„€ß€÷€Ï€Õ¸‚ùƒˆÅÌ€Š€Ð¸€Ù€Ï€ã€ú‚„€øÅÌ»â€Ù€Ï‘€Ì‚„€ßπҀрø€Ü¸‚¦áÃÙ€Š€ÐÒ€ú€Ê€×¸ÓíÆÒð€Â\n\n|‚µ‚¶€’€¾…€Õ’€Ý€ø¸€à€È€Ê€×Çß\n\n‚€Í€ä€Ú€Ï¿àÒ€ù”‚„€ãÏÓ€…€Õ’€Ý€øÏ‚ÆâÜÒæºâ€Â‚††žƒÒ‚°‚‹Îôæ€Ú€Ï’€øÍÅ̅‚º„ÖÄãÌ»âȼð€ÂÃ҅€Õ’€Ý€ø¸„€Å‚ŸÅ€€±€Ü€Ö€Ë€Ïó€à€È€Ê€×ÆâÒð€ÂÜÅ€‡€ë€ù€ÏŠ€ˆÒƒž¿æ‚º„ÖÄãÌ»Éà€ÈÒƒ¨‚°¸ßÁ€à€È€Ê€×ÆâÃÍ€Â\n\n|‚µ‚¶€“€¾€ô€å€ë€É‚„€ð¸ƒóƒˆÇß\n\n…„ƒ§…€Ü€ß€Ê€ëÒ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€È㸂ù´Ì‚‰ƒŽƒ¸Ýá…ªêÆÒð€Â‚Ê‚ÍóÀÉà€ƒ»ó‚Ú‚ÄÆâƒ‡ƒƒæºâ€Â»íãÓ‚É‚ÎàãÌÅØ¼¿à΀Â\n\n|‚µ‚¶€”€¾† …†…„ƒ§…Ò€Õ‚„Š€Ö‚„‚ö‚Ý\n\nØÜÎÁ€„‚°ƒÛ„æôÿ҆ …†…„ƒ§…ó‚Úåãâóºä¼€ÂÈÒ‚…ßÓ€…©‚¡ÄãɃ‚–Ó‚öãλ߼πú€Ê€×ÄãÌ»â¿à€„÷ì€ë€ú€Ð‚„ó€Õ‚„Š€Ö‚„¸‚ö‚ÝÅ̂ςöâÒð€Âƒ…ÌÒ€Õ‚„Š€Ö‚„æƒáƒÜÎåÂóÓλðä¼Å€Š€ÐÏÓ‚‰ƒŽƒÜ»âðä¼€Â\n\n|‚µ‚¶€•€¾„†¡Òƒ¨„փ¨‚ŸÇß\n\n† …†…„ƒ§…Ï‚ö´Éà€‚µ‚¶¸‚€Ë€îÄãâƒÏÆèÏ€Ô“€ø‚„€ðÏ‚öâÒð€Â………†ƒîÉÊÓ€„‚‹æƒ¨ÀÌ»âÃÍσµò»Éá€ÜÅÁÓ‚§æƒÅ‚öÅÌÁâÒ¸‚Éãõ€Æèτ‚‹¸†¢ƒ˜Åß¼ÍÆâð伀†£áƒ–ÅÌ‚©¼æ€Ü‘‚„‰€ÆÎ‚Ú‚ÄæƒÔƒƒð€Â\n\nEND\n", + /* 1*/ "€Ó€÷€Ð€•€‘€„ÿ…€„ׂȀӀ÷€Ð\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Ó‚ä‚…Ò„‚ö惵ò¿ãλ߼πóÀâðƒŒÁ€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÅÎÂãõÎàλ€Â‚Ê‚ÍÆâÃÍ󀂵‚¶¸€Ü€ð‚„ƒÏ‚·ÛâÃÍæóÀâð伿€„µƒ“‚ý‹€ùíÏ»âÒÓ…¨Å»ð伀‡˂Ýσ⃈Æâ¹ð€ÂÈÒ†˜Òƒ¨„փɂØÍÅ̻λ¿¸ßÁ‚¹‚ÇÆâÒð€Âƒ“‚ý惼»€Âƒé€Â\n\n|‚µ‚¶€‘€¾…€Õ’€Ý€ø¸€à€È€Ê€×Çß\n\n‚€Í€ä€Ú€Ï¿àÒ€ù”‚„€ãÏÓ€…€Õ’€Ý€øÏ‚ÆâÜÒæºâ€Â‚††žƒÒ‚°‚‹Îôæ€Ú€Ï’€øÍÅ̅‚º„ÖÄãÌ»âȼð€ÂÃ҅€Õ’€Ý€ø¸„€Å‚ŸÅ€€±€Ü€Ö€Ë€Ïó€à€È€Ê€×ÆâÒð€ÂÜÅ€‡€ë€ù€ÏŠ€ˆÒƒž¿æ‚º„ÖÄãÌ»Éà€ÈÒƒ¨‚°¸ßÁ€à€È€Ê€×ÆâÃÍ€Â\n\n|‚µ‚¶€’€¾€ô€å€ë€É‚„€ð¸ƒóƒˆÇß\n\n…„ƒ§…€Ü€ß€Ê€ëÒ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€È㸂ù´Ì‚‰ƒŽƒ¸Ýá…ªêÆÒð€Â‚Ê‚ÍóÀÉà€ƒ»ó‚Ú‚ÄÆâƒ‡ƒƒæºâ€Â»íãÓ‚É‚ÎàãÌÅØ¼¿à΀Â\n\n|‚µ‚¶€“€¾† …†…„ƒ§…Ò€Õ‚„Š€Ö‚„‚ö‚Ý\n\nØÜÎÁ€„‚°ƒÛ„æôÿ҆ …†…„ƒ§…ó‚Úåãâóºä¼€ÂÈÒ‚…ßÓ€…©‚¡ÄãɃ‚–Ó‚öãλ߼πú€Ê€×ÄãÌ»â¿à€„÷ì€ë€ú€Ð‚„ó€Õ‚„Š€Ö‚„¸‚ö‚ÝÅ̂ςöâÒð€Âƒ…ÌÒ€Õ‚„Š€Ö‚„æƒáƒÜÎåÂóÓλðä¼Å€Š€ÐÏÓ‚‰ƒŽƒÜ»âðä¼€Â\n\n|‚µ‚¶€”€¾„†¡Òƒ¨„փ¨‚ŸÇß\n\n† …†…„ƒ§…Ï‚ö´Éà€‚µ‚¶¸‚€Ë€îÄãâƒÏÆèÏ€Ô“€ø‚„€ðÏ‚öâÒð€Â………†ƒîÉÊÓ€„‚‹æƒ¨ÀÌ»âÃÍσµò»Éá€ÜÅÁÓ‚§æƒÅ‚öÅÌÁâÒ¸‚Éãõ€Æèτ‚‹¸†¢ƒ˜Åß¼ÍÆâð伀†£áƒ–ÅÌ‚©¼æ€Ü‘‚„‰€ÆÎ‚Ú‚ÄæƒÔƒƒð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚§Ó‚ä‚…Ò„‚ö惵ò¿ãλ߼πóÀâðƒŒÁ€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÅÎÂãõÎàλ€Â‚Ê‚ÍÆâÃÍ󀂵‚¶¸€Ü€ð‚„ƒÏ‚·ÛâÃÍæóÀâð伿€„µƒ“‚ý‹€ùíÏ»âÒÓ…¨Å»ð伀ƒ“‚ý惼»€Âƒ»óÁã€Â\n\n|‚µ‚¶€‘€¾€ô€å€ë€É‚„€ð¸ƒóƒˆÇß\n\n…„ƒ§…€Ü€ß€Ê€ëÒ€ô€å€ë€É‚„€ð¸‚ö‚ÝÅ€È㸂ù´Ì‚‰ƒŽƒ¸Ýá…ªêÆÒð€Â‚Ê‚ÍóÀÉà€ƒ»ó‚Ú‚ÄÆâƒ‡ƒƒæºâ€Â»íãÓ‚É‚ÎàãÌÅØ¼¿à΀Â\n\n|‚µ‚¶€’€¾† …†…„ƒ§…Ò€Õ‚„Š€Ö‚„‚ö‚Ý\n\nØÜÎÁ€„‚°ƒÛ„æôÿ҆ …†…„ƒ§…ó‚Úåãâóºä¼€ÂÈÒ‚…ßÓ€…©‚¡ÄãɃ‚–Ó‚öãλ߼πú€Ê€×ÄãÌ»â¿à€„÷ì€ë€ú€Ð‚„ó€Õ‚„Š€Ö‚„¸‚ö‚ÝÅ̂ςöâÒð€Âƒ…ÌÒ€Õ‚„Š€Ö‚„æƒáƒÜÎåÂóÓλðä¼Å€Š€ÐÏÓ‚‰ƒŽƒÜ»âðä¼€Â\n\n|‚µ‚¶€“€¾„†¡Òƒ¨„փ¨‚ŸÇß\n\n† …†…„ƒ§…Ï‚ö´Éà€‚µ‚¶¸‚€Ë€îÄãâƒÏÆèÏ€Ô“€ø‚„€ðÏ‚öâÒð€Â………†ƒîÉÊÓ€„‚‹æƒ¨ÀÌ»âÃÍσµò»Éá€ÜÅÁÓ‚§æƒÅ‚öÅÌÁâÒ¸‚Éãõ€Æèτ‚‹¸†¢ƒ˜Åß¼ÍÆâð伀†£áƒ–ÅÌ‚©¼æ€Ü‘‚„‰€ÆÎ‚Ú‚ÄæƒÔƒƒð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "€ô€å€ë€É‚„€ð¸ƒóƒˆÇß\n", + /* 10*/ "‰‚„€ßŽ‚„€Ü¸‚΂ÏÇß\n", + /* 11*/ "…€Õ’€Ý€ø¸€à€È€Ê€×Çß\n", + /* 12*/ "† …†…„ƒ§…Ò€Õ‚„Š€Ö‚„‚ö‚Ý\n", + /* 13*/ "„†¡Òƒ¨„փ¨‚ŸÇß\n", + /* 14*/ "€Ù€Ï‘€Ì‚„€ß€…€÷€Ú‚„€àÒ…•…–҂΂ςó‚ô\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "€ô€å€ë€É‚„€ð\n", + /* 18*/ "€ô€å€ë€É‚„€ð\n", + /* 19*/ "€ô€å€ë€É‚„€ð¸‚ÝÏ‚öãÉ\n", + /* 20*/ "Š€Ðƒˆ€Ù€Ï€ã€ú‚„€øÖÒ€Ð€×€Ý€Üæ„Ú„ÛÄãÉ\n", + /* 21*/ "‚ë‚새€Ù€Ï€ã€ú‚„€øÖÒ€Ð€×€Ý€Üæ„Ú„ÛÄãÉ\n", + /* 22*/ "‚‰ƒŽ€Ù€Ï€ã€ú‚„€øÖÒ€Ð€×€Ý€Üæ„Ú„ÛÄãÉ\n", + /* 23*/ "€Ù€Ï‘€Ì‚„€ß€Ò€Ñ€ø€Üæ€Ý€Ê€ãÄãÉ\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 27*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 28*/ "‰‚„€ß€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 29*/ "† …†…„ƒ§…τтöÅÉ\n", + /* 30*/ "‰‚„€ß€÷€Ï€Õæ…Ñ‚¾ÄãÉ\n", + /* 31*/ "‰‚„€ß€÷€Ï€ÕÒ…Ñ‚¾æ‚Å„–ãÉ\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "€Õ‚„Š€Ö‚„€¦\n", + /* 35*/ "€Õ‚„Š€Ö‚„€¦\n", + /* 36*/ "† …†…„ƒ§…Ò€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 37*/ "¾ƒÓƒžð€À\n", + /* 38*/ "Ãà€ÈãÓ€Ô€ùÒ„›ð\n", + /* 39*/ "ƒËÂÌ€ƒËÂÌÁ〴\n", + /* 40*/ "‚×Éλó€´\n", + /* 41*/ "‚ªÌôɀ‚àð€´\n", + /* 42*/ "Œ€ø‚ŽÏ„Ñ‚öƒî‚Ȃɀ´\n", + /* 43*/ "Æèσ–ÄÎÀµ€€Ñ€ß€Ñ„—Ϻ¼È€´\n", + /* 44*/ "ß‚„Å€È´ÊæÈÒƒµÎà€´\n", + /* 45*/ "Ä´ÄÍ„›¸ƒ–Ç€Ž\n", + /* 46*/ "‹€ùâƒÏƒæÎÀµ€´\n", + /* 47*/ "€ô€å€ë€É‚„€ð¸„ß´ÉÃÍæ‚È‚áÅÉ\n", + /* 48*/ "€Ò€Ñ€ø€ÜÓ‚æÏ€Ý€Ê€ãÄãÌ»ØÆ\n", + /* 49*/ "€Ù€Ï‘€Ì‚„€ß€Ò€Ñ€ø€ÜҀ݀ʀã„ׄØ\n", + /* 50*/ "ƒÉ¿€¾È¿´É΀Â\n", + /* 51*/ "¾»€¾ƒÓ€Ž€€Ð€ö‚„€ð¸ÎàÇ€´\n", + /* 52*/ "ÃÃÏÓ‚Ì„½Ó‚ÕÊÃÙƒ¯„¬ð€Â‚ฃÕÛä€Â\n", + /* 53*/ "ܼ€’ƒ¬Í‚©åλ€‚ฃÕÛâ¹ð€Â\n", + /* 54*/ "ßäÅ»€óÓ‚‰ƒŽ¸„ÕõÇÌÜྼ\n", + /* 55*/ "ٹ΂§¸‚ç´Ìɹðï\n", + /* 56*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΄±ƒ°æ‚ÙÄãÉ\n", + /* 57*/ "† …†…„ƒ§…ÖÒ€ø‚„€ã悹‚ºóÀØÇ¹\n", + /* 58*/ "¾»€Ã»ËÓ€é€÷‚„ìµÎ»ï€Â„Ñ‚öƒîð€´\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "€Õ‚„Š€Ö‚„€¨¤\n", + /* 62*/ "€Õ‚„Š€Ö‚„€¨¤\n", + /* 63*/ "€Ô“€ø‚„€ðÒ€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 64*/ "€‡€ë€ù€ÏŠ€ˆæ‚ÙÄãÉ\n", + /* 65*/ "ÃÃ¿à‚ŸÌ»´ÌÁ〴\n", + /* 66*/ "…€Õ’€Ý€øæ‡Ë†¤ÅÉ\n", + /* 67*/ "…€Õ’€Ý€øæ‡Ì…éÅÉ\n", + /* 68*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "€±€Ü€Ö€Ë€Ï\n", + /* 72*/ "€±€Ü€Ö€Ë€Ï\n", + /* 73*/ "€±€Ü€Ö€Ë€Ï¸‚ÝÏ‚öãÉ\n", + /* 74*/ "€Ü€Ö€Ë€ä‚„æ€ß‚„€ÿ€Ê€ã¸€ú€Ê€×ÅÉ\n", + /* 75*/ "€ß‚„€ÿ€Ê€ã€¢€‚¹‚Ç€ƒ¨ƒéƒêƒëÎÅ\n", + /* 76*/ "€Ü€Ö€Ë€ä‚„Ò€ú€Ê€×æ‚ñåãÉ\n", + /* 77*/ "€ô€å€ë€É‚„€ð¸ƒóƒˆÅÉ\n", + /* 78*/ "Õ‚„¹€€Û€Ë€û‚„…¿€Âȼȼ€\nÃÃÏÎà€€ô€å€ë€É‚„€ðæºâ¿Ü€Ž\n", + /* 79*/ "†ƒ¬æ‡Ìæ´ÌÀÌ»âß¼ð€Â\n…€Õ’€Ý€øÓ‚¼»ï€´\n", + /* 80*/ "€Ó€à€ø€Ð€ø€Ù‚„€øÒϾ»€Ž€Â\n† …†…„ƒ§…ÓÃÒ‚¼ÁÑ€Â\n", + /* 81*/ "ß‚„ÅÃÃð€‚€Í€Ð€Ï€ä€´\nƒæÎ»Í‚݃€ãÏÎâ\n", + /* 82*/ "€Ô€Ñ€´ƒ¾‚ÝÏ‚öâ¹ìµÎ»€´\n", + /* 83*/ "ÃÃÒ„æ‚Ó¿€À\n", + /* 84*/ "¾€¾ƒÓ€Ž\n", + /* 85*/ "ûˀ€Ü€Ñð€´\n", + /* 86*/ "€Ð€ö‚„€ð¸€´\n", + /* 87*/ "‚ªƒîð€´\n", + /* 88*/ "‚ë‚ì€Û€Ü€â€ðæ€Ô‚„‹‚„€ú‚„ŠÅÉ\n", + /* 89*/ "ܼ‚ƒËÒ‚Ô„Ïó„Ñ‚ö€ø‚„€ã¸ƒÛ´É\n", + /* 90*/ "ÃÒ‚¯Ï„Ñ‚öÆâÏÓ\n†§¸‚ÏÆÅ¿Î»€Â\np…Ó„ÊÒ…®Ò€ò€ú»ƒçÏ\n€î‚„€×¸ËÂ̾»É€Â\np…£‚ÎÅ̄тöÆâ¹ð€Â\n", + /* 91*/ "ƒ…Á„¤…úλå€ÂÍÃäó\n€‡…£†¨€ˆÓôÃϺâÒ€À\n", + /* 92*/ "ÃҀـπâ€äÒ‚Ä€Â\n", + /* 93*/ "Õ€¹€Î¿Î¿€Ö€Ì‚„€ãìµÎ»€Â\n", + /* 94*/ "…Ó„ÊÏÓ‚‰ƒŽƒæ€Ò‚€Ë€Ò‚€Ë»â€Â\np‚ªóÜ‚×ÊØÁâ¹ìµÎÁÌ\n†©¿Ï„‚öÆâ¹ð€»»Î€Â\n", + /* 95*/ "Ó»Ó»€Â\n†˜Ï€‡€Ô€…€Ù€…€ã€…‹€ˆÓº´Ì€À\n", + /* 96*/ "¼¹€À€ÃҀـπâ€äðæ€Ž\n", + /* 97*/ "΀πÀ\n", + /* 98*/ "€Ù€Ñ€áÓ‚×ÉãâÒæ€Ö€ö€ÑàÅ»î€Â\n", + /* 99*/ "ÎÏ߀´€€Ó€öÈ¼Ï€Ž€Â\n‚‰ƒŽƒÏ€à€×€ÊÌÝ伿Åà€Ž\n", + /*100*/ "‚ݸ‡ËéÌ€´\nÈÿà„ÌãÎÄ»€´\n", + /*101*/ "‚ƒ‚‹‚ªÒ€î€çð€À€ÃÃÓ\n†¬†›…µ€Ó€÷€Ðιð€´\np„‚°Ò‚Ý‚¾À¸„Åàλҿ€´\n", + /*102*/ "‚ªƒ¬Ü‚©åÇλó€´\nÄ´ÄÍ€ù‚„‚„¸„–âÒ߀´\n", + /*103*/ "€Ñ‚„€Ü€ã€Ï„ „¡Ï‹€ùÉà\n€ß†óÓ…±ØÎ»ï€´\n", + /*104*/ "½½€ÜÊ乃þÁÃÍÏÎâóÅ·¼ß€Â\nƒ”憬†›…µÒ„§‚˜Ï„‚öÅÌ€€Ó€Ñ€÷€Ð€Ï¸\n¸†­¹ð´ÌÃ͸рÂ\n", + /*105*/ "ƒ—‚Ä‚‰ƒŽ€Û€Ü€â€ð¸‚΂ÏÅÉ\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lipP.c b/src/files/lang/jap-final/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/jap-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_f.c b/src/files/lang/jap-final/lip_str_f.c new file mode 100644 index 000000000..433df94df --- /dev/null +++ b/src/files/lang/jap-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Détruire les archives informatiques\n\nToute information sur le crash et les éléments récupérés détenue par le Secteur 51 doit être effacée de leurs fichiers. Le terminal est gardé dans une pièce fermée en haut du couloir principal. Installez un virus grâce au récepteur et détruisez le terminal. Si le virus infecte d'autres terminaux, leur réseau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caissons dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 4: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caissons dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 3: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 2: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "Détruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Accéder au labo d'autopsie\n", + /* 13*/ "Sauver le rescapé du crash\n", + /* 14*/ "Archives de recherche détruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Accès système contrôle des portes refusé.\n", + /* 21*/ "Accès système contrôle éclairage refusé.\n", + /* 22*/ "Accès système contrôle sécurité refusé.\n", + /* 23*/ "Virus téléchargé dans la console.\n", + /* 24*/ "Obtenir récepteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "Récepteur\n", + /* 27*/ "Récepteur\n", + /* 28*/ "Récepteur obtenu.\n", + /* 29*/ "Accès laboratoire: succès.\n", + /* 30*/ "Récepteur connecté.\n", + /* 31*/ "Connexion récepteur coupée.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui êtes-vous?\n", + /* 38*/ "Hé! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes vêtements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a détecté le costume.\n", + /* 48*/ "Virus déjà téléchargé.\n", + /* 49*/ "Lancement téléchargement virus.\n", + /* 50*/ "Enfin vous voilà.\n", + /* 51*/ "Mais, vous n'êtes pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le répèterai pas: lâchez votre arme!\n", + /* 54*/ "Bon. J'appelle la sécurité.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Accès au labo d'autopsie impossible.\n", + /* 58*/ "Hé! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'opération.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'opération\n", + /* 62*/ "Carte salle d'opération\n", + /* 63*/ "Carte salle d'opération obtenue.\n", + /* 64*/ "Elvis a été abattu.\n", + /* 65*/ "Sortez de là, bon Dieu!!\n", + /* 66*/ "Caisson élevé.\n", + /* 67*/ "Caisson abaissé.\n", + /* 68*/ "Equipement crucial détruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accrochée.\n", + /* 75*/ "ID cible confirmée - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume porté.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un \nde se séparer de son uniforme...\n", + /* 79*/ "La température tombe... La salle de \ncryogénisation est proche.\n", + /* 80*/ "L'air est recyclé par ici... Le labo\n d'autopsie est par là.\n", + /* 81*/ "Le voilà, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'être ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Prévenez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge systèmes d'éclairage.\n", + /* 89*/ "Entrée supplémentaire aux labos créée.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilité reste une cloison \nque j'ai repérée dans une salle après \nl'entrepôt. Essayez de la faire sauter.\n", + /* 91*/ "Pas de problème. Et où sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "Hé hé. Terrible.\n", + /* 94*/ "Au fait, l'entrepôt est bourré de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discrète plutôt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'énerve...\n", + /*100*/ "Levez les mains et écartez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit être scellée! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas répéter, Docteur. Et \néteignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera informé, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amusée dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "Défenses automatiques neutralisées.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_g.c b/src/files/lang/jap-final/lip_str_g.c new file mode 100644 index 000000000..8f0b0ef16 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Löschen Sie die Aufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelöscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Geräts einen Virus, zerstören Sie anschließend das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den Überlebenden!\n", + /* 14*/ "Aufzeichnungen zerstört.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen\n", + /* 20*/ "Zugriff auf den Türöffnungsmechanismus verweigert\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Gerät!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Gerät\n", + /* 27*/ "Data Uplink-Gerät\n", + /* 28*/ "Data Uplink-Gerät aufgenommen\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgeführt\n", + /* 30*/ "Verbindung hergestellt\n", + /* 31*/ "Verbindung abgebrochen\n", + /* 32*/ "Erlangen Sie die Schlüsselkarte für Medlab 2.\n", + /* 33*/ "der Wache\n", + /* 34*/ "Medlab 2-Schlüsselkarte\n", + /* 35*/ "Medlab 2-Schlüsselkarte\n", + /* 36*/ "Medlab 2-Schlüsselkarte aufgenommen\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrüstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schießen!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrüstung zurück, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja förmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrüstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlüsselkarte zum OP!\n", + /* 60*/ "der Wache\n", + /* 61*/ "OP-Schlüsselkarte\n", + /* 62*/ "OP-Schlüsselkarte\n", + /* 63*/ "OP-Schlüsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrüstung wurde zerstört.\n", + /* 69*/ "Finden Sie den Röntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Röntgen-Scanner\n", + /* 72*/ "Röntgen-Scanner\n", + /* 73*/ "Röntgen-Scanner aufgenommen\n", + /* 74*/ "Scanner-Ziel erfasst\n", + /* 75*/ "Ziel-ID bestätigt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden überzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur fällt... Du musst \nin der Nähe des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu spät!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Dürfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrüger!\n", + /* 88*/ "Beleuchtungssystem überladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen\n", + /* 90*/ "Das Problem ist, dass es keine Möglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerräumen \neine brüchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkörper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkörper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerräume sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schießt.\n", + /* 99*/ "Großartig! Wenn ich jetzt noch mein Verlangen \nunterdrücken könnte, dich zu verpfeifen...\n", + /*100*/ "Hände hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts über den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird über diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natürlich wird er darüber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_i.c b/src/files/lang/jap-final/lip_str_i.c new file mode 100644 index 000000000..795428fe6 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C'è un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus è già stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamerò la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non è Harry! È un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis è stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unità di contenimento.\n", + /* 67*/ "Abbassata unità di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c'è un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sarà troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "È una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema è che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilità è un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov'è l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari è contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercherò di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /*104*/ "Certo che lo verrà a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/jap-final/lip_str_s.c b/src/files/lang/jap-final/lip_str_s.c new file mode 100644 index 000000000..8dc2741e8 --- /dev/null +++ b/src/files/lang/jap-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Destruir Registros Científicos del Ordenador\n\nCualquier información y objetos que los técnicos del Área 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal está en una habitación cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producirá efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este área y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "ÁREA 51 - LABORATORIOS MÉDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este área y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de técnico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiración\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros científicos destruidos.\n", + /* 15*/ "Obtén ropas de laboratorio.\n", + /* 16*/ "Técnico:\n", + /* 17*/ "Ropas lab.\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obtén el Conector de Datos.\n", + /* 25*/ "Técnico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con éxito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexión perdida.\n", + /* 32*/ "Obtén llave magnética del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave del lab. 2\n", + /* 35*/ "Llave magnética del lab. 2\n", + /* 36*/ "Llave magnética del lab. 2 obtenida.\n", + /* 37*/ "¿Y tú quién eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "¡Socorro, socorro!\n", + /* 40*/ "¡No me dispares!\n", + /* 41*/ "¡Oh, Dios mío, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... ¡o verás!\n", + /* 44*/ "Vale. ¡Tú lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "¡¡¡No tengo mucho tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "Así que por fin has llegado.\n", + /* 51*/ "Hey, tú no eres... ¡ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aquí. Deja tu arma.\n", + /* 53*/ "No te lo diré de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te están esperando...\n", + /* 56*/ "Ha muerto personal crítico de la misión.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, ése no es Harry. Es un intruso.\n", + /* 59*/ "Obtén llave magnética del quirófano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave del quirófano\n", + /* 62*/ "Llave magnética del quirófano\n", + /* 63*/ "Llave magnética del quirófano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "¡Salgamos de aquí!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crítico de la misión destruido.\n", + /* 69*/ "Obtén Escáner de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Escáner de Rayos-X\n", + /* 72*/ "Escáner de Rayos-X\n", + /* 73*/ "Escáner de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexión del escáner perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura está bajando... Debes de estar \ncerca de la sala de criogenización.\n", + /* 80*/ "El aire está fuertemente reciclado aquí: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "¡Ahí está, Joanna! ¡Deprisa o será tarde!\n", + /* 82*/ "Salga de este área.\n", + /* 83*/ "¿Debe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "¡Es una espía!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "¡Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningún \nmodo de entrar en la sección de desarrollo. \nEl único camino disponible es una parte \ndébil del muro que he marcado en la \nhabitación tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ¿Dónde\nestán esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso sí, los almacenes están repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ¿Alguna otra perla de sabiduría?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "¿Sí?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si sólo pudiera luchar contra \nel impulso de informar de él a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\nalienígena.\n", + /*101*/ "¿Qué demonios te crees que estás haciendo? \n¡Esto se supone que es una sala sellada! \n¿No sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetírselo, doctor. Y \napague ese láser.\n", + /*103*/ "El Director Easton se enterará de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su alienígena.\n", + /*105*/ "Defensas Automáticas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/lueE.c b/src/files/lang/jap-final/lueE.c similarity index 100% rename from src/files/lang/lueE.c rename to src/files/lang/jap-final/lueE.c diff --git a/src/files/lang/jap-final/lueJ.c b/src/files/lang/jap-final/lueJ.c new file mode 100644 index 000000000..22550fb26 --- /dev/null +++ b/src/files/lang/jap-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„·‚ÓÏÃãÓ‚ä‚…ÏÍ´Ì‚­ƒšÒ„ƒÙð߀‚݃€ãÏÎâƒÏ€€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÆâÒð€ÂƒÁ‚ÚƒÂÒ‚ÏÓƒÔƒƒÎ‚Í‚•æºá€ÈãÓ€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÒ‚ÝÏÓ‚û‚ü„üÄλóÜà»É»€Âƒ•‚ÒÒ€ï€Ê€Û€Í€ÏóÓ€„³‚ÔҀ܀ÑÒƒËÂæƒ¥àãâÓíð€Â‚ÛÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âæÎ€Â\n\n|‚µ‚¶€‘€¾€ù‚„†‚„€Û€Ü€â€ð¸…£‚ÎÇß\n\nÃÒ€ù‚„†‚„€Û€Ü€â€ðÏ€‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÒ€Ü€â€ø€ÜƒÁ‚ÚÓ‚É‚Îà〄§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÏ‚×Ê‚ØÍÄãÉÒð€Â‚§Ò‚ž‚Ÿƒ“ÒƒÓƒ…¸‚¹‚ºÆâÉÛÏÓ€ÃÒ€ù‚„†‚„€Û€Ü€â€ðҀـπã€ú‚„€ø€ô€å€Ê€ã¸…£†¨ó…£‚ÎÆâƒ‡ƒƒæºâ€Âƒ»àÁÈãÓ€‚˜‡ÌÒ€ñ€Ñ€Ï€…€Ù€Ï‘€Ì‚„€ßÏ‚›ØãÉß¼ÎƒŠƒçϺâÓíð€Â\n\n|‚µ‚¶€’€¾ƒÏƒ¤€÷€Ï€Õ¸€Ý€Ê€ãÇß\n\n€Ó€÷€Ð€•€‘Ò‚˜‡Ì€Ý€×€Û€Í€ÏÓ€†­†®„½Îôæ€Ý€Ê€ãóÀλ߼Ïδ̻â€ÂËØá‚䂅҃σ¤€Û€Ü€â€ðÜ€‚§æ‚˜‡ÌÏ‚ö´Éƒ“ƒÎó‚ù½ÎÁδÌÅØ¼Òð€ÂÃ㸄žèÉÛÏ€‚Ÿ‚ö‚€‚¼ÁÒ€ö€ö€Ð€Ï€â€äÏ€ƒÏƒ¤€÷€Ï€Õ¸€Ý€Ê€ãÅ̾Áƒ‡ƒƒæºâ€Â\n\n|‚µ‚¶€“€¾‚üƒÃ…¸‚×€ú€Ê€ã¸‚΂ÏÇß\n\n€ù‚„†‚„€Û€Ü€â€ð¸‚΂ÏÅÌÜ€‚˜‡ËÏ»â‚üƒÃ…¸‚×€ú€Ê€ãÈÒÜÒæ‚€Ë€î΄օØð€Â‚¡‚¢Î„ùáÃ㸂΂ÏÅ̾ÁÒð€Â‚ä‚…æ‚ö‚ÝÅɃ¡ƒ¢óÓ‚˜‡ËÏ€’˺´Éæ€Ü¼…«Åºâ‚¡‚¢ƒßܺâ€Â\n\n|‚µ‚¶€”€¾…Ž„Á„Ê€Ó€÷€ÐÖ„Ñ‚öÇß\n\n‚Ÿ‚ö‚€¿àØÍÜÏ‚öâÒÓƒ—…‘‚Ú…çÎÒó€…Ž„Á„Ê€Ó€÷€ÐÖÓ€Ó€ùŽ‚„€ß‚„¸‚ù´Ì„Ñ‚öÆâÒæß»ð伀‚䂅Ҁ܀ѿàÒ„ì„íÏßãõ€€Ó€ùŽ‚„€ß‚„¸‚Ä¿ÆÏÓ€Õ‚„Š€Ö‚„惇ƒƒó€ƒÛ„‚“¿à„ß¼ÃÍæóÀâȼð€Â\n\n|‚µ‚¶€•€¾„³‚ÔҀ܀Ñ̈́΃àÇß\n\n‚䂅Ҁ܀ÑÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âÉÛ€‚µ‚¶€Ó€÷€Ð¿àƒÆÀÁ„ÌãâÃÍÓ†¯…¨ð€ÂÅÉæ´Ì‚§Ò‚Ô¿à‚Û¸‚ÉËÂ⃇ƒƒæºâ€Â…Ž„Á„Ê€Ó€÷€ÐÓ€’€ë€ú€Ð‚„ºâ怂ÛÓÈÒ»íã¿Ï»âÍÒÃÍð€Â…¹…õÎæàÈニ‡ËÒ„ì„íÓλ€Â\n\nEND\n", + /* 1*/ "€Ó€÷€Ð€•€‘€‚–†§", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„·‚ÓÏÃãÓ‚ä‚…ÏÍ´Ì‚­ƒšÒ„ƒÙð߀‚݃€ãÏÎâƒÏ€€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÆâÒð€ÂƒÁ‚ÚƒÂÒ‚ÏÓƒÔƒƒÎ‚Í‚•æºá€ÈãÓ€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÒ‚ÝÏÓ‚û‚ü„üÄλóÜà»É»€Âƒ•‚ÒÒ€ï€Ê€Û€Í€ÏóÓ€„³‚ÔҀ܀ÑÒƒËÂæƒ¥àãâÓíð€Â‚ÛÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âæÎ€Â\n\n|‚µ‚¶€‘€¾€ù‚„†‚„€Û€Ü€â€ð¸…£‚ÎÇß\n\nÃÒ€ù‚„†‚„€Û€Ü€â€ðÏ€‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÒ€Ü€â€ø€ÜƒÁ‚ÚÓ‚É‚Îà〄§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÏ‚×Ê‚ØÍÄãÉÒð€Â‚§Ò‚ž‚Ÿƒ“ÒƒÓƒ…¸‚¹‚ºÆâÉÛÏÓ€ÃÒ€ù‚„†‚„€Û€Ü€â€ðҀـπã€ú‚„€ø€ô€å€Ê€ã¸…£†¨ó…£‚ÎÆâƒ‡ƒƒæºâ€Âƒ»àÁÈãÓ€‚˜‡ÌÒ€ñ€Ñ€Ï€…€Ù€Ï‘€Ì‚„€ßÏ‚›ØãÉß¼ÎƒŠƒçϺâÓíð€Â\n\n|‚µ‚¶€’€¾ƒÏƒ¤€÷€Ï€Õ¸€Ý€Ê€ãÇß\n\n€Ó€÷€Ð€•€‘Ò‚˜‡Ì€Ý€×€Û€Í€ÏÓ€†­†®„½Îôæ€Ý€Ê€ãóÀλ߼Ïδ̻â€ÂËØá‚䂅҃σ¤€Û€Ü€â€ðÜ€‚§æ‚˜‡ÌÏ‚ö´Éƒ“ƒÎó‚ù½ÎÁδÌÅØ¼Òð€ÂÃ㸄žèÉÛÏ€‚Ÿ‚ö‚€‚¼ÁÒ€ö€ö€Ð€Ï€â€äÏ€ƒÏƒ¤€÷€Ï€Õ¸€Ý€Ê€ãÅ̾Áƒ‡ƒƒæºâ€Â\n\n|‚µ‚¶€“€¾…Ž„Á„Ê€Ó€÷€ÐÖ„Ñ‚öÇß\n\n‚Ÿ‚ö‚€¿àØÍÜÏ‚öâÒÓƒ—…‘‚Ú…çÎÒó€…Ž„Á„Ê€Ó€÷€ÐÖÓ€Ó€ùŽ‚„€ß‚„¸‚ù´Ì„Ñ‚öÆâÒæß»ð伀‚䂅Ҁ܀ѿàÒ„ì„íÏßãõ€€Ó€ùŽ‚„€ß‚„¸‚Ä¿ÆÏÓ€Õ‚„Š€Ö‚„惇ƒƒó€ƒÛ„‚“¿à„ß¼ÃÍæóÀâȼð€Â\n\n|‚µ‚¶€”€¾„³‚ÔҀ܀Ñ̈́΃àÇß\n\n‚䂅Ҁ܀ÑÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âÉÛ€‚µ‚¶€Ó€÷€Ð¿àƒÆÀÁ„ÌãâÃÍÓ†¯…¨ð€ÂÅÉæ´Ì‚§Ò‚Ô¿à‚Û¸‚ÉËÂ⃇ƒƒæºâ€Â…Ž„Á„Ê€Ó€÷€ÐÓ€’€ë€ú€Ð‚„ºâ怂ÛÓÈÒ»íã¿Ï»âÍÒÃÍð€Â…¹…õÎæàÈニ‡ËÒ„ì„íÓλ€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„·‚ÓÏÃãÓ‚ä‚…ÏÍ´Ì‚­ƒšÒ„ƒÙð߀‚݃€ãÏÎâƒÏ€€‡€ë€ù€ÏŠ€ˆ¸‚¨‚ŸÆâÒð€ÂƒÁ‚ÚƒÂÒ‚ÏÓƒÔƒƒÎ‚Í‚•æºá€ÈãÓ€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€ÏÒ‚ÝÏÓ‚û‚ü„üÄλóÜà»É»€Âƒ•‚ÒÒ€ï€Ê€Û€Í€ÏóÓ€„³‚ÔҀ܀ÑÒƒËÂæƒ¥àãâÓíð€Â‚ÛÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âæÎ€Â\n\n|‚µ‚¶€‘€¾€ù‚„†‚„€Û€Ü€â€ð¸…£‚ÎÇß\n\nÃÒ€ù‚„†‚„€Û€Ü€â€ðÏ€‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÒ€Ü€â€ø€ÜƒÁ‚ÚÓ‚É‚Îà〄§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÏ‚×Ê‚ØÍÄãÉÒð€Â‚§Ò‚ž‚Ÿƒ“ÒƒÓƒ…¸‚¹‚ºÆâÉÛÏÓ€ÃÒ€ù‚„†‚„€Û€Ü€â€ðҀـπã€ú‚„€ø€ô€å€Ê€ã¸…£†¨ó…£‚ÎÆâƒ‡ƒƒæºâ€Âƒ»àÁÈãÓ€‚˜‡ÌÒ€ñ€Ñ€Ï€…€Ù€Ï‘€Ì‚„€ßÏ‚›ØãÉß¼ÎƒŠƒçϺâÓíð€Â\n\n|‚µ‚¶€’€¾…Ž„Á„Ê€Ó€÷€ÐÖ„Ñ‚öÇß\n\n‚Ÿ‚ö‚€¿àØÍÜÏ‚öâÒÓƒ—…‘‚Ú…çÎÒó€…Ž„Á„Ê€Ó€÷€ÐÖÓ€Ó€ùŽ‚„€ß‚„¸‚ù´Ì„Ñ‚öÆâÒæß»ð伀‚䂅Ҁ܀ѿàÒ„ì„íÏßãõ€€Ó€ùŽ‚„€ß‚„¸‚Ä¿ÆÏÓ€Õ‚„Š€Ö‚„惇ƒƒó€ƒÛ„‚“¿à„ß¼ÃÍæóÀâȼð€Â\n\n|‚µ‚¶€“€¾„³‚ÔҀ܀Ñ̈́΃àÇß\n\n‚䂅Ҁ܀ÑÓ„§‚˜Ò‚‰ƒŽƒÏ‚Ê‚ÍÅÌ»âÉÛ€‚µ‚¶€Ó€÷€Ð¿àƒÆÀÁ„ÌãâÃÍÓ†¯…¨ð€ÂÅÉæ´Ì‚§Ò‚Ô¿à‚Û¸‚ÉËÂ⃇ƒƒæºâ€Â…Ž„Á„Ê€Ó€÷€ÐÓ€’€ë€ú€Ð‚„ºâ怂ÛÓÈÒ»íã¿Ï»âÍÒÃÍð€Â…¹…õÎæàÈニ‡ËÒ„ì„íÓλ€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "€ù‚„†‚„€Û€Ü€â€ð¸…£‚ÎÇß\n", + /* 10*/ "ƒÏƒ¤€÷€Ï€Õ¸€Ý€Ê€ãÇß\n", + /* 11*/ "‚üƒÃ…¸‚×€ú€Ê€ã¸‚΂ÏÇß\n", + /* 12*/ "…Ž„Á„Ê€Ó€÷€ÐÖ„Ñ‚öÇß\n", + /* 13*/ "„³‚ÔҀ܀Ñ̈́΃àÇß\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "‚Ýá¶¼…¤\n", + /* 17*/ "‚Ýá¶¼…¤\n", + /* 18*/ "‚Ýá¶¼…¤¸‚ÝÏ‚öãÉ\n", + /* 19*/ "‚üƒÃ…¸‚×€ú€Ê€ã¸‚΂ÏÅÉ\n", + /* 20*/ "ƒ…ÌÒ‚üƒÃ…¸‚×€ú€Ê€ã¸‚΂ÏÅÉ\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "ƒÏƒ¤€÷€Ï€Õ\n", + /* 24*/ "ƒÏƒ¤€÷€Ï€Õ\n", + /* 25*/ "ƒÏƒ¤€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 26*/ "ƒÏƒ¤€÷€Ï€Õæ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 27*/ "ƒÏƒ¤€÷€Ï€Õæ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 28*/ "€Ð€Ï€â€äæ‚΂ÏÄãÉ\n", + /* 29*/ "€Ð€Ï€â€äæ‡Ë†¤ÅÉ\n", + /* 30*/ "€Ð€Ï€â€äæ‡Ì…éÅÉ\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "€Õ‚„Š€Ö‚„\n", + /* 34*/ "€Õ‚„Š€Ö‚„\n", + /* 35*/ "€Ó€ùŽ‚„€ß‚„Ò€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 36*/ "€Ó€ùŽ‚„€ß‚„ÖҀЀ׀݀܄ڄۀ¾\n€Õ‚„Š€Ö‚„惇ƒƒ\n", + /* 37*/ "€Õ‚„Š€Ö‚„‚DŽ耨€¤€¾€Ó€ùŽ‚„€ß‚„ƒÛ‚ĄׄØ\n", + /* 38*/ "€Ó€ùŽ‚„€ß‚„ƒâƒˆ‚¡‚¢\n", + /* 39*/ "…Ž„Á„Ê€Ó€÷€ÐÖ„Ñ‚öÅÉ\n", + /* 40*/ "„³‚ÔҀ܀Ñ̈́΃àÅÉ\n", + /* 41*/ "€ù‚„†‚„€Û€Ü€â€ðæ…£‚ÎÄãÉ\n", + /* 42*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 43*/ "€ñ€Ñ€Ï€ÿ‚„€ãæ„×»É\n", + /* 44*/ "€ñ€Ñ€Ï€ÿ‚„€ãæ…ëÄãÉ\n", + /* 45*/ "€Ð€×€Ý€Üæ„Ú„ÛÄãÉ\n", + /* 46*/ "…£†¨æ€Ý€Ê€ãÄãÉ\n", + /* 47*/ "„Ñ‚öƒî‚Ȃɀ€Ý€Ö€Ì€÷€â€Æ€Û€Ü€â€ðƒÛ‚Ä\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "…£†¨\n", + /* 51*/ "…£†¨\n", + /* 52*/ "…£†¨¸‚ÝÏ‚öãÉ\n", + /* 53*/ "€ù‚„†‚„€Û€Ü€â€ðҀـπã€ú‚„€øÓ\nÈÒ‚˜‡Ì…¿Åà€Â\n", + /* 54*/ "ºãæ€Ð€Ï€â€äÑ€ÂóÜ€º¹Îσ޻Í\n†°éÌ܅ܿλ倎\n", + /* 55*/ "…Ž„Á„Ê€Ó€÷€ÐÖÒ€Ó€ùŽ‚„€ß‚„Ó\nÃÒ€ñ€Ñ€Ï€ÿ‚„€ãÒƒ†Ã¼Ñ€Â\n", + /* 56*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×€ÃÊà‚€Í€ä€Ú€Ïð€Â\n€Ô€ùÓ‚‰ƒŽƒÒ…ކ±ó‚¼ÁÏ»â¿à\n‚×ËÎ߀´\n", + /* 57*/ "€Ó€ùŽ‚„€ß‚„Ҁـπã€ú‚„€ø‚Í‚•æ‚΂ÏÄãÉ\n", + /* 58*/ "‚€Í€Ð€Ï€ä€ÂÃÒƒ¡ƒ¢Ó€Ó€÷€Ð€•€‘Ï\n„‚öÅÉ‚ä‚…Ò€Ü€Ñæ‚Ý‚”ÅÉÜÒð€Â\n", + /* 59*/ "ÃÃæ‚§Ò„Ñ‚ö”€Ñ€Ï€ãð€Â„§‚˜Ò…ÐÒ\nºØá‚ùåã̻λ€ì€÷”‚„€ãð€Â\n", + /* 60*/ "ÃÒ†§¸ƒÅ‚ÎÆâÒð€Â\nſł—ƒÏÓƒµ¸ËÂä€Â\n", + /* 61*/ "ÃÒ€ö€ö€Ð€Ï€â€äæ\n„§‚˜Ò€ñ€Ñ€ÏƒÏƒ¤†ˆƒŽóºâ€Â\npÁãèãÜ‚—ƒÏÓƒµ¸ËÂä€Â\n", + /* 62*/ "‚ª€À€Ã『€´\n", + /* 63*/ "Ããæ‡ŽÒ€‡€ë€ù€ÏŠ€ˆð€Â\nƒ´†²¸‚ñ´Ì»âß¼ð€Â\np€ó€áàÓ‚ƒƒÏáÒ€â€Ü€ã¸†³½\nÆèÏ‚††ž¸„ØÛâß¼ð€Â\n", + /* 64*/ "óÜ€Î€À\n", + /* 65*/ "…Ú„¤Ó€À€ƒ¼Å¿€ßäÅ»€Â\nóÓ€ƒ»óÁãÉØ½€Â\n", + /* 66*/ "€‘€€’€˜€ï€Ê€Û€Í€Ï…•…–€Â\n€Ó€÷€Ð€•€‘τтö„ׄ؀Â\n", + /* 67*/ "€Ó‚„‚€È€Ï€ã€…†‚„€×€Ã´Êð€´\n", + /* 68*/ "ºÎÉæ‚€Í€ä€Ú€Ï€À\nƒ”ÓÌ´Àဎ\n", + /* 69*/ "€‡Ì´Àဈô¼ÅÉ´Ì€À\n", + /* 70*/ "ºÎÉÒ… ‚‹Ó‹€ùɹðÍ„ª´Ì»Éå€Â\nùÎÝá‚Ôó€ßÁƒ¨ÀÌÃãÉåÑ€Â\n", + /* 71*/ "‚§Ò‘€Ï€à¸‚¨´Ìݴɹð\n", + /* 72*/ "ƒ”Ò‘€Ï€à€À\n", + /* 73*/ "ȼ¿€‚§ÓûËÏ‚×ÉãÉ¿´ÉÒ¿€Ž\nιÎà„§‚˜Ò‚‰ƒŽƒ¸Ü´Í„Õù¼¿€À\n", + /* 74*/ "å¿´Éå€ÂܼßÅØÅ·€Â\nƒ¼„„΃àóÀÉÃ͸„ã…œÆâå€Â\n", + /* 75*/ "†µ‚¹‚ÇÒƒ°‚‹æ„„ÅÄãÉ€…Ÿ‚“‚‰‚ŠÇß\n", +}; diff --git a/src/files/lang/jap-final/lueP.c b/src/files/lang/jap-final/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/jap-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_f.c b/src/files/lang/jap-final/lue_str_f.c new file mode 100644 index 000000000..55cdb911a --- /dev/null +++ b/src/files/lang/jap-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Désactiver robots Interceptors\n\nUne fois le radar coupé, les robots Interceptors vous poseront un problème. Détruisez un maximum d'unités au sol. Notre dernière photo satellite en révèle deux mais il risque d'y en avoir plus.\n\n|Objectif 4: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer Déroute-Comms sur antenne\n", + /* 11*/ "Désactiver robots Interceptors\n", + /* 12*/ "Accéder à l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor désactivé.\n", + /* 20*/ "Tous robots Interceptors désactivés.\n", + /* 21*/ "Obtenir Déroute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "Déroute-Comms\n", + /* 24*/ "Déroute-Comms\n", + /* 25*/ "Déroute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication placé correctement.\n", + /* 27*/ "Mouchard de communication mal placé.\n", + /* 28*/ "Antenne détruite.\n", + /* 29*/ "Antenne levée.\n", + /* 30*/ "Antenne baissée.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Accès ascenseur refusé - carte requise.\n", + /* 37*/ "Carte acceptée - ascenseur opérationnel.\n", + /* 38*/ "Ascenseur opérationnel.\n", + /* 39*/ "Hangar pénétré.\n", + /* 40*/ "Agent de l'IC contacté.\n", + /* 41*/ "Radar d'interception coupé.\n", + /* 42*/ "Objet crucial détruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale fermée.\n", + /* 45*/ "Accès refusé.\n", + /* 46*/ "Explosif placé.\n", + /* 47*/ "Intrus détecté - systèmes sécurité branchés.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrôlé depuis \nce bunker.\n", + /* 54*/ "Voilà l'antenne, mais... Je ne peux pas lancer \nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derrière \ncette grande porte.\n", + /* 56*/ "Attention à ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'accès ascenseur détruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltré \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entrée: un héliport \nabandonné en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derrière ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun Déroute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention à la sécurité.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas blessé \nbien qu'il n'ait pas encore repris ses \nesprits. De toute évidence, les chirurgiens \nont presque achevé leurs préparations \net vont bientôt entamer la dissection.\n", + /* 64*/ "Mais qui est...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28. \nJe suis sur le point d'accéder au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voilà, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous étiez mort. Vous devez \navoir une bonne étoile pour être \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-être que ce garde vous \ndescende? Très bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je préviens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet étranger détecté - sécurité alertée.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_g.c b/src/files/lang/jap-final/lue_str_g.c new file mode 100644 index 000000000..9bf3c166c --- /dev/null +++ b/src/files/lang/jap-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter außer Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Beschädigen Sie so viele Einheiten, wie möglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es können sich noch weitere Roboter am Gelände befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter außer Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen\n", + /* 19*/ "Abfang-Roboter außer Kraft gesetzt\n", + /* 20*/ "Alle Abfang-Roboter wurden außer Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstört.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlüsselkarte für den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlüsselkarte\n", + /* 34*/ "Schlüsselkarte\n", + /* 35*/ "Schlüsselkarte aufgenommen\n", + /* 36*/ "Zutritt zum Aufzug verweigert - Schlüsselkarte wird benötigt.\n", + /* 37*/ "Schlüsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstört.\n", + /* 43*/ "Haupttor wurde geöffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert\n", + /* 46*/ "Sprengkörper wurde platziert.\n", + /* 47*/ "Eindringling - Überwachungssystem online\n", + /* 48*/ "Erlangen Sie die Sprengsätze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengsätze\n", + /* 51*/ "Sprengsätze\n", + /* 52*/ "Sprengsätze aufgenommen\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den Überbrücker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervösen Zeigefinger, Agent Dark - \nDu näherst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstört.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren können. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als wäre er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nhätten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drüben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt überlebt hast.\n", + /* 71*/ "Ich musste ja die Löcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Löcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwürdest, wenn er auf dich geschossen hätte. Aber wenn \ndu möchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkörper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/jap-final/lue_str_i.c b/src/files/lang/jap-final/lue_str_i.c new file mode 100644 index 000000000..f54152979 --- /dev/null +++ b/src/files/lang/jap-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti più possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna è stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore è in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea è \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lassù!\n", + /* 55*/ "L'ascensore dell'hangar è oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 è riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo è il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c'è un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No! Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nAnche se stento a crederci sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri già fatto scoprire! \nE francamente se questo è il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per più di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicherò all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/jap-final/lue_str_s.c b/src/files/lang/jap-final/lue_str_s.c new file mode 100644 index 000000000..a9fe8e183 --- /dev/null +++ b/src/files/lang/jap-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor aéreo apagado, los propios robots interceptores serán un problema. Destruye tantas unidades en tierra como sea posible; nuestra última foto de satélite muestra dos en tierra, pero quizá haya más.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 1*/ "ÁREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Tres: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor aéreo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espía del IC\n", + /* 14*/ "Obtén granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores están desactivados.\n", + /* 21*/ "Obtén controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Control com.\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obtén llave magnética del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave del ascensor\n", + /* 34*/ "Llave magnética del ascensor\n", + /* 35*/ "Llave magnética del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magnética requerida.\n", + /* 37*/ "Llave magnética aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor está completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor aéreo apagado.\n", + /* 42*/ "Objeto crítico de la misión destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obtén explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor aéreo es controlado desde \nese búnker.\n", + /* 54*/ "Ahí está la antena, pero... ¡no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar está al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark. Te estás acercando a mi posición.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el Área 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "Éste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro están detrás de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aquí está la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando estés dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "¡Oh, Dios mío!\n", + /* 63*/ "Aquí está nuestro amigo. Parece que no \nestá físicamente dañado, aunque no ha \nrecuperado la consciencia todavía. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzarán \npronto con la disección.\n", + /* 64*/ "¿Pero qué es...?\n", + /* 65*/ "¿Alguna pregunta? No. Bien. Después \nirás al hangar.\n", + /* 66*/ "Informe de Misión del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el Área 51.\n", + /* 67*/ "¡Agente Dark! ¡Aquí!\n", + /* 68*/ "¡Aquí estás! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "¿Si qué?\n", + /* 70*/ "Si habías sido descubierto ya. Y francamente, \nsi así es como trabajas, estoy asombrada de \nque hayas sobrevivido más de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "¿Mis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que él \nte disparara. Puedo llamar a más guardas \nsi tú quieres...\n", + /* 74*/ "Vale, vale, olvídalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extraño detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/jap-final/miscE.c b/src/files/lang/jap-final/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/jap-final/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/miscJ.c b/src/files/lang/jap-final/miscJ.c new file mode 100644 index 000000000..057e1d7a4 --- /dev/null +++ b/src/files/lang/jap-final/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "€Ó€ö‚„\n", + /* 1*/ "€ï€Ê€Û€Í€Ï„ì„íÓºáØÇ¹\n", + /* 2*/ "\n", + /* 3*/ "‚µ‚¶ ", + /* 4*/ " ‚ó‚ô\n", + /* 5*/ " †µ‚ó‚ô\n", + /* 6*/ " ‚ñ‚ò\n", + /* 7*/ "ºÍ€‘ƒ˜\n", + /* 8*/ "‚¾‚Ú‚ ‚¢€‚µ‚¶¸…džâÅÌÁðÄ»\n", + /* 9*/ "ݺ€Â\n", + /* 10*/ "‚ªð€ÈÒ‚àÓ€À\n", + /* 11*/ "‚à¸Ã´Êσ†Ââ¹ìµÎ»€´\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "„Ù„±", + /* 22*/ "…þ", + /* 23*/ "ƒª", + /* 24*/ "ƒº", + /* 25*/ "‚ß", + /* 26*/ "†‰", + /* 27*/ "„Ù„±€ß€Ñ’", + /* 28*/ "…þ€ß€Ñ’", + /* 29*/ "ƒª€ß€Ñ’", + /* 30*/ "ƒº€ß€Ñ’", + /* 31*/ "‚߀߀ђ", + /* 32*/ "†‰€ß€Ñ’", + /* 33*/ "„õ†¶€ß€Ñ’", + /* 34*/ "„ž†·€ß€Ñ’", + /* 35*/ "…£‚Ȁ߀ђ", + /* 36*/ "†……â€ß€Ñ’", + /* 37*/ "ƒ„‚݀߀ђ", + /* 38*/ "ƒšƒû€ß€Ñ’", + /* 39*/ "†¸…þ€ß€Ñ’", + /* 40*/ "… ƒÇ€ß€Ñ’", + /* 41*/ "†¹…õ€ß€Ñ’", + /* 42*/ "ƒÞ‚ÿ€ß€Ñ’", + /* 43*/ "†œ‚ÿ€ß€Ñ’", + /* 44*/ "ƒê‚׀߀ђ", + /* 45*/ "„Ù„±€ß€Ñ’€¾ƒ…€Û€ï€Ì€ö€Ï€ãÒ‚ó‚­Ü…þ»Ò󀌀ý€ä‚„Ï‚­‡•€Â„ª„ЀùŽ€øÓƒ¸ƒ¹ÏƒšÁ€…·‚ׂ¢‚‚܃¸ƒ¹Ïƒš»€Â\n", + /* 46*/ "…þ€ß€Ñ’€¾„§„·ƒÑ΀Ѐ׀ۀ̀𽄪„ЀùŽ€øÅ¿‚ÕÉλ怃“ς݃º»€Â\n", + /* 47*/ "ƒª€ß€Ñ’€¾ƒªÒ„±‚ý’€ù€Ñ€ó‚„Í„÷ìÁà»Ò…„‚‚€Â\n", + /* 48*/ "ƒº€ß€Ñ’€¾‡Ë‚Ò„±‚ý’€ù€Ñ€ó‚„Í„÷ìÁà»Ò…„‚‚€Â\n", + /* 49*/ "‚߀߀ђ€¾…€†›Ò‚—€Â‚­Ü€Ð€×€Û€Í€Ï€½„ª„ЀùŽ€øæƒÞ»€Û€ï€Ì€ö€Ï€ã€Â€ùŽ€ø€Ð€Ê’ÅÉ’€ù€Ñ€ó‚„Ó€»íãÃÒ€Û€ï€Ì€ö€Ï€ãÍÅ¿‚‘»ÉÁÎÁÎâÃÍóºä¼€Â\n", + /* 50*/ "†‰€ß€Ñ’€¾‰‚„€ß†€Ñ€Ï„“æ€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò€Ó‚„‚€È€Ï€ãÏ‚ü…ÂÆâÉÛτׂÈÅÉ’€ú€ã€ß€Ñ’Ҁڀт„€þ€Â†˜Ò€Û€ï€Ì€ö€Ï€ã͆¦Îင±‚ý掂„€ÜÍδ̻λÒ󀄱‚ýóÓ‚ ‚¡‚¢Î‚ÄÀ¸Æâ€Â\n", + /* 51*/ "„õ†¶€ß€Ñ’€¾€Ò€È”€ÏÒ‚ùƒˆÏƒê‚üÆâ………†ƒîÉÊÒ€Û€ï€Ì€ö€Ï€ã€Â€Ü€â‚„‚‚ó€Ò€È”€Ï¸„€Å†ŽÀ€‚ÉËÂɀҀȔ€ÏÓ€Ö‚„’ÅÌ’€ù€Ñ€ó‚„æ€ÿ€Ê€ãóÀÎ»ß¼ÏÆâ€ÂÃÒ€Û€ï€Ì€ö€Ï€ã¸‚×Ìõ€‚մ̻ɀҀȔ€Ï¸»ÁË¿‚ØÍƿ܀´\n", + /* 52*/ "„ž†·€ß€Ñ’€¾ƒ¹Ï€Û‚„€øŠ¸‚­ƒºÏÅÉæâ€Û€ï€Ì€ö€Ï€ã€Â€Û‚„€øŠ¸‚ñ¼Í€ÆèÏ„ÙÅ»€Û‚„€øŠ¸„€ÅÏ¿¿â€ÂÈҀ܀₄‚Ï€Û‚„€øŠæƒ¼Âãõƒ…Áƒ¼ƒ´„³€´\n", + /* 53*/ "…£‚Ȁ߀ђ€¾ÃÒ€Û€ï€Ì€ö€Ï€ãӃσ¹Ò‘€Ü€ã€øÝƒ—‚Ä„à‚àßáÜ€ƒÆÀÎ…£‚ȸ‚ÃÃÆ€Ò€È”€Ï¸†±Ú€ÂÃãÏÓ…£‚Ȇ„҃䀒‚Ì„½€ò‚„Џ‚ÕˀҀȔ€ÏÜÕÁØãâ€Â\n", + /* 54*/ "†……â€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÓ€€ß‚„€ÿ€Ê€ã¸‚Î‚ÏÆâÃ̓‹‚–Ó‚ªÜ„н̻λ€Âƒ¸ƒ¹Ï‚í‚׃Ñó€‚ý„λÎôӄнλ€Â‚ÙÄãâÃ͸ƒ…Áƒ»ãλÒ󃃄®ƒ´€´\n", + /* 55*/ "ƒ„‚݀߀ђ€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÜ„õ†¶€ß€Ñ’„÷…”€€Ò€È”€ÏÒ‚ùƒˆÏƒê‚üÅÌ»â€ÂſѸ‚̂̀ـϋ€Ê€ãÏÎâÍ€ƒŸæƒÿÒß¼ð€Âƒ¹Ïƒ„‚ÝóÒ€ë€Å€Ñ€ã¿€‚̂͂†‚ø¸Å¿ÂÌÁâ€Â\n", + /* 56*/ "ƒšƒû€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÓ€‡…þ»ÜÒ»ìÛ€ˆæƒÆ†±À€Â‚‚ŸƒÍÅÉõ¿áÒ’€ù€Ñ€ó‚„Ý€…þ»€Ò€È”€Ï¸‚Õ´Ì»Éá‚‹‚‚憖´Ì»â’€ù€Ñ€ó‚„¸‚Ö´ÌÁâ€Â\n", + /* 57*/ "†¸…þ€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÓ„·‚ÓÓ‚‘»ÉÁλàÅÁ€ƒ‰é̃¨À…¹ä¼ÍÆâ€Âƒ³‚Ýæ…þȼÎÍÀð‚í‚×ÅÌÁâæ€»»‚ขŸÆ¿‚×Ë¿ÆâÍ€ƒ‰é‚ŸÆðä¼€´\n", + /* 58*/ "… ƒÇ€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÓ€ƒšƒû€ß€Ñ’Ò‚‘»‚Ô¸‚ɇÌÅÌ»â€Â… ƒÇ€ß€Ñ’àÅÁ€ƒ¥ƒÎÒ„Ü»ƒ³‚ݸ‚ÙÅÏ‚ÚÁ€Âƒ—ƒ˜Òƒ¥ƒÎÏË»ÌÓ€ßီ€©Åß¼ÍÆâ€Â\n", + /* 59*/ "†¹…õ€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ã悃ƒ¬€ß‚„€ÿ€Ê€ã¸ƒ½ÛâÍ€€ÿ‚„€ð憳åâØóí´Í†¹…õó†Ä»¿ÂÌÁâÒóꃈ„†€´‚ÙÄãÉÍÃäó€ß‚„€ÿ€Ê€ãÓ‚Êåàλ€Â\n", + /* 60*/ "ƒÞ‚ÿ€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãӀܑ‚„Š€ã€ù‚„€å€Ï€þ¸„¼¹ó»â€Â’€ù€Ñ€ó‚„ÏÆè†Ä»Ë»ÌÅØ¼Òó‚¼…™ó܄Ŵ̻λ„ùဇ«´Ìƒ‰éÌÜ€ð†€Â\n", + /* 61*/ "†œ‚ÿ€ß€Ñ’€¾ÃÒ€Û€ï€Ì€ö€Ï€ãÓ‰‚„€ß†€Ñ€Ï„“Ïߴׂ̄ÈÄãÉ€’€ú€ã€ß€Ñ’Ò€Û‚„€øŠ‚€È€ç€ù‚„€ß‚„¸‚̓ŽÅÌ»â€ÂÃÒ‚€È€ç€ù‚„€ß‚„Ó€ô‚„‚„Ò‚ÐáÏ€ƒÏƒ¹Ò‡ŸÒƒºÄ¸‚ÕË€Û‚„€øŠ¸…Ç‚ŸÆâ€Âſń÷ƒ“Ï€€ô‚„‚„Ò‚ÄÀ¸€Ü€ú‚„ÏÜÅÌÅØ¼Òð€Â†œ‚ÿ€ß€Ñ’Ӏ܀₄‚‡ËÏ€Û‚„€øŠæƒ¼»ƒŠ„ÎóÜ€ÃÒ‚€È€ç€ù‚„€ß‚„¸‚­†Š¿à‚̓ŽÅÌ»â€Â\n", + /* 62*/ "ƒê‚׀߀ђ€¾ƒê‚׀߀ђҀۀï€Ì€ö€Ï€ã¸‚×´Éá‚ÙÅÉáÆâÍ€ñ€ÏŠ‚„ð€ÂûËÓƒ‚Òƒ—ƒ˜¸‚ÙÅɃ³‚ÝÒÙ¸‚í‚×ÅÌÁâ€Â\n", + /* 63*/ "†‚„€×€Ù€Ï‹€Ê€ã\n", + /* 64*/ "€Ü€Ø†‚„\n", + /* 65*/ "€œ€¢€Ó‚„‚€È€Ï€ã\n", + /* 66*/ "‰‚„€ß†€Ñ€Ï\n", + /* 67*/ "€î€Ñ€Ð€ÏÒ‡­ÅÙ\n", + /* 68*/ "€Ó€Ñ€÷€Ð€ÏÒ‚üƒü\n", + /* 69*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤\n", + /* 70*/ "˜€€Ý€Ï€ã€ö€ø\n", + /* 71*/ "˜€€Ý€Ï€ã€ö€ø€´\n", + /* 72*/ "˜€€÷€Ú‚„€à\n", + /* 73*/ "˜€€÷€Ú‚„€à€´\n", + /* 74*/ "˜€€Ó€Ü€Ø€Ñ’\n", + /* 75*/ "˜€€Ó€Ü€Ø€Ñ’€´\n", + /* 76*/ "ƒÿ…Ö\n", + /* 77*/ "ƒÿ…Ö€´\n", + /* 78*/ "€Û€Õ€\n", + /* 79*/ "€Û€Õ€€´\n", + /* 80*/ "€ €•Œ€ø\n", + /* 81*/ "€ €•Œ€ø€´\n", + /* 82*/ "€š€•€‘€ƒÅ‚Î\n", + /* 83*/ "€š€•€‘€ƒÅ‚΀´\n", + /* 84*/ "€š€•€‘€‚¨‚Ÿ\n", + /* 85*/ "€š€•€‘€‚¨‚Ÿ€´\n", + /* 86*/ "€š€•€‘€‚ž‚Ÿ\n", + /* 87*/ "€š€•€‘€‚ž‚Ÿ€´\n", + /* 88*/ "ƒÃ„¦„§‚˜\n", + /* 89*/ "ƒÃ„¦„§‚˜€´\n", + /* 90*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ\n", + /* 91*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ€´\n", + /* 92*/ "ƒÌ‚؃̓Š\n", + /* 93*/ "ƒÌ‚ØƒÍƒŠ€´\n", + /* 94*/ "“€ö‚€Ê€×€’\n", + /* 95*/ "“€ö‚€Ê€×€’€´\n", + /* 96*/ "„‰„Š\n", + /* 97*/ "„‰„Š€´\n", + /* 98*/ "‚£‚¤Ò„žƒø\n", + /* 99*/ "‚£‚¤Ò„žƒø€´\n", + /*100*/ "€Ü€Ø†‚„†ê†ëƒù\n", + /*101*/ "€Ü€Ø†‚„†ê†ëƒù€´\n", + /*102*/ "€Ü€Ø†‚„Ò†…††\n", + /*103*/ "€Ü€Ø†‚„Ò†…††€´\n", + /*104*/ "€Ó€Ï‰€Æ€Ï€þ\n", + /*105*/ "€ö€Ï†€ð\n", + /*106*/ "ƒ…̆†Ã\n", + /*107*/ "†Â†ÃÅλ\n", + /*108*/ "€ö€Ï†€ð\n", + /*109*/ "€Ò€È”€Ï\n", + /*110*/ "‚Ì„½€ò‚„Š\n", + /*111*/ "ƒé„¡\n", + /*112*/ "ƒ„‚Ý\n", + /*113*/ "€ß‚„€ÿ€Ê€ã†Â†Ã\n", + /*114*/ "‚¬ã€¹†Ä½\n", + /*115*/ "‚‘½\n", + /*116*/ "‚çƒÂ€¹†Ä½\n", + /*117*/ "‚çƒÂ\n", + /*118*/ "€ë€÷‚„\n", + /*119*/ "€é€Ê€Ö€Ï€þ\n", + /*120*/ "€ÿ€Ê€ã\n", + /*121*/ "€›€¨€±\n", + /*122*/ "„傲ƒî€¾", + /*123*/ "‚ÙÅÉ€¾", + /*124*/ "Œ€ý€ä‚„ 21\n", + /*125*/ "€ã€ù‚„€å‚„ 20\n", + /*126*/ "€Ð€î€à€Ì€Ð 19\n", + /*127*/ "€ø‚„€Ö‚„ 18\n", + /*128*/ "€è‚„Œ€Ü 17\n", + /*129*/ "€Þ€ø‚€Ë‚„ 16\n", + /*130*/ "€Ó‚„‚€È€Ï€ã 15\n", + /*131*/ "„­€Ó‚„‚€È€Ï€ã 14\n", + /*132*/ "†¬€Ó‚„‚€È€Ï€ã 13\n", + /*133*/ "€Ó€Ö€Ü‚„€ã 12\n", + /*134*/ "Ž€â€ö€Ï 11\n", + /*135*/ "’€ú 10\n", + /*136*/ "‰€Ï‚€Ë€ö€Ü 9\n", + /*137*/ "€Û€Ì‚„€ß‚„ 8\n", + /*138*/ "€é€Ï€ß‚„ 7\n", + /*139*/ "€ê€Ê€ã€î€Ï 6\n", + /*140*/ "€÷‚„€Ú€ø 5\n", + /*141*/ "€Ó€÷‚„€ã 4\n", + /*142*/ "€Ò€ø€ã€ö 3\n", + /*143*/ "„¥‚„€ë€È€×€ã 2\n", + /*144*/ "‚„€ë€È€×€ã 1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "ƒ—…ÿ¸‚¬ã\n", + /*149*/ "…ÿó‚‘½\n", + /*150*/ "…ÿ¸€Ö‚„’\n", + /*151*/ "€ÿ€Ê€ã\n", + /*152*/ "€Ô€å¸‚ÙÇ\n", + /*153*/ "‚¬ã\n", + /*154*/ "ƒ…€Û€ï€Ì€ö€Ï€ã\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "ÃÒƒŠƒçÏӀ݀ʀãóÀØÇ¹€Â\n", + /*158*/ "€ß‚„€ÿ€Ê€ã ", + /*159*/ "ƒ¥ƒÎ ", + /*160*/ "‚­†œƒé‚…¥ ", + /*161*/ "‚È…·Æầ܀߂„€ã\n", + /*162*/ "‚È…·ƒˆƒ´€´\n", + /*163*/ "‚Œ„ùƒ“‚ý ", + /*164*/ "…‚„€Ï€“\n", + /*165*/ "…‚„€Ï€’\n", + /*166*/ "…‚„€Ï€‘\n", + /*167*/ "€Ý€Ï€ß‚„\n", + /*168*/ "…£‚Î\n", + /*169*/ "€Ó€øŒ€Üæ‚ÙãÉ\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "\n", + /*181*/ "†µ‚ùƒˆ\n", + /*182*/ "€à€Ë€ù€Ï‚\n", + /*183*/ "€ÿ‚„€ð†ˆ„ÇÒ€ú‚„Š\n", + /*184*/ "€×€Ñ€Ê€×€Ü€ß‚„€ã\n", + /*185*/ "€ÿ‚„€ð†ˆ„Ç€ƒ‡…¯€„\n", + /*186*/ "€Ù€Ï‹€Ê€ã€Û€ï€Ì€ù‚„€ß\n", + /*187*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤\n", + /*188*/ "„Î‚ðƒ¥ƒÎ\n", + /*189*/ "€Ý€Ê€ã€Ð€Ê’‚ó‚ô\n", + /*190*/ "’€ù€Ñ€ó‚„€‘€€à‚„€ð\n", + /*191*/ "’€ù€Ñ€ó‚„€’€€à‚„€ð\n", + /*192*/ "’€ù€Ñ€ó‚„€“€€à‚„€ð\n", + /*193*/ "’€ù€Ñ€ó‚„€”€€à‚„€ð\n", + /*194*/ "€Û€ï€Ì€ö€Ï€ãÒ„±†Ç\n", + /*195*/ "€‘€à‚„€ðÒ€Û€ï€Ì€ö€Ï€ã†Ç\n", + /*196*/ "€Û€ï€Ì€ö€Ï€ãҀ߀ђ\n", + /*197*/ "€ÿ‚„€ð„ׄØ\n", + /*198*/ "€ÿ‚„€ð¸…ÒÂâ\n", + /*199*/ "†¿„±†ˆ„Ç\n", + /*200*/ "€ÿ‚„€ð†ˆ„Ç\n", + /*201*/ "€×€Ñ€Ê€×€ €¨\n", + /*202*/ "„¥ƒŽ‚ó‚ô€´\n", + /*203*/ "€×€Ñ€Ê€×€à‚„€ð\n", + /*204*/ "’€ù€Ñ€ó‚„ÒÙ\n", + /*205*/ "€Û€ï€Ì€ö€Ï€ãÍÒ†¿„±‚‘\n", + /*206*/ "’€ù€Ñ€ó‚„ÒÙÒ€à‚„€ð‚‘\n", + /*207*/ "’€ù€Ñ€ó‚„‚ü€Û€ï€Ì€ö€Ï€ã\n", + /*208*/ "„³‚Ô€Û€ï€Ì€ö€Ï€ãƒáá\n", + /*209*/ "DR.SPY", + /*210*/ "BOMBSPY", + /*211*/ "ܼ€‘ƒ¬’€ù€ÑÆâ\n", + /*212*/ "€í€ú€þ€ö€ð\n", + /*213*/ "ƒ»ãâÎ\n", + /*214*/ "Ô¿½ÛÏ\n", + /*215*/ "‚£‚‚ƒî€Ù€î€ÏŠ\n", + /*216*/ "…Þãä\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/miscP.c b/src/files/lang/jap-final/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/jap-final/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_f.c b/src/files/lang/jap-final/misc_str_f.c new file mode 100644 index 000000000..b56f65a20 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succès\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas ça sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Armu-Sim", + /* 35*/ "Roket-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "Lâche-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Fixe-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Venge-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un débutant. Il n'est pas très malin et vise très mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacités de base mais il peut être dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les mêmes capacités que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les mêmes capacités qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour améliorer leurs capacités.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg développé par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et récupère les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sûr lui tirer dessus et il en fera peut-être tomber!\n", + /* 52*/ "Armu-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'énergie, Il ira chercher un nouveau bouclier. Cela n'a aucun intérêt s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roket-Sim: Ce simulant adore tout faire sauter. Il préfère l'armement explosif plutôt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour détruire sa cible. Il est très aggressif et ne garde jamais ses distances - même s'il tient une grenade! Faites attention à quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant déteste les armes mais il est en revanche un adversaire teigneux. Il tentera sans arrêt d'assommer ou de désarmer ses adversaires à mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant préfère attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et désarmés ou encore ceux affaiblis par un combat.\n", + /* 57*/ "Lâche-Sim: Ce simulant ne veut pas combattre et préfère fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inférieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il déteste les méthodes du Proie-Sim. Il essaiera de tuer le joueur en tête pour arrondir les scores.\n", + /* 59*/ "Fixe-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Fixe-Sim poursuit un joueur jusqu'à la fin de la partie! Même tué, il reviendra à la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, à moins de connaître un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un générateur de bouclier développé par les scientifiques de la dataDyne. Le générateur projète un bouclier deux fois plus résistant qu'un bouclier normal. Malheureusement, il réduit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil même s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Venge-Sim: Ce simulant attaquera toujours le dernier joueur à l'avoir attaqué ou tué. Réfléchissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Mystère skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base aérienne", + /* 89*/ "Base aérienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "Défense Institut", + /* 99*/ "Défense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "Générique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "Défendre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "Télécharger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer PC\n", + /*122*/ "Tué(e) par", + /*123*/ "Tué", + /*124*/ "Débutant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2e classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent spé.:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Vétéran:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "QuasiPerf.:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "Déf. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "Décapsuleur\n", + /*153*/ "Protéger\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOSé\n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rinçage bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilisé", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu prédéfini\n", + /*184*/ "Démarrage rapide\n", + /*185*/ "Réglages avancés\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. équipe\n", + /*189*/ "Réglages terminés\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par équipe\n", + /*196*/ "Difficulté des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "Réglages joueur\n", + /*200*/ "Réglages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Prêt!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission précédente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_g.c b/src/files/lang/jap-final/misc_str_g.c new file mode 100644 index 000000000..d94c82307 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Für diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENÜGEND - Mission abbrechen.\n", + /* 9*/ "Wachgruß.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "SuizidSim", + /* 37*/ "FaustSim", + /* 38*/ "JägerSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendetSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend für Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein mäßiger Schütze.\n", + /* 46*/ "LeichtSim: Der Simulant verfügt zwar nur über Basis-Intelligenz und -Fähigkeiten, ist aber trotzdem nicht ungefährlich.\n", + /* 47*/ "NormalSim: Der Simulant verfügt über das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfügt über das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. Äußerst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen Fähigkeiten dadurch ständig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun können.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schießen, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "SchildSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natürlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenüber Pistolen und Automatik-Gewehren vor. Zu ersteren gehören auch Waffen, die eine 'explosive' Sekundär-Funktion haben.\n", + /* 54*/ "SuizidSim: Dieser Simulant lässt sich durch nichts aufhalten. Er ist sehr aggressiv und hält keine Distanz zum Gegner. Auch nicht, wenn er eine Granate hält! Seien Sie äußerst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, ähnlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine Fäuste einsetzen. Er wird ständig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "JägerSim: Dieser Simulant jagt bevorzugt schwächere Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, über schwache Bewaffnung verfügen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu kämpfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner über eine schwache Waffe verfügt. Ziehen Sie eine stärkere Waffe, und er wird flüchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des JägerSim. Er wird immer den stärksten Spieler verfolgen, um für einen gleichmäßigen Score zu sorgen.\n", + /* 59*/ "VendetSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendetSim verfolgt diesen Spieler, bis das Spiel vorüber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurück.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen überlegen, daher hat es keinen Sinn, vor ihnen zu flüchten. (Es sei denn, Sie kennen eine Abkürzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfügt über eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Träger, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschränkt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrüstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schießen, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tränen", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Stützpunkt", + /* 89*/ "Stützpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zufällig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anfänger:21\n", + /*125*/ "Azubi:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Normal:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spec-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gefährlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tödlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstörer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Berserker:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hügel\n", + /*150*/ "Halte Hügel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschütze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht genügend Platz für den ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_i.c b/src/files/lang/jap-final/misc_str_i.c new file mode 100644 index 000000000..1de2364e6 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos'è quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodar", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendi", + /* 45*/ "RepPappa: È il replicante più facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non è molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: È dotato di abilità e intelligenza elementari, ma può rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilità sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilità sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il più intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacità.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non è umano, quindi potrebbe avere abilità sovrumane!\n", + /* 51*/ "RepPace: È un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli è probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: È sempre alla ricerca del massimo scudo protettivo. Se perde energia, andrà alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo è distruggere l'avversario ad ogni costo. È molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perciò è molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante è contro l'uso delle armi. Tuttavia non è contro la lotta a mani nude:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodar: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapperà!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguirà quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: È agilissimo e velocissimo: corre molto più veloce del giocatore umano, quindi è inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte più potente di uno scudo normale. Questo però lo impedisce nei movimenti, per cui è molto lento. Il RepTarta è dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendi: Sparando o uccidendo un RepVendi, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "Funzionario CI", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "QG dataDyne", + /* 71*/ "QG dataDyne X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave Skedar", + /*101*/ "Astronave Skedar X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Inventario\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Princip.:21\n", + /*125*/ "Addestr.:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Ag.Grado:14\n", + /*132*/ "Ag.Spec:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profess.:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulner.:3\n", + /*143*/ "SemiPerf:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis è morto.\n", + /*170*/ "Modalità 1", + /*171*/ "Modalità 2", + /*172*/ "Modalità 3", + /*173*/ "Modalità 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Giocat.", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficoltà replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/jap-final/misc_str_s.c b/src/files/lang/jap-final/misc_str_s.c new file mode 100644 index 000000000..8d7328bc3 --- /dev/null +++ b/src/files/lang/jap-final/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay información para esta misión\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misión.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "¿Qué arma es ésa?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/°", + /* 15*/ "y/°", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy Fácil", + /* 22*/ "Fácil", + /* 23*/ "Normal", + /* 24*/ "Difícil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMFácil", + /* 28*/ "SimFácil", + /* 29*/ "SimNormal", + /* 30*/ "SimDifíci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMFácil: Éste es el simulante más fácil de derrotar, y por lo tanto, la mejor elección para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimFácil: Este simulante tiene inteligencia y habilidades básicas; aún así puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifíci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante más inteligente y habilidoso. La mayoría de jugadores querrán usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibernético desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son científicos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... ¡no les importará soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la máxima protección de escudo. Si este simulante pierde algo de energía de su escudo, irá en busca de uno nuevo. ¡No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas antes que las convencionales pistolas o automáticas. ¡Esto también se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendrá ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: ¡Incluso cuando lleva una granada! Sé muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPaz. Aún así, no tiene reservas a la hora de combatir desarmado. Siempre intentará usar sus puños para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los débiles para conseguir muertes fáciles. Buscará jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, así que huirá para intentar sobrevivir. A veces atacará, pero sólo si el oponente tiene un arma inferior. ¡Saca un arma mayor o dispárale, y saldrá corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las tácticas del SimPresa. Siempre intentará matar al jugador que vaya ganando para así igualar los marcadores.\n", + /* 59*/ "SimPelea: ¡Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! ¡Un SimPelea perseguirá al jugador hasta que se acabe el juego! Aunque muera, seguirá guardándote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. ¡Pueden atrapar fácilmente a un humano, así que no huyas de un SimVeloz a menos que conozcas algún buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por científicos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, así que se moverá muy despacio. Los SimTortug llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimVengan, ya que siempre atacará al último jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Acción dataDyne", + /* 67*/ "Lágrimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigación dD", + /* 73*/ "Investigación dD X", + /* 74*/ "Extracción dD", + /* 75*/ "Extracción dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltración A51", + /* 83*/ "Infiltración A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base Aérea", + /* 89*/ "Base Aérea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Créditos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Función\n", + /*111*/ "Órdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener\n", + /*121*/ "Marcar\n", + /*122*/ "Te mató", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aprendiz:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Estrella:14\n", + /*132*/ "Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "Élite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "Completo:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletín\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIÓN NEC.:", + /*160*/ "PRECISIÓN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "¡PREPARADO!\n", + /*163*/ "LÍMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castaño", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafíos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo Rápido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Número de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida Rápida\n", + /*202*/ "¡Preparado!\n", + /*203*/ "Equipo Rápido\n", + /*204*/ "Sólo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misión Previa\n", + /*212*/ "Holografía\n", + /*213*/ "Agresivos\n", + /*214*/ "Pasivos\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigilosos\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/mp10E.c b/src/files/lang/jap-final/mp10E.c similarity index 100% rename from src/files/lang/mp10E.c rename to src/files/lang/jap-final/mp10E.c diff --git a/src/files/lang/mp10J.c b/src/files/lang/jap-final/mp10J.c similarity index 100% rename from src/files/lang/mp10J.c rename to src/files/lang/jap-final/mp10J.c diff --git a/src/files/lang/mp10P.c b/src/files/lang/jap-final/mp10P.c similarity index 100% rename from src/files/lang/mp10P.c rename to src/files/lang/jap-final/mp10P.c diff --git a/src/files/lang/mp10_str_f.c b/src/files/lang/jap-final/mp10_str_f.c similarity index 100% rename from src/files/lang/mp10_str_f.c rename to src/files/lang/jap-final/mp10_str_f.c diff --git a/src/files/lang/mp10_str_g.c b/src/files/lang/jap-final/mp10_str_g.c similarity index 100% rename from src/files/lang/mp10_str_g.c rename to src/files/lang/jap-final/mp10_str_g.c diff --git a/src/files/lang/mp10_str_i.c b/src/files/lang/jap-final/mp10_str_i.c similarity index 100% rename from src/files/lang/mp10_str_i.c rename to src/files/lang/jap-final/mp10_str_i.c diff --git a/src/files/lang/mp10_str_s.c b/src/files/lang/jap-final/mp10_str_s.c similarity index 100% rename from src/files/lang/mp10_str_s.c rename to src/files/lang/jap-final/mp10_str_s.c diff --git a/src/files/lang/mp11E.c b/src/files/lang/jap-final/mp11E.c similarity index 100% rename from src/files/lang/mp11E.c rename to src/files/lang/jap-final/mp11E.c diff --git a/src/files/lang/mp11J.c b/src/files/lang/jap-final/mp11J.c similarity index 100% rename from src/files/lang/mp11J.c rename to src/files/lang/jap-final/mp11J.c diff --git a/src/files/lang/mp11P.c b/src/files/lang/jap-final/mp11P.c similarity index 100% rename from src/files/lang/mp11P.c rename to src/files/lang/jap-final/mp11P.c diff --git a/src/files/lang/mp11_str_f.c b/src/files/lang/jap-final/mp11_str_f.c similarity index 100% rename from src/files/lang/mp11_str_f.c rename to src/files/lang/jap-final/mp11_str_f.c diff --git a/src/files/lang/mp11_str_g.c b/src/files/lang/jap-final/mp11_str_g.c similarity index 100% rename from src/files/lang/mp11_str_g.c rename to src/files/lang/jap-final/mp11_str_g.c diff --git a/src/files/lang/mp11_str_i.c b/src/files/lang/jap-final/mp11_str_i.c similarity index 100% rename from src/files/lang/mp11_str_i.c rename to src/files/lang/jap-final/mp11_str_i.c diff --git a/src/files/lang/mp11_str_s.c b/src/files/lang/jap-final/mp11_str_s.c similarity index 100% rename from src/files/lang/mp11_str_s.c rename to src/files/lang/jap-final/mp11_str_s.c diff --git a/src/files/lang/mp12E.c b/src/files/lang/jap-final/mp12E.c similarity index 100% rename from src/files/lang/mp12E.c rename to src/files/lang/jap-final/mp12E.c diff --git a/src/files/lang/mp12J.c b/src/files/lang/jap-final/mp12J.c similarity index 100% rename from src/files/lang/mp12J.c rename to src/files/lang/jap-final/mp12J.c diff --git a/src/files/lang/mp12P.c b/src/files/lang/jap-final/mp12P.c similarity index 100% rename from src/files/lang/mp12P.c rename to src/files/lang/jap-final/mp12P.c diff --git a/src/files/lang/mp12_str_f.c b/src/files/lang/jap-final/mp12_str_f.c similarity index 100% rename from src/files/lang/mp12_str_f.c rename to src/files/lang/jap-final/mp12_str_f.c diff --git a/src/files/lang/mp12_str_g.c b/src/files/lang/jap-final/mp12_str_g.c similarity index 100% rename from src/files/lang/mp12_str_g.c rename to src/files/lang/jap-final/mp12_str_g.c diff --git a/src/files/lang/mp12_str_i.c b/src/files/lang/jap-final/mp12_str_i.c similarity index 100% rename from src/files/lang/mp12_str_i.c rename to src/files/lang/jap-final/mp12_str_i.c diff --git a/src/files/lang/mp12_str_s.c b/src/files/lang/jap-final/mp12_str_s.c similarity index 100% rename from src/files/lang/mp12_str_s.c rename to src/files/lang/jap-final/mp12_str_s.c diff --git a/src/files/lang/mp13E.c b/src/files/lang/jap-final/mp13E.c similarity index 100% rename from src/files/lang/mp13E.c rename to src/files/lang/jap-final/mp13E.c diff --git a/src/files/lang/mp13J.c b/src/files/lang/jap-final/mp13J.c similarity index 100% rename from src/files/lang/mp13J.c rename to src/files/lang/jap-final/mp13J.c diff --git a/src/files/lang/mp13P.c b/src/files/lang/jap-final/mp13P.c similarity index 100% rename from src/files/lang/mp13P.c rename to src/files/lang/jap-final/mp13P.c diff --git a/src/files/lang/mp13_str_f.c b/src/files/lang/jap-final/mp13_str_f.c similarity index 100% rename from src/files/lang/mp13_str_f.c rename to src/files/lang/jap-final/mp13_str_f.c diff --git a/src/files/lang/mp13_str_g.c b/src/files/lang/jap-final/mp13_str_g.c similarity index 100% rename from src/files/lang/mp13_str_g.c rename to src/files/lang/jap-final/mp13_str_g.c diff --git a/src/files/lang/mp13_str_i.c b/src/files/lang/jap-final/mp13_str_i.c similarity index 100% rename from src/files/lang/mp13_str_i.c rename to src/files/lang/jap-final/mp13_str_i.c diff --git a/src/files/lang/mp13_str_s.c b/src/files/lang/jap-final/mp13_str_s.c similarity index 100% rename from src/files/lang/mp13_str_s.c rename to src/files/lang/jap-final/mp13_str_s.c diff --git a/src/files/lang/mp14E.c b/src/files/lang/jap-final/mp14E.c similarity index 100% rename from src/files/lang/mp14E.c rename to src/files/lang/jap-final/mp14E.c diff --git a/src/files/lang/mp14J.c b/src/files/lang/jap-final/mp14J.c similarity index 100% rename from src/files/lang/mp14J.c rename to src/files/lang/jap-final/mp14J.c diff --git a/src/files/lang/mp14P.c b/src/files/lang/jap-final/mp14P.c similarity index 100% rename from src/files/lang/mp14P.c rename to src/files/lang/jap-final/mp14P.c diff --git a/src/files/lang/mp14_str_f.c b/src/files/lang/jap-final/mp14_str_f.c similarity index 100% rename from src/files/lang/mp14_str_f.c rename to src/files/lang/jap-final/mp14_str_f.c diff --git a/src/files/lang/mp14_str_g.c b/src/files/lang/jap-final/mp14_str_g.c similarity index 100% rename from src/files/lang/mp14_str_g.c rename to src/files/lang/jap-final/mp14_str_g.c diff --git a/src/files/lang/mp14_str_i.c b/src/files/lang/jap-final/mp14_str_i.c similarity index 100% rename from src/files/lang/mp14_str_i.c rename to src/files/lang/jap-final/mp14_str_i.c diff --git a/src/files/lang/mp14_str_s.c b/src/files/lang/jap-final/mp14_str_s.c similarity index 100% rename from src/files/lang/mp14_str_s.c rename to src/files/lang/jap-final/mp14_str_s.c diff --git a/src/files/lang/mp15E.c b/src/files/lang/jap-final/mp15E.c similarity index 100% rename from src/files/lang/mp15E.c rename to src/files/lang/jap-final/mp15E.c diff --git a/src/files/lang/mp15J.c b/src/files/lang/jap-final/mp15J.c similarity index 100% rename from src/files/lang/mp15J.c rename to src/files/lang/jap-final/mp15J.c diff --git a/src/files/lang/mp15P.c b/src/files/lang/jap-final/mp15P.c similarity index 100% rename from src/files/lang/mp15P.c rename to src/files/lang/jap-final/mp15P.c diff --git a/src/files/lang/mp15_str_f.c b/src/files/lang/jap-final/mp15_str_f.c similarity index 100% rename from src/files/lang/mp15_str_f.c rename to src/files/lang/jap-final/mp15_str_f.c diff --git a/src/files/lang/mp15_str_g.c b/src/files/lang/jap-final/mp15_str_g.c similarity index 100% rename from src/files/lang/mp15_str_g.c rename to src/files/lang/jap-final/mp15_str_g.c diff --git a/src/files/lang/mp15_str_i.c b/src/files/lang/jap-final/mp15_str_i.c similarity index 100% rename from src/files/lang/mp15_str_i.c rename to src/files/lang/jap-final/mp15_str_i.c diff --git a/src/files/lang/mp15_str_s.c b/src/files/lang/jap-final/mp15_str_s.c similarity index 100% rename from src/files/lang/mp15_str_s.c rename to src/files/lang/jap-final/mp15_str_s.c diff --git a/src/files/lang/mp16E.c b/src/files/lang/jap-final/mp16E.c similarity index 100% rename from src/files/lang/mp16E.c rename to src/files/lang/jap-final/mp16E.c diff --git a/src/files/lang/mp16J.c b/src/files/lang/jap-final/mp16J.c similarity index 100% rename from src/files/lang/mp16J.c rename to src/files/lang/jap-final/mp16J.c diff --git a/src/files/lang/mp16P.c b/src/files/lang/jap-final/mp16P.c similarity index 100% rename from src/files/lang/mp16P.c rename to src/files/lang/jap-final/mp16P.c diff --git a/src/files/lang/mp16_str_f.c b/src/files/lang/jap-final/mp16_str_f.c similarity index 100% rename from src/files/lang/mp16_str_f.c rename to src/files/lang/jap-final/mp16_str_f.c diff --git a/src/files/lang/mp16_str_g.c b/src/files/lang/jap-final/mp16_str_g.c similarity index 100% rename from src/files/lang/mp16_str_g.c rename to src/files/lang/jap-final/mp16_str_g.c diff --git a/src/files/lang/mp16_str_i.c b/src/files/lang/jap-final/mp16_str_i.c similarity index 100% rename from src/files/lang/mp16_str_i.c rename to src/files/lang/jap-final/mp16_str_i.c diff --git a/src/files/lang/mp16_str_s.c b/src/files/lang/jap-final/mp16_str_s.c similarity index 100% rename from src/files/lang/mp16_str_s.c rename to src/files/lang/jap-final/mp16_str_s.c diff --git a/src/files/lang/mp17E.c b/src/files/lang/jap-final/mp17E.c similarity index 100% rename from src/files/lang/mp17E.c rename to src/files/lang/jap-final/mp17E.c diff --git a/src/files/lang/mp17J.c b/src/files/lang/jap-final/mp17J.c similarity index 100% rename from src/files/lang/mp17J.c rename to src/files/lang/jap-final/mp17J.c diff --git a/src/files/lang/mp17P.c b/src/files/lang/jap-final/mp17P.c similarity index 100% rename from src/files/lang/mp17P.c rename to src/files/lang/jap-final/mp17P.c diff --git a/src/files/lang/mp17_str_f.c b/src/files/lang/jap-final/mp17_str_f.c similarity index 100% rename from src/files/lang/mp17_str_f.c rename to src/files/lang/jap-final/mp17_str_f.c diff --git a/src/files/lang/mp17_str_g.c b/src/files/lang/jap-final/mp17_str_g.c similarity index 100% rename from src/files/lang/mp17_str_g.c rename to src/files/lang/jap-final/mp17_str_g.c diff --git a/src/files/lang/mp17_str_i.c b/src/files/lang/jap-final/mp17_str_i.c similarity index 100% rename from src/files/lang/mp17_str_i.c rename to src/files/lang/jap-final/mp17_str_i.c diff --git a/src/files/lang/mp17_str_s.c b/src/files/lang/jap-final/mp17_str_s.c similarity index 100% rename from src/files/lang/mp17_str_s.c rename to src/files/lang/jap-final/mp17_str_s.c diff --git a/src/files/lang/mp18E.c b/src/files/lang/jap-final/mp18E.c similarity index 100% rename from src/files/lang/mp18E.c rename to src/files/lang/jap-final/mp18E.c diff --git a/src/files/lang/mp18J.c b/src/files/lang/jap-final/mp18J.c similarity index 100% rename from src/files/lang/mp18J.c rename to src/files/lang/jap-final/mp18J.c diff --git a/src/files/lang/mp18P.c b/src/files/lang/jap-final/mp18P.c similarity index 100% rename from src/files/lang/mp18P.c rename to src/files/lang/jap-final/mp18P.c diff --git a/src/files/lang/mp18_str_f.c b/src/files/lang/jap-final/mp18_str_f.c similarity index 100% rename from src/files/lang/mp18_str_f.c rename to src/files/lang/jap-final/mp18_str_f.c diff --git a/src/files/lang/mp18_str_g.c b/src/files/lang/jap-final/mp18_str_g.c similarity index 100% rename from src/files/lang/mp18_str_g.c rename to src/files/lang/jap-final/mp18_str_g.c diff --git a/src/files/lang/mp18_str_i.c b/src/files/lang/jap-final/mp18_str_i.c similarity index 100% rename from src/files/lang/mp18_str_i.c rename to src/files/lang/jap-final/mp18_str_i.c diff --git a/src/files/lang/mp18_str_s.c b/src/files/lang/jap-final/mp18_str_s.c similarity index 100% rename from src/files/lang/mp18_str_s.c rename to src/files/lang/jap-final/mp18_str_s.c diff --git a/src/files/lang/mp19E.c b/src/files/lang/jap-final/mp19E.c similarity index 100% rename from src/files/lang/mp19E.c rename to src/files/lang/jap-final/mp19E.c diff --git a/src/files/lang/mp19J.c b/src/files/lang/jap-final/mp19J.c similarity index 100% rename from src/files/lang/mp19J.c rename to src/files/lang/jap-final/mp19J.c diff --git a/src/files/lang/mp19P.c b/src/files/lang/jap-final/mp19P.c similarity index 100% rename from src/files/lang/mp19P.c rename to src/files/lang/jap-final/mp19P.c diff --git a/src/files/lang/mp19_str_f.c b/src/files/lang/jap-final/mp19_str_f.c similarity index 100% rename from src/files/lang/mp19_str_f.c rename to src/files/lang/jap-final/mp19_str_f.c diff --git a/src/files/lang/mp19_str_g.c b/src/files/lang/jap-final/mp19_str_g.c similarity index 100% rename from src/files/lang/mp19_str_g.c rename to src/files/lang/jap-final/mp19_str_g.c diff --git a/src/files/lang/mp19_str_i.c b/src/files/lang/jap-final/mp19_str_i.c similarity index 100% rename from src/files/lang/mp19_str_i.c rename to src/files/lang/jap-final/mp19_str_i.c diff --git a/src/files/lang/mp19_str_s.c b/src/files/lang/jap-final/mp19_str_s.c similarity index 100% rename from src/files/lang/mp19_str_s.c rename to src/files/lang/jap-final/mp19_str_s.c diff --git a/src/files/lang/mp1E.c b/src/files/lang/jap-final/mp1E.c similarity index 100% rename from src/files/lang/mp1E.c rename to src/files/lang/jap-final/mp1E.c diff --git a/src/files/lang/mp1J.c b/src/files/lang/jap-final/mp1J.c similarity index 100% rename from src/files/lang/mp1J.c rename to src/files/lang/jap-final/mp1J.c diff --git a/src/files/lang/mp1P.c b/src/files/lang/jap-final/mp1P.c similarity index 100% rename from src/files/lang/mp1P.c rename to src/files/lang/jap-final/mp1P.c diff --git a/src/files/lang/mp1_str_f.c b/src/files/lang/jap-final/mp1_str_f.c similarity index 100% rename from src/files/lang/mp1_str_f.c rename to src/files/lang/jap-final/mp1_str_f.c diff --git a/src/files/lang/mp1_str_g.c b/src/files/lang/jap-final/mp1_str_g.c similarity index 100% rename from src/files/lang/mp1_str_g.c rename to src/files/lang/jap-final/mp1_str_g.c diff --git a/src/files/lang/mp1_str_i.c b/src/files/lang/jap-final/mp1_str_i.c similarity index 100% rename from src/files/lang/mp1_str_i.c rename to src/files/lang/jap-final/mp1_str_i.c diff --git a/src/files/lang/mp1_str_s.c b/src/files/lang/jap-final/mp1_str_s.c similarity index 100% rename from src/files/lang/mp1_str_s.c rename to src/files/lang/jap-final/mp1_str_s.c diff --git a/src/files/lang/mp20E.c b/src/files/lang/jap-final/mp20E.c similarity index 100% rename from src/files/lang/mp20E.c rename to src/files/lang/jap-final/mp20E.c diff --git a/src/files/lang/mp20J.c b/src/files/lang/jap-final/mp20J.c similarity index 100% rename from src/files/lang/mp20J.c rename to src/files/lang/jap-final/mp20J.c diff --git a/src/files/lang/mp20P.c b/src/files/lang/jap-final/mp20P.c similarity index 100% rename from src/files/lang/mp20P.c rename to src/files/lang/jap-final/mp20P.c diff --git a/src/files/lang/mp20_str_f.c b/src/files/lang/jap-final/mp20_str_f.c similarity index 100% rename from src/files/lang/mp20_str_f.c rename to src/files/lang/jap-final/mp20_str_f.c diff --git a/src/files/lang/mp20_str_g.c b/src/files/lang/jap-final/mp20_str_g.c similarity index 100% rename from src/files/lang/mp20_str_g.c rename to src/files/lang/jap-final/mp20_str_g.c diff --git a/src/files/lang/mp20_str_i.c b/src/files/lang/jap-final/mp20_str_i.c similarity index 100% rename from src/files/lang/mp20_str_i.c rename to src/files/lang/jap-final/mp20_str_i.c diff --git a/src/files/lang/mp20_str_s.c b/src/files/lang/jap-final/mp20_str_s.c similarity index 100% rename from src/files/lang/mp20_str_s.c rename to src/files/lang/jap-final/mp20_str_s.c diff --git a/src/files/lang/mp2E.c b/src/files/lang/jap-final/mp2E.c similarity index 100% rename from src/files/lang/mp2E.c rename to src/files/lang/jap-final/mp2E.c diff --git a/src/files/lang/mp2J.c b/src/files/lang/jap-final/mp2J.c similarity index 100% rename from src/files/lang/mp2J.c rename to src/files/lang/jap-final/mp2J.c diff --git a/src/files/lang/mp2P.c b/src/files/lang/jap-final/mp2P.c similarity index 100% rename from src/files/lang/mp2P.c rename to src/files/lang/jap-final/mp2P.c diff --git a/src/files/lang/mp2_str_f.c b/src/files/lang/jap-final/mp2_str_f.c similarity index 100% rename from src/files/lang/mp2_str_f.c rename to src/files/lang/jap-final/mp2_str_f.c diff --git a/src/files/lang/mp2_str_g.c b/src/files/lang/jap-final/mp2_str_g.c similarity index 100% rename from src/files/lang/mp2_str_g.c rename to src/files/lang/jap-final/mp2_str_g.c diff --git a/src/files/lang/mp2_str_i.c b/src/files/lang/jap-final/mp2_str_i.c similarity index 100% rename from src/files/lang/mp2_str_i.c rename to src/files/lang/jap-final/mp2_str_i.c diff --git a/src/files/lang/mp2_str_s.c b/src/files/lang/jap-final/mp2_str_s.c similarity index 100% rename from src/files/lang/mp2_str_s.c rename to src/files/lang/jap-final/mp2_str_s.c diff --git a/src/files/lang/mp3E.c b/src/files/lang/jap-final/mp3E.c similarity index 100% rename from src/files/lang/mp3E.c rename to src/files/lang/jap-final/mp3E.c diff --git a/src/files/lang/mp3J.c b/src/files/lang/jap-final/mp3J.c similarity index 100% rename from src/files/lang/mp3J.c rename to src/files/lang/jap-final/mp3J.c diff --git a/src/files/lang/mp3P.c b/src/files/lang/jap-final/mp3P.c similarity index 100% rename from src/files/lang/mp3P.c rename to src/files/lang/jap-final/mp3P.c diff --git a/src/files/lang/mp3_str_f.c b/src/files/lang/jap-final/mp3_str_f.c similarity index 100% rename from src/files/lang/mp3_str_f.c rename to src/files/lang/jap-final/mp3_str_f.c diff --git a/src/files/lang/mp3_str_g.c b/src/files/lang/jap-final/mp3_str_g.c similarity index 100% rename from src/files/lang/mp3_str_g.c rename to src/files/lang/jap-final/mp3_str_g.c diff --git a/src/files/lang/mp3_str_i.c b/src/files/lang/jap-final/mp3_str_i.c similarity index 100% rename from src/files/lang/mp3_str_i.c rename to src/files/lang/jap-final/mp3_str_i.c diff --git a/src/files/lang/mp3_str_s.c b/src/files/lang/jap-final/mp3_str_s.c similarity index 100% rename from src/files/lang/mp3_str_s.c rename to src/files/lang/jap-final/mp3_str_s.c diff --git a/src/files/lang/mp4E.c b/src/files/lang/jap-final/mp4E.c similarity index 100% rename from src/files/lang/mp4E.c rename to src/files/lang/jap-final/mp4E.c diff --git a/src/files/lang/mp4J.c b/src/files/lang/jap-final/mp4J.c similarity index 100% rename from src/files/lang/mp4J.c rename to src/files/lang/jap-final/mp4J.c diff --git a/src/files/lang/mp4P.c b/src/files/lang/jap-final/mp4P.c similarity index 100% rename from src/files/lang/mp4P.c rename to src/files/lang/jap-final/mp4P.c diff --git a/src/files/lang/mp4_str_f.c b/src/files/lang/jap-final/mp4_str_f.c similarity index 100% rename from src/files/lang/mp4_str_f.c rename to src/files/lang/jap-final/mp4_str_f.c diff --git a/src/files/lang/mp4_str_g.c b/src/files/lang/jap-final/mp4_str_g.c similarity index 100% rename from src/files/lang/mp4_str_g.c rename to src/files/lang/jap-final/mp4_str_g.c diff --git a/src/files/lang/mp4_str_i.c b/src/files/lang/jap-final/mp4_str_i.c similarity index 100% rename from src/files/lang/mp4_str_i.c rename to src/files/lang/jap-final/mp4_str_i.c diff --git a/src/files/lang/mp4_str_s.c b/src/files/lang/jap-final/mp4_str_s.c similarity index 100% rename from src/files/lang/mp4_str_s.c rename to src/files/lang/jap-final/mp4_str_s.c diff --git a/src/files/lang/mp5E.c b/src/files/lang/jap-final/mp5E.c similarity index 100% rename from src/files/lang/mp5E.c rename to src/files/lang/jap-final/mp5E.c diff --git a/src/files/lang/mp5J.c b/src/files/lang/jap-final/mp5J.c similarity index 100% rename from src/files/lang/mp5J.c rename to src/files/lang/jap-final/mp5J.c diff --git a/src/files/lang/mp5P.c b/src/files/lang/jap-final/mp5P.c similarity index 100% rename from src/files/lang/mp5P.c rename to src/files/lang/jap-final/mp5P.c diff --git a/src/files/lang/mp5_str_f.c b/src/files/lang/jap-final/mp5_str_f.c similarity index 100% rename from src/files/lang/mp5_str_f.c rename to src/files/lang/jap-final/mp5_str_f.c diff --git a/src/files/lang/mp5_str_g.c b/src/files/lang/jap-final/mp5_str_g.c similarity index 100% rename from src/files/lang/mp5_str_g.c rename to src/files/lang/jap-final/mp5_str_g.c diff --git a/src/files/lang/mp5_str_i.c b/src/files/lang/jap-final/mp5_str_i.c similarity index 100% rename from src/files/lang/mp5_str_i.c rename to src/files/lang/jap-final/mp5_str_i.c diff --git a/src/files/lang/mp5_str_s.c b/src/files/lang/jap-final/mp5_str_s.c similarity index 100% rename from src/files/lang/mp5_str_s.c rename to src/files/lang/jap-final/mp5_str_s.c diff --git a/src/files/lang/mp6E.c b/src/files/lang/jap-final/mp6E.c similarity index 100% rename from src/files/lang/mp6E.c rename to src/files/lang/jap-final/mp6E.c diff --git a/src/files/lang/mp6J.c b/src/files/lang/jap-final/mp6J.c similarity index 100% rename from src/files/lang/mp6J.c rename to src/files/lang/jap-final/mp6J.c diff --git a/src/files/lang/mp6P.c b/src/files/lang/jap-final/mp6P.c similarity index 100% rename from src/files/lang/mp6P.c rename to src/files/lang/jap-final/mp6P.c diff --git a/src/files/lang/mp6_str_f.c b/src/files/lang/jap-final/mp6_str_f.c similarity index 100% rename from src/files/lang/mp6_str_f.c rename to src/files/lang/jap-final/mp6_str_f.c diff --git a/src/files/lang/mp6_str_g.c b/src/files/lang/jap-final/mp6_str_g.c similarity index 100% rename from src/files/lang/mp6_str_g.c rename to src/files/lang/jap-final/mp6_str_g.c diff --git a/src/files/lang/mp6_str_i.c b/src/files/lang/jap-final/mp6_str_i.c similarity index 100% rename from src/files/lang/mp6_str_i.c rename to src/files/lang/jap-final/mp6_str_i.c diff --git a/src/files/lang/mp6_str_s.c b/src/files/lang/jap-final/mp6_str_s.c similarity index 100% rename from src/files/lang/mp6_str_s.c rename to src/files/lang/jap-final/mp6_str_s.c diff --git a/src/files/lang/mp7E.c b/src/files/lang/jap-final/mp7E.c similarity index 100% rename from src/files/lang/mp7E.c rename to src/files/lang/jap-final/mp7E.c diff --git a/src/files/lang/mp7J.c b/src/files/lang/jap-final/mp7J.c similarity index 100% rename from src/files/lang/mp7J.c rename to src/files/lang/jap-final/mp7J.c diff --git a/src/files/lang/mp7P.c b/src/files/lang/jap-final/mp7P.c similarity index 100% rename from src/files/lang/mp7P.c rename to src/files/lang/jap-final/mp7P.c diff --git a/src/files/lang/mp7_str_f.c b/src/files/lang/jap-final/mp7_str_f.c similarity index 100% rename from src/files/lang/mp7_str_f.c rename to src/files/lang/jap-final/mp7_str_f.c diff --git a/src/files/lang/mp7_str_g.c b/src/files/lang/jap-final/mp7_str_g.c similarity index 100% rename from src/files/lang/mp7_str_g.c rename to src/files/lang/jap-final/mp7_str_g.c diff --git a/src/files/lang/mp7_str_i.c b/src/files/lang/jap-final/mp7_str_i.c similarity index 100% rename from src/files/lang/mp7_str_i.c rename to src/files/lang/jap-final/mp7_str_i.c diff --git a/src/files/lang/mp7_str_s.c b/src/files/lang/jap-final/mp7_str_s.c similarity index 100% rename from src/files/lang/mp7_str_s.c rename to src/files/lang/jap-final/mp7_str_s.c diff --git a/src/files/lang/mp8E.c b/src/files/lang/jap-final/mp8E.c similarity index 100% rename from src/files/lang/mp8E.c rename to src/files/lang/jap-final/mp8E.c diff --git a/src/files/lang/mp8J.c b/src/files/lang/jap-final/mp8J.c similarity index 100% rename from src/files/lang/mp8J.c rename to src/files/lang/jap-final/mp8J.c diff --git a/src/files/lang/mp8P.c b/src/files/lang/jap-final/mp8P.c similarity index 100% rename from src/files/lang/mp8P.c rename to src/files/lang/jap-final/mp8P.c diff --git a/src/files/lang/mp8_str_f.c b/src/files/lang/jap-final/mp8_str_f.c similarity index 100% rename from src/files/lang/mp8_str_f.c rename to src/files/lang/jap-final/mp8_str_f.c diff --git a/src/files/lang/mp8_str_g.c b/src/files/lang/jap-final/mp8_str_g.c similarity index 100% rename from src/files/lang/mp8_str_g.c rename to src/files/lang/jap-final/mp8_str_g.c diff --git a/src/files/lang/mp8_str_i.c b/src/files/lang/jap-final/mp8_str_i.c similarity index 100% rename from src/files/lang/mp8_str_i.c rename to src/files/lang/jap-final/mp8_str_i.c diff --git a/src/files/lang/mp8_str_s.c b/src/files/lang/jap-final/mp8_str_s.c similarity index 100% rename from src/files/lang/mp8_str_s.c rename to src/files/lang/jap-final/mp8_str_s.c diff --git a/src/files/lang/mp9E.c b/src/files/lang/jap-final/mp9E.c similarity index 100% rename from src/files/lang/mp9E.c rename to src/files/lang/jap-final/mp9E.c diff --git a/src/files/lang/mp9J.c b/src/files/lang/jap-final/mp9J.c similarity index 100% rename from src/files/lang/mp9J.c rename to src/files/lang/jap-final/mp9J.c diff --git a/src/files/lang/mp9P.c b/src/files/lang/jap-final/mp9P.c similarity index 100% rename from src/files/lang/mp9P.c rename to src/files/lang/jap-final/mp9P.c diff --git a/src/files/lang/mp9_str_f.c b/src/files/lang/jap-final/mp9_str_f.c similarity index 100% rename from src/files/lang/mp9_str_f.c rename to src/files/lang/jap-final/mp9_str_f.c diff --git a/src/files/lang/mp9_str_g.c b/src/files/lang/jap-final/mp9_str_g.c similarity index 100% rename from src/files/lang/mp9_str_g.c rename to src/files/lang/jap-final/mp9_str_g.c diff --git a/src/files/lang/mp9_str_i.c b/src/files/lang/jap-final/mp9_str_i.c similarity index 100% rename from src/files/lang/mp9_str_i.c rename to src/files/lang/jap-final/mp9_str_i.c diff --git a/src/files/lang/mp9_str_s.c b/src/files/lang/jap-final/mp9_str_s.c similarity index 100% rename from src/files/lang/mp9_str_s.c rename to src/files/lang/jap-final/mp9_str_s.c diff --git a/src/files/lang/mpmenuE.c b/src/files/lang/jap-final/mpmenuE.c similarity index 100% rename from src/files/lang/mpmenuE.c rename to src/files/lang/jap-final/mpmenuE.c diff --git a/src/files/lang/jap-final/mpmenuJ.c b/src/files/lang/jap-final/mpmenuJ.c new file mode 100644 index 000000000..55aaf4c3f --- /dev/null +++ b/src/files/lang/jap-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "ƒ—…‘†º\n", + /* 1*/ "ܼ…«Å‚×Ìõ€À\n", + /* 2*/ "€Û‚„€øŠÏ†»†¼\n", + /* 3*/ "€Û‚„€øŠ†º\n", + /* 4*/ "…·‚×…¼„±\n", + /* 5*/ "€ð†…¤ÎÅ\n", + /* 6*/ "€Ö€ö‚„€î€Û‚„€Ï\n", + /* 7*/ "‚×ÉãÆç\n", + /* 8*/ "‚­Ü†¸…þ\n", + /* 9*/ "„µ†É„Ì€ö€Ï€ä‚„\n", + /* 10*/ "… ƒÇ‚å\n", + /* 11*/ "‚‡ƒú€Ð€ß€Ê€Õ‚„\n", + /* 12*/ "‚­Ü†¾ƒé\n", + /* 13*/ "‚­Ü„µƒ¨À\n", + /* 14*/ "€’„±„÷ƒ“Ï‚ÙÅÉ\n", + /* 15*/ "€“„±„÷ƒ“Ï‚ÙÅÉ\n", + /* 16*/ "€”„±„÷ƒ“Ï‚ÙÅÉ\n", + /* 17*/ "€ÿ‚„€ð†ˆ„Ç\n", + /* 18*/ "€ÿ‚„€ð†ˆ„ÇÒ€ú‚„Š\n", + /* 19*/ "€ø‚„€ø\n", + /* 20*/ "€Ð€÷‚„€ä\n", + /* 21*/ "€Ô’€Û€Í€Ï\n", + /* 22*/ "€à‚„€ð\n", + /* 23*/ "€Ò€È”€Ï\n", + /* 24*/ "€÷€ï€Ê€ã\n", + /* 25*/ "€Û€ï€Ì€ö€Ï€ã\n", + /* 26*/ "€ÿ‚„€ð†ˆ„ÇҀ݂„\n", + /* 27*/ "€ÿ‚„€ð¸ÝÛâ\n", + /* 28*/ "†¿„±†ˆ„Ç\n", + /* 29*/ "†¿„±†ˆ„ÇÒ€ú‚„Š\n", + /* 30*/ "€ç‚„€ð\n", + /* 31*/ "€Ö€Ë€ö€×€ß‚„\n", + /* 32*/ "€é€Ï‰€Æ\n", + /* 33*/ "…‰ƒÛ†ˆ„Ç\n", + /* 34*/ "†¿„±†ˆ„Ç€Ô’€Û€Í€Ï\n", + /* 35*/ "€Ü€â‚„€ß€Ü\n", + /* 36*/ "€ÿ‚„€ð„ׄØ\n", + /* 37*/ "€ÿ‚„€ð¸…ÒÂâ\n", + /* 38*/ "†¿„±†ˆ„ÇҀ݂„\n", + /* 39*/ "†¿„±†ˆ„ÇÒ€Ù‘‚„\n", + /* 40*/ "ÈÒ†˜\n", + /* 41*/ "€Ú€Ò€ÏŠ€ã€ö€Ê€×\n", + /* 42*/ "€à‚„€ð€ç‚„€ð\n", + /* 43*/ "ƒœ†À\n", + /* 44*/ "‚®‚¯\n", + /* 45*/ "ƒ¼Å\n", + /* 46*/ "ƒ‚ÒÒƒ¾ƒî\n", + /* 47*/ "ƒ‚ÒÒ‚òƒî\n", + /* 48*/ "€ö€Ï†€ð\n", + /* 49*/ "€à€Ë€ù€Ï‚\n", + /* 50*/ "€à€Ë€ù€Ï‚€ò‚„Š\n", + /* 51*/ "€à€Ë€ù€Ï‚¸ÝÛâ\n", + /* 52*/ "€ÿ‚„€ð¸ÝÛâ\n", + /* 53*/ "„·‚ÓÏ€ÿ‚„€ð¸\nÝÛØÆ¿€À\n", + /* 54*/ "ÝÛâ\n", + /* 55*/ "€Ö€Ë€Ï€Ý€ø\n", + /* 56*/ "%s\n", + /* 57*/ "€¨€¤\n", + /* 58*/ "€Ö€Ë€Ï€Ý€ø\n", + /* 59*/ "€à‚„€ð€ç‚„€ð\n", + /* 60*/ "‚ãâ\n", + /* 61*/ "€à‚„€ð€ç‚„€ðÒ‚Ê‚Ë\n", + /* 62*/ "€Ú€Ò€ÏŠ€ã€ö€Ê€×\n", + /* 63*/ "ƒÍ…ØÒ†Á€¾\n", + /* 64*/ "€Ô€ð€å‹€Ü\n", + /* 65*/ "‚ãâ\n", + /* 66*/ "€Ô€ð€å‹€Ü\n", + /* 67*/ "€ö€Ï†€ð\n", + /* 68*/ "†Á҆†Ã\n", + /* 69*/ "†Á҆†Ã\n", + /* 70*/ "€à‚„€ð†ˆ„Ç\n", + /* 71*/ "€à‚„€ð‚‘€¨€§\n", + /* 72*/ "€à‚„€ð€¾\n", + /* 73*/ "€Ô‚„€ã€à‚„€ð\n", + /* 74*/ "‚ãâ\n", + /* 75*/ "€Ô‚„€ã€à‚„€ð\n", + /* 76*/ "€’€à‚„€ð\n", + /* 77*/ "€“€à‚„€ð\n", + /* 78*/ "€”€à‚„€ð\n", + /* 79*/ "‚­ƒÆ€à‚„€ð\n", + /* 80*/ "’€ù€Ñ€ó‚„‚ü€Û€ï€Ì\n", + /* 81*/ "’€ù€Ñ€ó‚„€Œ€Û€ï€Ì\n", + /* 82*/ "€Ö€Ë€Ï€Ý€ø\n", + /* 83*/ "€Û€ï€Ì€ö€Ï€ã†ˆ„Ç\n", + /* 84*/ "€Û€ï€Ì€ö€Ï€ã҆Ąå\n", + /* 85*/ "€‘€¾\n", + /* 86*/ "€’€¾\n", + /* 87*/ "€“€¾\n", + /* 88*/ "€”€¾\n", + /* 89*/ "€•€¾\n", + /* 90*/ "€–€¾\n", + /* 91*/ "€—€¾\n", + /* 92*/ "€˜€¾\n", + /* 93*/ "ƒ…̃‘Æ\n", + /* 94*/ "‚ãâ\n", + /* 95*/ "ƒºÄ‚ʂˀ¾\n", + /* 96*/ "€ß€Ñ’‚ʂˀ¾\n", + /* 97*/ "€Ö€Ë€ö€×€ß‚„€¾\n", + /* 98*/ "ÃÒ€Û€ï€Ì¸ƒ‘Æ\n", + /* 99*/ "‚ãâ\n", + /*100*/ "€Ö€Ë€ö€×€ß‚„\n", + /*101*/ "€Û€ï€Ì€ö€Ï€ã҆Ąå\n", + /*102*/ "€Û€ï€Ì€ö€Ï€ãÒ‚Ê‚Ë\n", + /*103*/ "€è‚„€î€ø€ß€Ñ’\n", + /*104*/ "€Ü“€Û€Ë€ø€ß€Ñ’\n", + /*105*/ "„¥ƒŽ‚ó‚ô€´\n", + /*106*/ "€Ž¾‚çʇÌÄ»\n", + /*107*/ "€÷€ï€Ê€ã‚Ê‚Ë\n", + /*108*/ "€ß€Ñ€ð\n", + /*109*/ "†¿„±ƒ¥ƒÎ\n", + /*110*/ "†ÅÏ‚ãÆ\n", + /*111*/ "‚ãâ\n", + /*112*/ "ƒ¼‚Œ„ù\n", + /*113*/ "%d\n", + /*114*/ "%d ƒ˜\n", + /*115*/ "€Ð€÷‚„€ä\n", + /*116*/ "‚„€ë€È€×€ã†‚„€×\n", + /*117*/ "€×€ö€Û€Ê€×\n", + /*118*/ "€ö€Ï†€ð\n", + /*119*/ "€Ü€Ø†‚„", + /*120*/ "€Ñ’", + /*121*/ "†Æ„˜„§‚˜", + /*122*/ "€ €•Œ€ø", + /*123*/ "‡Ì„ކ‡†ˆ", + /*124*/ "…Ó„Ê", + /*125*/ "€þ€÷€ÊŠ", + /*126*/ "†…††", + /*127*/ "€Ó€÷€Ð€•€’", + /*128*/ "„§‚˜", + /*129*/ "…߇Ë", + /*130*/ "Œ€÷€Ô€Ï", + /*131*/ "ƒÿ…Ö", + /*132*/ "‚„€Ö€Ï€þ", + /*133*/ "†‚†ƒ", + /*134*/ "†€†", + /*135*/ "‚ƒŠ", + /*136*/ "€ö€Ï†€ð", + /*137*/ "†¿„±†ˆ„ÇÒ€ú‚„Š\n", + /*138*/ "€›€ß€Ïó€Ö€Ë€Ï€Ý€ø\n", + /*139*/ "€ÿ‚„€ð†ˆ„ÇÒ€ú‚„Š\n", + /*140*/ "%s€¾€€ø‚„€ø€¾€%s€€€Ð€÷‚„€ä€¾€%s€€€Û€ï€Ì€ö€Ï€ã€¾€%d", + /*141*/ "’€÷€Ý€Ê€ã\n", + /*142*/ "’€ù€Ñ€ó‚„€ç‚„€ð\n", + /*143*/ "€Ö€Ë€ö€×€ß‚„\n", + /*144*/ "€ì€ÊŠÒ€ú‚„Š\n", + /*145*/ "%s\n", + /*146*/ "‚ÙÅÉ…Ÿ†Ç\n", + /*147*/ "‚ÙãÉ…Ÿ†Ç\n", + /*148*/ "…Ÿ„΃邅¥\n", + /*149*/ "†È‚€ê€Ê€ã\n", + /*150*/ "…Ÿ€Û€Í€Ê€ã†Ç\n", + /*151*/ "„”†€ñ‚„‚\n", + /*152*/ "‚ñ‚„‚\n", + /*153*/ "…Ÿ’€ù€Ñ†Ç\n", + /*154*/ "…Ÿƒ¾ƒâ†Ç\n", + /*155*/ "…Ÿ‚ò‚‘†Ç\n", + /*156*/ "…Ÿƒ“‚ý\n", + /*157*/ "…Ÿ„¨‚ĆɄÌ\n", + /*158*/ "†Êƒ¥€ñ†€ø\n", + /*159*/ "€€ƒé‚…¥†Ë\n", + /*160*/ "€€ƒ‡…‘†Ë\n", + /*161*/ "€€†Ì‚Ù†Ë\n", + /*162*/ "€€ƒ¨„Ö†Ë\n", + /*163*/ "ºÎÉ҆̓Ú\n", + /*164*/ "‚ãâ\n", + /*165*/ "€×€÷€ÐƒØ†Î\n", + /*166*/ "‚ãâ\n", + /*167*/ "†¿„±†ˆ„Ç€Ô’€Û€Í€Ï\n", + /*168*/ "€Ð€Ñ€â€ðÒƒº„‚\n", + /*169*/ "„±Òƒº„‚\n", + /*170*/ "„±Ï€à‚„€ð€Õ€ö‚„\n", + /*171*/ "€ù‚„†‚„\n", + /*172*/ "‚ãâ\n", + /*173*/ "€Ò€È”€Ï\n", + /*174*/ "€Ý€Ê€ã\n", + /*175*/ "€Ý€Ê€ã‚Ž…å\n", + /*176*/ "€‘\n", + /*177*/ "€’\n", + /*178*/ "€“\n", + /*179*/ "€”\n", + /*180*/ "€•\n", + /*181*/ "€–\n", + /*182*/ "‚ãâ\n", + /*183*/ "€ÿ‚„€ð†ˆ„ÇҀ݂„\n", + /*184*/ "‡Ë†ÐÀÅØÆ¿€À\n", + /*185*/ "‡Ë†ÐÀÆâ\n", + /*186*/ "…¼ƒÒ‚Ê‚Ë\n", + /*187*/ "€Ý‚„Åλ\n", + /*188*/ "€ë€Å€Ñ€ø…¼Ò‚ö‚‚\n", + /*189*/ "€ÿ‚„€ð†ˆ„ÇÒ€ë€Å€Ñ€ø\\205¼¸‚ö‚‚Å̇ÌÄ»\n", + /*190*/ "‚¹‚ÇÅ̇ÌÄ»\n", + /*191*/ "†¿„±†ˆ„Ç€ë€Å€Ñ€øÓ\n»Ë܃—‚ăÑÏ\n‚Ë„ÙÄãÌ»ØÆ€Â\n", + /*192*/ "€Ù‘‚„¸ƒÛáØÆ¿€À\n", + /*193*/ "€Ñ€Ñ€Ó\n", + /*194*/ "€é€Ñ\n", + /*195*/ "€ÿ‚„€ð¸…ÒÂâ\n", + /*196*/ "„·‚ÓÏ€ÿ‚„€ð¸\n…ÒÂØÆ¿€À\n", + /*197*/ "€ÿ‚„€ð¸…ÒÂâ\n", + /*198*/ "€Ö€Ë€Ï€Ý€ø\n", + /*199*/ "…‰ƒÛ†ˆ„Ç\n", + /*200*/ "…‰ƒÛ€ò‚„Š\n", + /*201*/ "†ÑƒÎ„¨‚Ä҇ˇ̆Ò\n", + /*202*/ "ƒ—‚ă‚ԆуÎ\n", + /*203*/ "†ÈÒÞã\n", + /*204*/ "ƒ—‚Ă넥\n", + /*205*/ "‚ë„¥†ˆ„Ç\n", + /*206*/ "‚ë„¥„ì„íÒ†Ó†—\n", + /*207*/ "‚ë„¥¸ƒ¹Ï†Ó†—\n", + /*208*/ "ƒ‚„€ð„û‚›Ò†Ó†—\n", + /*209*/ "…¤†ÇÒ†Ó†—\n", + /*210*/ "‚Ì„½€ò‚„Іӆ—\n", + /*211*/ "“€Ñ€Ï€ã‚„€ø\n", + /*212*/ "‚ãâ\n", + /*213*/ "€í‚„€øŠ\n", + /*214*/ "„–á†Ô½\n", + /*215*/ "€Ù€Ï‹€Ê€ã\n", + /*216*/ "€Ø‚„€Ü€‘\n", + /*217*/ "€é€Ê€Ö€Ï€þ\n", + /*218*/ "€Ô€åê´Ã\n", + /*219*/ "…ÿƒ›á\n", + /*220*/ "€Ø‚„€Ü€’\n", + /*221*/ "€›€¨€±\n", + /*222*/ "‚ƒ‚׃‡…‘\n", + /*223*/ "€Ü€ú‚„\n", + /*224*/ "ƒÞ‚ÿ„¨‚Ä\n", + /*225*/ "€à‚„€ð€Õ€ö‚„‹‚„\n", + /*226*/ "€ù‚„†‚„ƒ¼ƒÜ\n", + /*227*/ "ƒ—‚Ă넥ƒ¼ƒÜ\n", + /*228*/ "„±Òƒº„‚ƒ¼ƒÜ\n", + /*229*/ "€Ð€Ñ€â€ðƒº„‚ƒ¼ƒÜ\n", + /*230*/ "€ß‚„€ÿ€Ê€ãÒƒº„‚\n", + /*231*/ "€ß‚„€ï€ä€øÒƒº„‚\n", + /*232*/ "BOXÒ€ù‚„†‚„†Ó†—\n", + /*233*/ "…ÿÒ€ù‚„†‚„†Ó†—\n", + /*234*/ "…ÿÒ„¨‚Ä\n", + /*235*/ "ƒ“‚ý†ˆ„Ç\n", + /*236*/ "€ù‚„†‚„φӆ—\n", + /*237*/ "€Ø‚„€ÜÒƒº„‚\n", + /*238*/ "€ù‚„†‚„φӆ—\n", + /*239*/ "‚ãâ\n", + /*240*/ "€Ô€ë\n", + /*241*/ "ƒº\n", + /*242*/ "…þ\n", + /*243*/ "€ø‚„€ø\n", + /*244*/ "†¿„±€½€à‚„€ð‚‘†Õƒˆ\n", + /*245*/ "€à‚„€ð‚‘ÒÙ\n", + /*246*/ "€Ù€Ï‹€Ê€ã", + /*247*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü€‘", + /*248*/ "€é€Ê€Ö€Ï€þ", + /*249*/ "€Ô€åê´Ã", + /*250*/ "…ÿƒ›á", + /*251*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü€’", + /*252*/ "€›€¨€±€ß€Ê€à", + /*253*/ "€Ù€Ï‹€Ê€ã", + /*254*/ "€Ø‚„€Ü€‘", + /*255*/ "€é€Ê€Ö€Ï€þ", + /*256*/ "€Ô€åê´Ã", + /*257*/ "…ÿƒ›á", + /*258*/ "€Ø‚„€Ü€’", + /*259*/ "€›€¨€±", + /*260*/ "€ÿ‚„€ð€Ô‚„‹‚„\n", + /*261*/ "\n", + /*262*/ "‚ƒ‚ÆßÁ‚ù´É‚Ì„½€¾\n", + /*263*/ "€Ð€û‚„Š€¾\n", + /*264*/ "€‘…È\n", + /*265*/ "€’…È\n", + /*266*/ "€“…È\n", + /*267*/ "€”…È\n", + /*268*/ "€•…È\n", + /*269*/ "€–…È\n", + /*270*/ "€—…È\n", + /*271*/ "€˜…È\n", + /*272*/ "€™…È\n", + /*273*/ "€‘€…È\n", + /*274*/ "€‘€‘…È\n", + /*275*/ "€‘€’…È\n", + /*276*/ "€ö€Ï€Ö€Ï€þ\n", + /*277*/ "‚ÙãɆÇ\n", + /*278*/ "ƒ¥ƒÎ\n", + /*279*/ "€à‚„€ð€ö€Ï€Ö€Ï€þ\n", + /*280*/ "%s", + /*281*/ "ƒ—…‘†Ç\n", + /*282*/ "‚ÙÄãÉ\n", + /*283*/ "‚ÙÅÉ\n", + /*284*/ "‚Õʃ°\n", + /*285*/ "€ÿ‚„€ð€Ù€Ï€ã€ú‚„€ø\n", + /*286*/ "’€ù€Ñƒ“‚ý€¾\n", + /*287*/ "€ÿ‚„€ð†³‚ô\n", + /*288*/ "”‚„ƒÆâ\n", + /*289*/ "”‚„ƒ‚†‚ø\n", + /*290*/ "€ÿ‚„€ð†³‚ô\n", + /*291*/ "ßäÅ»óÆ¿€À\n", + /*292*/ "€Ö€Ë€Ï€Ý€ø\n", + /*293*/ "€ÿ‚„€ð†³‚ô\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "€›€ß€Ïó‚ãâ\n", + /*415*/ "…Ž„Á„ÊҀрπë€É€ñ‚„€Û€Í€Ï\n", + /*416*/ "€í€ú€…€ã€ù‚„€å€Ï€þ\n", + /*417*/ "‰‹€Ñ€Ü€÷€Ü€ã\n", + /*418*/ "€Ñ€Ï€ë€É€ñ‚„€Û€Í€Ï\n", + /*419*/ "€ú€Ø‚„€Û€Í€Ï\n", + /*420*/ "€î€Û€Ï\n", + /*421*/ "’€ú€ë€Æ‚„€ø\n", + /*422*/ "ÈÒ†˜„ì„í\n", + /*423*/ "€ã€ù‚„€å€Ï€þƒØ†Î\n", + /*424*/ "ƒçƒƒƒ“‚ý€¾\n", + /*425*/ "„Î…Ž€´\n", + /*426*/ "‚ „Î…Ž€´\n", + /*427*/ "€¨€¤\n", + /*428*/ "‚¾Ââ\n", + /*429*/ "€Ö€Ë€Ï€Ý€ø\n", + /*430*/ "ÝÛâ\n", + /*431*/ "’€ú€ë€Æ‚„€ø\n", + /*432*/ "…¼ƒ€¾\n", + /*433*/ "†‘†Ö€¾\n", + /*434*/ "†×†Ø€¾\n", + /*435*/ "€›€ß€Ïó‚ãâ\n", + /*436*/ "€à‚„€ã€ñ€å€Ì‚„\n", + /*437*/ "ƒ•€ƒÉƒÒ¸ƒÓƒ…Ï€¨€Ÿ€Ÿ‚ŸƒØÆ€Â\n", + /*438*/ "€Ö€Ë€Ï€Ý€ø\n", + /*439*/ "€ú€Ïƒ\n", + /*440*/ "€Û€ø‹‚„\n", + /*441*/ "€‚„€øŠ\n", + /*442*/ "…¨…惬\n", + /*443*/ "…¨…惬€¾\n", + /*444*/ "…¨…惬†Â†Ã€¾\n", + /*445*/ "€€\n", + /*446*/ "€Ò€È”€Ï\n", + /*447*/ "€ã€ù‚„€å€Ï€þ‚Ž…å\n", + /*448*/ "€ã€ù‚„€å€Ï€þ†ÙƒÝ\n", + /*449*/ "„Î…Ž€´\n", + /*450*/ "ƒ¥ƒÎ€¾\n", + /*451*/ "„´ƒÑ‚΂φǀ¾\n", + /*452*/ "…¨…惬€¾\n", + /*453*/ "ƒçƒƒƒ“‚ý€¾\n", + /*454*/ "€Ò€È”€Ï€¾\n", + /*455*/ "ƒé‚…¥€¾\n", + /*456*/ "‚ñ‚òÅÌλ\n", + /*457*/ "…¤„–ã\n", + /*458*/ "ƒ“‚ý„–ã\n", + /*459*/ "ƒ¥ƒÎ‚ †Ú\n", + /*460*/ "ƒé‚…¥‚ †Ú\n", + /*461*/ "€Ý€Ï€ß‚„\n", + /*462*/ "…‚„€Ï€‘\n", + /*463*/ "…‚„€Ï€’\n", + /*464*/ "…‚„€Ï€“\n", + /*465*/ "…Ÿ€ê€Ê€ã\n", + /*466*/ "€»€»ƒ¥ƒÎ€»€»\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "…¤Ò‚Œ„ù€¾\n", + /*472*/ "ƒ“‚ýÒ‚Œ„ù€¾\n", + /*473*/ "‚­†œƒé‚…¥€¾\n", + /*474*/ "€ß‚„€ÿ€Ê€ã€¾\n", + /*475*/ "ƒ¥ƒÎ€¾\n", + /*476*/ "€à‚„€ã\n", + /*477*/ "‚ó‚ô\n", + /*478*/ "€»‚‰‚õ€»\n", + /*479*/ "€à‚„€ã¸€¨€§ÏÅÌ»â‚ýÓ\n€ÿ‚„€ð¸‚¯Ï‚·ÛâÃÍÓ\n‚ŸƒØÇ¹€Â\n", + /*480*/ "€¨€¤\n", + /*481*/ "€Ö€Ë€Ï€Ý€ø\n", + /*482*/ "Player %d: ", + /*483*/ "€Ü€ß‚„€ã€´\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "€à€È€Ê€×‚€Ž\n", +}; diff --git a/src/files/lang/jap-final/mpmenuP.c b/src/files/lang/jap-final/mpmenuP.c new file mode 100644 index 000000000..9cffad023 --- /dev/null +++ b/src/files/lang/jap-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Colour\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_f.c b/src/files/lang/jap-final/mpmenu_str_f.c new file mode 100644 index 000000000..a654639cf --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? Où?\n", + /* 2*/ "Le moins protégé\n", + /* 3*/ "Le mieux protégé\n", + /* 4*/ "Tireur d'élite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus pétochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Durée de vie Mini\n", + /* 13*/ "Duréede vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Paramètres jeu\n", + /* 18*/ "Charger param.\n", + /* 19*/ "Scénario\n", + /* 20*/ "Arènes\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauver param.\n", + /* 27*/ "Abandonner\n", + /* 28*/ "Param. joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Arrêter\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauv. copie joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms équipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Vainq.\n", + /* 47*/ "Perd.\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\nabandonner la partie?\n", + /* 54*/ "Abandonner\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms équipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom équipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. équipe\n", + /* 71*/ "Equipes activées\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux équipes\n", + /* 77*/ "Trois équipes\n", + /* 78*/ "Quatre équipes\n", + /* 79*/ "Maximum équipes\n", + /* 80*/ "Humains vs Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficulté:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants spéciaux\n", + /*105*/ "Prêt!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "Rétablir par défaut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Arènes\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrepôt", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "Félicité", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger param.\n", + /*140*/ "%s: Scénario: %s Arène: %s Simulants: %d", + /*141*/ "Présélections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger tête...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tués:\n", + /*147*/ "Morts:\n", + /*148*/ "Précision:\n", + /*149*/ "Tirs tête:\n", + /*150*/ "Mun. util.:\n", + /*151*/ "Dég. infligés:\n", + /*152*/ "Dég. reçus:\n", + /*153*/ "Parties:\n", + /*154*/ "Gagnées:\n", + /*155*/ "Perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "Médailles gagnées:\n", + /*159*/ " Précision:\n", + /*160*/ " Tirs tête:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges complétés\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir récup.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir équipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Param. armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver param. jeu\n", + /*184*/ "Ecraser votre\nfichier original?\n", + /*185*/ "Ecraser fichier\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer nom pour\nfichier de paramètres:\n", + /*190*/ "Confirmer\n", + /*191*/ "Fichier joueur\nest sauvé\nen auto.\n", + /*192*/ "Sauver une copie?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Arrêter\n", + /*196*/ "Voulez-vous vraiment\narrêter?\n", + /*197*/ "Arrêter\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. tête\n", + /*204*/ "Visée auto\n", + /*205*/ "Contrôle visée\n", + /*206*/ "Cible à l'écran\n", + /*207*/ "Voir cible\n", + /*208*/ "Portée zoom\n", + /*209*/ "Munit. à l'écran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Fixe\n", + /*214*/ "Alt.\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options décapsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options PC\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher équipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans visée auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir récup.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "PC sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Non\n", + /*241*/ "Oui\n", + /*242*/ "Custom\n", + /*243*/ "Scénario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "Décapsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Contrôle de PC", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "Décaps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "PC", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de prédilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2ème\n", + /*266*/ "3ème\n", + /*267*/ "4ème\n", + /*268*/ "5ème\n", + /*269*/ "6ème\n", + /*270*/ "7ème\n", + /*271*/ "8ème\n", + /*272*/ "9ème\n", + /*273*/ "10ème\n", + /*274*/ "11ème\n", + /*275*/ "12ème\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement équipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tués\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sûr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entraînement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "Véhicules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entraînement\n", + /*424*/ "Temps écoulé:\n", + /*425*/ "Succès!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez éteindre votre ordinateur en toute sécurité.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficulté\n", + /*443*/ "Difficulté:\n", + /*444*/ "Choix difficulté:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entraînement\n", + /*448*/ "Stats entraînement\n", + /*449*/ "Succès!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles détruites:\n", + /*452*/ "Difficulté:\n", + /*453*/ "Temps écoulé:\n", + /*454*/ "Arme:\n", + /*455*/ "Précision:\n", + /*456*/ "Pas échoué\n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop imprécis\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Précision Mini:\n", + /*474*/ "Cibles à détruire:\n", + /*475*/ "Score à atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Terminé\n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activés.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Vérif. Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Attendre...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_g.c b/src/files/lang/jap-final/mpmenu_str_g.c new file mode 100644 index 000000000..d0f7ba5b1 --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Suizidal\n", + /* 1*/ "Muni?\n", + /* 2*/ "Schilde?\n", + /* 3*/ "Bestgeschützt\n", + /* 4*/ "Treffsicher\n", + /* 5*/ "Professionell\n", + /* 6*/ "Gefährlich\n", + /* 7*/ "Harmlos\n", + /* 8*/ "Feig\n", + /* 9*/ "Verzweifelt\n", + /* 10*/ "Ehrenhaft\n", + /* 11*/ "Unehrenhaft\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Trippel-Treffer\n", + /* 16*/ "Quadro-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Kopie speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzt. Gewinner\n", + /* 47*/ "Letzt. Verlierer\n", + /* 48*/ "zufällig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Möchten Sie wirklich\nabbrechen?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurück\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurück\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurück\n", + /* 61*/ "Team-Name ändern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Sound\n", + /* 65*/ "Zurück\n", + /* 66*/ "Multiple Sounds\n", + /* 67*/ "zufällig\n", + /* 68*/ "Wähle Sounds\n", + /* 69*/ "Wähle Sound\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams ermächtigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurück\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Sim.\n", + /* 81*/ "Menschen-Sim.-Paare\n", + /* 82*/ "Zurück\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufügen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle löschen\n", + /* 94*/ "Zurück\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant löschen\n", + /* 99*/ "Zurück\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufügen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurück\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zufällig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kanäle", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "Dächer", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glückseligkeit", + /*136*/ "Zufällig", + /*137*/ "Spieler laden\n", + /*138*/ "Abbruch\n", + /*139*/ "Laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik für %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Munition:\n", + /*151*/ "Schaden:\n", + /*152*/ "Schmerzen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschütze:\n", + /*162*/ " Überlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurück\n", + /*165*/ "Challenges OK\n", + /*166*/ "Zurück\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurück\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurück\n", + /*183*/ "Speichern\n", + /*184*/ "Möchten Sie das \nbestehende File\nüberschreiben?\n", + /*185*/ "Überschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Bestätigen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Möchten Sie wirklich\nabbrechen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurück\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurück\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hügel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht zeigen\n", + /*229*/ "Items nicht zeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hügel zeigen\n", + /*234*/ "Mobiler Hügel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Koffer zeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurück\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei für alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Der Koffer 1", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hügels", + /*251*/ "Der Koffer 2", + /*252*/ "Berühr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hügel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik für %s", + /*281*/ "Suizide\n", + /*282*/ "Versuche\n", + /*283*/ "Hits\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurück\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "Wähle den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo möchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "möchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie können jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. Wählen Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "wählen Sie ihn aus dem Charakter-Menü vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Menü.\n", + /*404*/ "Die gewünschten Köpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie können den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Abbruch\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Geräte-Liste\n", + /*418*/ "Information\n", + /*419*/ "Örtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "benötigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurück\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Abbruch\n", + /*436*/ "Cheats\n", + /*437*/ "Sie können das Gerät jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "Wählen Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Zerstörte Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "benötigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score nicht erreicht\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, können Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurück\n", + /*482*/ "Spieler %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak \nwird geprüft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Bitte warten...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_i.c b/src/files/lang/jap-final/mpmenu_str_i.c new file mode 100644 index 000000000..f3bfe22df --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita più breve\n", + /* 13*/ "Vita più lunga\n", + /* 14*/ "Doppio colpo\n", + /* 15*/ "Triplo colpo\n", + /* 16*/ "Colpo quadruplo\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientaz.\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocat.\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincit.\n", + /* 47*/ "Ultimo perden.\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Più brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficoltà:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicità", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statistiche %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore è\nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "Sì\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalità comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "Sì\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma più usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statistiche %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vitt.\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate più macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondità\n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosità\n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima però accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statistiche esercitazione\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Età:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficoltà\n", + /*443*/ "Difficoltà:\n", + /*444*/ "Seleziona difficoltà:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informazioni esercitazione\n", + /*448*/ "Statistiche esercitazione\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficoltà:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finché i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/jap-final/mpmenu_str_s.c b/src/files/lang/jap-final/mpmenu_str_s.c new file mode 100644 index 000000000..1a89f6635 --- /dev/null +++ b/src/files/lang/jap-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El más Suicida\n", + /* 1*/ "¿Y la munición?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntería\n", + /* 5*/ "El más Profesional\n", + /* 6*/ "El más Mortífero\n", + /* 7*/ "El más Inofensivo\n", + /* 8*/ "El más Cobarde\n", + /* 9*/ "El más Frenético\n", + /* 10*/ "El más Honorable\n", + /* 11*/ "El menos Honorable\n", + /* 12*/ "La Vida más Corta\n", + /* 13*/ "La Vida más Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cuádruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Parám.\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Límites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Parám.\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "Hándicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones Jug.\n", + /* 35*/ "Estadísticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "Úl. Ganador\n", + /* 47*/ "Úl. Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafío\n", + /* 50*/ "Desafíos de Combate\n", + /* 51*/ "Abortar Desafío\n", + /* 52*/ "Abortar\n", + /* 53*/ "¿Estás seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre Eq.\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Múltiples Melodías\n", + /* 65*/ "Volver\n", + /* 66*/ "Múltiples Melodías\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodías\n", + /* 69*/ "Elegir Melodía\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "Máximo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Añadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Añadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "¡Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Límites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Parámetros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin límite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Clásico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberías", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almacén", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "Área 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botón B para cancelar\n", + /*139*/ "Cargar Parámetros\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estad. de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisión:\n", + /*149*/ "Tiros Cabeza:\n", + /*150*/ "Mun. Util.:\n", + /*151*/ "Daño Caus.:\n", + /*152*/ "Dolor Rec.:\n", + /*153*/ "N° Juegos:\n", + /*154*/ "J. Ganados:\n", + /*155*/ "J. Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisión:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Mr. Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Título:\n", + /*164*/ "Volver\n", + /*165*/ "Desafíos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Configuración\n", + /*184*/ "¿Quieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre Orig.\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautomáticamente.\n", + /*192*/ "¿Guardar una copia?\n", + /*193*/ "No\n", + /*194*/ "Sí\n", + /*195*/ "Abandonar\n", + /*196*/ "¿Seguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Munición en Pantalla\n", + /*210*/ "Función del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletín\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "Cám. Lenta\n", + /*224*/ "Movimiento Rápido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jug.\n", + /*229*/ "Sin Destacar Obj.\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Móvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletín\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "Sí\n", + /*242*/ "Intelig.\n", + /*243*/ "Escenario\n", + /*244*/ "¡Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mantén el Maletín", + /*248*/ "Central Hacker", + /*249*/ "Tú la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura Maletín", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletín", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturar", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Título:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Situación Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situación Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Aci.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "¿Estás seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "¿Dónde querrás usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. Cámara\n", + /*310*/ "Inserta tu cámara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "¡Cámara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reinténtalo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir Cámara\n", + /*322*/ "Más de una cámara detectada.\n", + /*323*/ "Por favor, elige qué cámara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la Cámara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la Cámara\n", + /*331*/ "Elige foto a cargar de la cámara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "¡Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "¿Estás seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "¿Estás seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "¿Quieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendrán en la memoria.\n", + /*388*/ "¿Quieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegúrate de que el Controller Pak\n", + /*397*/ "está insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "¡Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el menú de personajes\n", + /*403*/ "en el menú de parámetros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misión aparecerán en\n", + /*405*/ "cualquier misión que juegues.\n", + /*406*/ "Puedes editar más tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botón B para volver.\n", + /*415*/ "Información del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Información\n", + /*419*/ "Lugares\n", + /*420*/ "Vehículos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Información Adicional\n", + /*423*/ "Estadísticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "¡Completado!\n", + /*426*/ "¡Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botón B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Información de Entrenamiento\n", + /*448*/ "Estadísticas de Entrenamiento\n", + /*449*/ "¡Completado!\n", + /*450*/ "Puntuación:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisión:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Munición\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuación Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Total\n", + /*466*/ "Puntuación\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Límite de Munición:\n", + /*472*/ "Límite de Tiempo:\n", + /*473*/ "Precisión Mínima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuación Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, serás\nincapaz de avanzar más en el juego\nmientras ese truco esté activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "¡Pulsa START!\n", + /*484*/ "¡Buscando Cámara!\n", + /*485*/ "Calibrando Cámara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Compr. Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de Cámara\n", + /*495*/ "Por favor... espera...\n", +}; diff --git a/src/files/lang/jap-final/mpweaponsE.c b/src/files/lang/jap-final/mpweaponsE.c new file mode 100644 index 000000000..13db3dc7e --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsE.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ "Perfect Dark Registered Trademark No. 43666801\n", + /*282*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*283*/ NULL, + /*284*/ NULL, + /*285*/ NULL, + /*286*/ NULL, + /*287*/ NULL, + /*288*/ NULL, + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweaponsJ.c b/src/files/lang/jap-final/mpweaponsJ.c new file mode 100644 index 000000000..2aa27a4cb --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsJ.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%s Ó\n‰-€ß€÷€Ï€Õ¸\n‚ÝÏ‚öãÉ\n", + /* 1*/ "%s Ó\n€Ð€ß€Ê€Û€Ì¸\n‚ÝÏ‚öãÉ\n", + /* 2*/ "%s Ó\n%s Ò\n€Ð€ß€Ê€Û€Ì¸\n‚ÝÏ‚öãÉ\n", + /* 3*/ "%s Ó\n‚ä‚…Ò\n€Ð€ß€Ê€Û€Ì¸\n‚ÝÏ‚öãÉ\n", + /* 4*/ "%s Ò\n€Ð€ß€Ê€Û€Ì¸\n‚ÝÏ‚öãÉ\n", + /* 5*/ "%s Ò\n€Ð€ß€Ê€Û€Ìó\n€“”€Ñ€Ï€ã€´\n", + /* 6*/ "%s Ó\n‚ä‚…Ò\n€Ð€ß€Ê€Û€Ìó\n€“”€Ñ€Ï€ã€´\n", + /* 7*/ "%s Ó\n%s Ò\n€Ð€ß€Ê€Û€Ìó\n€“”€Ñ€Ï€ã€´\n", + /* 8*/ "ƒ¨„Ö”€Ñ€Ï€ã€´\n", + /* 9*/ "„³‚ÔÒ€Ô€å¸\n", + /* 10*/ "‚ÙÅÌÅØ´É€´\n", + /* 11*/ "€õ€Û€´\n", + /* 12*/ "€Ô€å¸‚ÙÅÉ€´\n", + /* 13*/ "€’”€Ñ€Ï€ã†Êƒ¥\n", + /* 14*/ "ºÎÉæ€Ô€å\n", + /* 15*/ "%s\n¸‚¬ã€´\n", + /* 16*/ "%s\n¸‚ÙÇ€´\n", + /* 17*/ "€é€Ê€Ö€Ï€þƒ±„¶\n", + /* 18*/ "…Ñ‚¾æ‚Å„–ãØÅÉ\n", + /* 19*/ "€é€Ê€Ö€Ï€þ„ׄØ\n", + /* 20*/ "‰‚„€ß€÷€Ï€Õ惇ƒƒ\n", + /* 21*/ "…ÿƒ›á‚ó‚ô€´\n", + /* 22*/ "…ÿƒ›á„ׄ؀´\n", + /* 23*/ "%s æ\n…ÿƒ›á„ׄ؀´\n", + /* 24*/ "%d†Û€‘ƒÎ\n", + /* 25*/ "€‘”€Ñ€Ï€ã€´\n", + /* 26*/ "€Û‚„€øŠƒ¼Å\n", + /* 27*/ "€Ô‚„€ã€î€à€Ê€×\n", + /* 28*/ "€ú€Ø€Ê€ã€ö€Ï€à€Ë\n", + /* 29*/ "€Û€ï€Ì€ö€Ï€ã\n", + /* 30*/ "…ÿƒ›á\n", + /* 31*/ "†€†€€ë€Å‚„€Ú€Ñ€ã\n", + /* 32*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü€‘\n", + /* 33*/ "‘€Ü€ã€ø€‚ƒ‚׃‡…‘\n", + /* 34*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü€’\n", + /* 35*/ "€Ü€Ñ€×€ú‚„€×\n", + /* 36*/ "†‚†ƒ€…£‚Ȇ„\n", + /* 37*/ "€Ü€ù€Ñ€ó‚„\n", + /* 38*/ "€ã€ö€Ï€Ö€ö€Ñ\n", + /* 39*/ "€Ü€ú‚„€ò‚„€Û€Í€Ï\n", + /* 40*/ "€Ü€ß‚„€ã€ß€Ï\n", + /* 41*/ "”‚„ƒ‚\n", + /* 42*/ "€Õ€Ü€ß€ð\n", + /* 43*/ "€ö€Ï†€ð\n", + /* 44*/ "€ö€Ï†€ð€•\n", + /* 45*/ "…Ñ‚¼‚‘\n", + /* 46*/ "€Ý€Ï€Ú‚„…£…¤\n", + /* 47*/ "€«€ö€Ï€à€Ë\n", + /* 48*/ "€ €ö€Ï€à€Ë\n", + /* 49*/ "…£‚Ȇ„\n", + /* 50*/ "†Ü„™‚à\n", + /* 51*/ "€ìŒ‚„†„\n", + /* 52*/ "‡‹†©‡Œ\n", + /* 53*/ "€ë€Å‚„€Ú€Ñ€ã\n", + /* 54*/ "€û‚„†„\n", + /* 55*/ "ƒÂ‚‚à†„\n", + /* 56*/ "‘€Ü€ã€ø†„\n", + /* 57*/ "€â€Ü€ã\n", + /* 58*/ "€”€¦€â€Ü€ã\n", + /* 59*/ "ƒ¼Å\n", + /* 60*/ "€Û‚„€øŠ\n", + /* 61*/ "ƒ¼ƒÜ\n", + /* 62*/ "‚µ‚¶‚ó‚ô\n", + /* 63*/ "‚ ‚ì\n", + /* 64*/ "‚Ú‚Ô‚ ‚ì\n", + /* 65*/ "€Ê€×‚ †”\n", + /* 66*/ "Ó‚Ïã̻⿅ ÅÁ\n", + /* 67*/ "…Ñ‚¾ÄãÌ»ØÇ¹\n", + /* 68*/ "†Ý„„¸…äÙâ\n", + /* 69*/ "ܼ‚ƒƒ¬\n", + /* 70*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×¸\n‚ùåíÏ‚¾Ââ\n", + /* 71*/ "€Ê€×€ë€ø\n", + /* 72*/ "Ó€»´ú»óÆ€Â\n€Ý‚„ÆâÏÓ\n€‘€è‚„€ã€…€’€˜“‚„‚\n惇ƒƒóÆ€Â\n", + /* 73*/ "", + /* 74*/ "€¨€¤\n", + /* 75*/ "€»€»€»€»€»€»€»€»\n", + /* 76*/ "ƒÞ‚ÿ€Ï€à\n", + /* 77*/ "€Ü€Ñ€×€ú‚„€×\n", + /* 78*/ "ƒ¼‚—€ò‚„Š\n", + /* 79*/ "€Ô‚„€ø‚Ì„½€ƒ€Þ€ú€„\n", + /* 80*/ "…¤ƒ¼‚Œ„ù\n", + /* 81*/ "…¤ƒ¼‚Œ„ù€€÷€ú‚„Š‚ ƒƒ\n", + /* 82*/ "€Ü€ú‚„€ò‚„€Û€Í€Ï€ƒ€Þ€ú€„\n", + /* 83*/ "€€¤€ò‚„Š\n", + /* 84*/ "€ã€ù€Ï€ãÒ€î€þ€ä€ð‚à\n", + /* 85*/ "€ë€Å‚„€Ú€Ñ€ã\n", + /* 86*/ "€ß€Ñ€å‚„‚€Í€Ð€Ï€ä\n", + /* 87*/ "‚—€Ü€ò‚„€ø\n", + /* 88*/ "€Û‚„€øŠ‚ÍƒŽ€ƒ‚—€„\n", + /* 89*/ "€Û‚„€øŠ‚̓Ž\n", + /* 90*/ "€Ü‚„‚„€Û‚„€øŠ\n", + /* 91*/ "€×€ö€Û€Ê€×‚ë„¥\n", + /* 92*/ "„ׂȀ܀߀ʀëÒÙ\n", + /* 93*/ "€Ó€øŒ€Üó’€ù€Ñ\n", + /* 94*/ "ƒ…‚—€«€ö€Ï€à€Ë\n", + /* 95*/ "€ö€Ê’€ã€Ê’ƒ—‚ÄƒÂ‚à€…¤ƒ¼‚Œ„ù\n", + /* 96*/ "ƒ…‚—ƒ„‚Ý\n", + /* 97*/ "…†‰€ò‚„Š\n", + /* 98*/ "€×€Ú‚„\n", + /* 99*/ "€í€Ê€ã€Û€Í€Ê€ã\n", + /*100*/ "€ê€Ê€ã€Œ€ö€Ï\n", + /*101*/ "€Ó€Ñ€÷€Ð€Ï\n", + /*102*/ "€«€ã€ö€Ê€ÕÏ…µ…¶‚Ì„½†Ó†—\n", + /*103*/ "€«€ö€Ï€à€Ë\n", + /*104*/ "€¬€ö€Ñ€ë€ø\n", + /*105*/ "€±€Ü€Ö€Ë€Ï\n", + /*106*/ "€¬Š€ö€€Ï\n", + /*107*/ "€ö€Ê’€ã€Ê’€ü€Ï\n", + /*108*/ "€ë€È€å€×€Ü\n", + /*109*/ "€Ú€Ñ€Ö€Ê€×€ü€Ï\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Ž€øŽ€Ê€ã€…†‚„€×\n", + /*119*/ "¾ÉÒÅÙ\n", + /*120*/ "€ÿ‚„€ð’€ù€Ñ\n", + /*121*/ "€Ò€È”€Ï\n", + /*122*/ "€à‚„€ð€ñ€Ñ€ã\n", + /*123*/ "‚€Í€Ð€Ï€äƒˆÒ‚Ì„½€ƒ€Þ€ú€„\n", + /*124*/ "€×€ö€Û€Ê€×€Ò€È”€Ï€ƒ€Þ€ú€„\n", + /*125*/ "‰‚„€ß†€Ñ€Ï„·„“€Š„؂Ā‹", + /*126*/ "‰‚„€ß†€Ñ€Ï„·„“€Š‚ºƒ÷€‹", + /*127*/ "€Ó€÷€Ð€•€‘€ŠƒÅ‚΀‹", + /*128*/ "€Ó€÷€Ð€•€‘€Š‚¨‚Ÿ€‹", + /*129*/ "€Ó€÷€Ð€•€‘€Š‚ž‚Ÿ€‹", + /*130*/ "…¨…惬€¾\n", + /*131*/ "€ƒ€à‚„€ã€„€Þ€ú€…€ï€Ê€Û€Í€Ï\n", + /*132*/ "€ƒ€à‚„€ã€„€Ù€Ï‹€Ê€ã€Û€ï€Ì€ù‚„€ß\n", + /*133*/ "€ƒ€à‚„€ã€„‚£‚‚€ï€Ê€Û€Í€Ï\n", + /*134*/ "€ƒ€à‚„€ã€„‚—‚ü€ï€Ê€Û€Í€Ï\n", + /*135*/ "’€ö€ÑŠÎÅ\n", + /*136*/ "€à‚„€ã‚ùƒˆ\n", + /*137*/ "ƒâƒˆ‚¡‚¢€¾", + /*138*/ "€Ü€â‚„‚€¾", + /*139*/ "¸€×€÷€ÐÆãõ€¾", + /*140*/ "…¨…惬€¾", + /*141*/ "‚Œ„ùƒ“‚ý€¾", + /*142*/ "", + /*143*/ "„ì„í¸€à€È€Ê€×ÅÉ»€à‚„€ã¸†Â¹ó‡ÌÄ»€Â\n", + /*144*/ "ƒâƒˆ‚¡‚¢‚£‚‚ƒî€¾", + /*145*/ "…·‚×€ã€ù‚„€å€Ï€þ󀂄€øŠ€ñ†€ø¸ÉÁĹ€ÿ€Ê€ã€Â\n", + /*146*/ "‚ë„¥„ì„íÒ†Ó†—\n", + /*147*/ "‚ë„¥¸ƒ¹Ï†Ó†—\n", + /*148*/ "ƒ‚„€ð„û‚›\n", + /*149*/ "…¤†ÇÒ†Ó†—\n", + /*150*/ "‚Ì„½€ò‚„Іӆ—\n", + /*151*/ "“€Ñ€Ï€ã‚„€ø\n", + /*152*/ "†ß†àÒ†Ó†—\n", + /*153*/ "€ï€Ê€Û€Í€Ï€ß€Ñ€ð\n", + /*154*/ "€ò‚„Š\n", + /*155*/ "ƒœƒúƒ˜†á\n", + /*156*/ "‚µ‚¶¸…džâ\nÅØÆ¿€À\n", + /*157*/ "€£€€ù‚„€Ü‚„€á\n", + /*158*/ "€£€€Ô€ë€Æ€Ü\n", + /*159*/ "€Ó€øŒ€Ü€€à€Í€Ê€Ö\n", + /*160*/ "€Ó€ö‚„\n", + /*161*/ "ÃÒ€ë€Å€Ñ€øÓ‚ùƒˆ‚\nÎÒ󃑃ö‚ŸƒØÇ¹\n", + /*162*/ "€Ö€Ë€Ï€Ý€ø\n", + /*163*/ "‚Œ„ùƒ“‚ý€¾\n", + /*164*/ "„—„´†¿„±ƒ¥ƒÎ€¾\n", + /*165*/ "„—„´„Î‚ðƒ¥ƒÎ€¾\n", + /*166*/ "€à€Ë€ù€Ï‚€€×€÷€Ð€´\n", + /*167*/ "€à€Ë€ù€Ï‚€‚ñ‚ò€´\n", + /*168*/ "€à€Ë€ù€Ï‚€€à‚„€ã‚ùƒˆ€´\n", + /*169*/ "€Û€ç€î҆߆à\n", + /*170*/ "€ÿ‚„€ð‚҆߆à\n", + /*171*/ "€ß€Ñ€ã€ø€Ü€×€÷‚„€ÏÈÒ€’\n", + /*172*/ "€à€Ë€ù€Ï‚€Ü€ß‚„€ã\n", + /*173*/ "‰‚„€ß†€Ñ€Ï‚˜‡Ì„ÿ…€ƒç", + /*174*/ "€Ó€ö‚„\n", + /*175*/ "†ÅҀـπã€ú‚„€ö\n€Ê€×æºáØÇ¹\n", + /*176*/ "†Ý„„¸…äÙâ\n", + /*177*/ "ÃҀـπã€ú‚„€ö\n€Ê€×¸†Ý„„ÅÌÜ\nßäÅ»óÆ¿€À\n", + /*178*/ "‰‚„€ßÓ‚ñåãØÆ€´\n", + /*179*/ "€Ö€Ë€Ï€Ý€ø\n", + /*180*/ "†Ý„„Æâ\n", + /*181*/ "†Ý„„‚ó‚ô\n", + /*182*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×Ó\n†Ý„„ÄãØÅÉ\n", + /*183*/ "†Ý„„‚ñ‚ò\n", + /*184*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×Ò\n†Ý„„Ï‚ñ‚òÅØÅÉ\nÃҀـπã€ú‚„€ö\n€Ê€×Ó‚ù½ØÇ¹\n", + /*185*/ "€é€Ï‰€Æ\n", + /*186*/ "L/R: ", + /*187*/ "C-UP: ", + /*188*/ "C-LEFT/RIGHT: ", + /*189*/ "C-DOWN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D: ", + /*193*/ "Z: ", + /*194*/ "+ PAD: ", + /*195*/ "‚ë„¥€Ž€í‚„€øŠ", + /*196*/ "‚ë„¥€Ž„–á†Ô½", + /*197*/ "‚ɇËéâ", + /*198*/ "‚ɇÌäÆ", + /*199*/ "‚ɇÌäÆ", + /*200*/ "‚ɇËéâ", + /*201*/ "ƒ‚·", + /*202*/ "‹€Ê€×", + /*203*/ "€Ú€ÑЀ܀â€Ê’", + /*204*/ "‚Ì„½†Â†Ã", + /*205*/ "€Ð€×€Û€Í€Ï€½€÷€ú‚„Š", + /*206*/ "‚×Ë", + /*207*/ "„¨‚Ä€½€ß‚„€Ï", + /*208*/ "‚É‚ÒÅ", + /*209*/ "„¨‚Ä€½€Ú€ÑЀ܀â€Ê’", + /*210*/ "‚É‚ÒÅ€½€Ú€ÑЀ܀â€Ê’", + /*211*/ "€œ€ß€ÏÍ„÷ì", + /*212*/ "€Ù€Ï€ã€ú‚„€ö€‘€¾", + /*213*/ "€Ù€Ï€ã€ú‚„€ö€’€¾", + /*214*/ "…‰ƒÛ€ò‚„Š %s %s\n", + /*215*/ "€ƒ€‘†¿€ò‚„Š€„", + /*216*/ "€ƒ€’†¿€ò‚„Š€„", + /*217*/ "€‡‚Ì„½†Â†Ã€ˆ€í‚„€øŠ€¾€×€Ñ€Ê€×€ñ€å€Ì‚„\n€‡€›€ˆ€í‚„€øŠ€¾‚Ì„½€ò‚„ŠÒ„–†Ô\n€‡€›€ˆ€¹€‡‚×Ë€ˆ€¾‚Ì„½€ò‚„ŠÒ‚ƒƒ“„–†Ô\n€‡‚ë„¥€ˆ€¹€‡€œ‡Ì€ˆ€¾ÅµæÚ\n€‡‚ë„¥€ˆ€¹€‡€œ‡Ë€ˆ€¾ƒüË\n", + /*218*/ "ƒ…ÌÒ€à‚„€ã¸ƒ¼ƒÜÏÆâ\n", + /*219*/ "€Ü€ö€Ï€þ€¨€Ÿ€Ÿ\n", + /*220*/ "€ô‚„‚„€¢€€¾\n", + /*221*/ "€Ü€û‚„Š€¾\n", + /*222*/ "€Ü“€Û€Ë€ø\n", + /*223*/ "„­ƒÿ€Ô’€Û€Í€Ï€¾\n", + /*224*/ "‚—Ҁܑ‚„Š€¾\n", + /*225*/ "‚—Ò‚‹‚‚€¾\n", + /*226*/ "‚—ÒƒºÄ€¾\n", + /*227*/ "‚—҃邅¥€¾\n", + /*228*/ "€¨€¤\n", + /*229*/ "€Ö€Ë€Ï€Ý€ø\n", + /*230*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×æ‚ÉË¿áØÇ¹\n", + /*231*/ "€ç‚„€ð€¾\n", + /*232*/ "ƒŠƒç€¾\n", + /*233*/ "€»€»„®ƒ´€»€»\n", + /*234*/ "„÷…¼€ë€Å€Ñ€øæ„Ö…Ø\n", + /*235*/ "", + /*236*/ "…¼ƒÒ‚Ê‚Ë\n", + /*237*/ "ƒŠƒçÒ‚Ê‚Ë\n", + /*238*/ "€Ö€Ë€Ï€Ý€ø\n", + /*239*/ "€ë€Å€Ñ€ø…¼Ò‚Ê‚Ë\n", + /*240*/ "„ÙÉ΀ë€Å€Ñ€ø…¼€¾\n", + /*241*/ "€Ù‘‚„†ÅÒ€ë€Å€Ñ€ø\nÎÒ󃑃öóÀØÇ¹\n", + /*242*/ "˜€‚‘‚’‚“€¾%d\n", + /*243*/ "€ß‚„€ÿ€Ê€ã€ß€Ñ€ð€¾\n", + /*244*/ "„ÙÉÎ€à‚„€ã¸†Êƒ¥€´€¾\n", + /*245*/ "‚¾Ââ\n", + /*246*/ "ܼ‚ƒƒ¬’€ù€ÑÆâ\n", + /*247*/ "†¿„±†ˆ„ÇҀ݂„\n", + /*248*/ "†¿„±†ˆ„Ǹ\n€Ý‚„ÅØÆ¿€À\n", + /*249*/ "€Ý‚„Æâ\n", + /*250*/ "€Ý‚„Åλ\n", + /*251*/ "’€ù€Ñ€ó‚„€ç‚„€ð€¾\n", + /*252*/ "€Ý‚„€ë€Å€Ñ€øÓ\n‚Î…èÒÉÛÏ\nƒ‘ƒöÄãØÅÉ\n", + /*253*/ "‚¾Ââ\n", + /*254*/ "€Ó€ö‚„\n", + /*255*/ "€ÿ‚„€ð‚„€ÑÒ€Õ‚„€ã€÷€Ê‚¸\n…žÙ‚ÁÛØÇ¹€Â…Ñ‚¾æ… Å»\n¿€€Õ‚„€ã€÷€Ê‚æ… Å»¿¸\n‚¹‚ÇÅ̇ÌÄ»€Â\n", + /*256*/ "€Ö€Ë€Ï€Ý€ø\n", + /*257*/ "€Ó€ö‚„\n", + /*258*/ "€Ý‚„€ë€Å€Ñ€øÓ\n", + /*259*/ "‚Î…èÒÉÛÏ\n", + /*260*/ "ƒ‘ƒöÄãØÅÉ\n", + /*261*/ "€Ö€Ë€Ï€Ý€ø\n", + /*262*/ "€ö€Ï€ÿ‚„‚†Â†Ã€¾\n", + /*263*/ "€Ñ€Ï€þ€÷€Ê€Û€Ì\n", + /*264*/ "€ë€ù€Ï€à\n", + /*265*/ "‚€Ë‚„€î€Ï\n", + /*266*/ "€Ñ€ß€÷€Ð€Ï\n", + /*267*/ "€Ü€å€Ê€Û€Ì\n", + /*268*/ "€Ð€ñ€÷€Õ€Ï\n", + /*269*/ "€ö€Ï€ÿ‚„‚€¾\n", + /*270*/ "€ö€Ï€ÿ‚„‚\n", + /*271*/ "…‰ƒÛ€ò‚„Š\n", + /*272*/ "†ÑƒÎ„¨‚Ä҇ˇ̆Ò\n", + /*273*/ "ƒ—‚ă‚ԆуÎ\n", + /*274*/ "†ÈÒÞã\n", + /*275*/ "ƒ—‚Ă넥\n", + /*276*/ "‚ë„¥†ˆ„Ç\n", + /*277*/ "€í‚„€øŠ\n", + /*278*/ "„–á†Ô½\n", + /*279*/ "€Û€ç€î҆߆à\n", + /*280*/ "€ÿ‚„€ð‚҆߆à\n", + /*281*/ "Perfect Dark Registered Trademark No. 4366801\n", + /*282*/ "ÃÒ€ÿ‚„€ðÏÓ€€ñ€ò€÷‚„†æ…˜€Ê€×\n", + /*283*/ "惇ƒƒóƀ€‡ÅÁÓ€ÿ‚„€ðÒƒ›‡½\n", + /*284*/ "…û‚ì†Ð¸¾…žÙ‡ÌÄ»€Â€€€€€€\n", + /*285*/ "€Ù€Ï€ã€ú‚„€ö€Ù€ç€×€ß€‘Ï\n", + /*286*/ "€Ù€Ï€ã€ú‚„€öæ…Ñ‚¾ÄãÌ»ØÇ¹€Â\n", + /*287*/ "„·‚‹ÒƒÉƒÒ¸„–´Ì¿à\n", + /*288*/ "€Ù€Ï€ã€ú‚„€ö¸…Ñ‚¾Å̇ÌÄ»€Â\n", + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweaponsP.c b/src/files/lang/jap-final/mpweaponsP.c new file mode 100644 index 000000000..b2f6dad7d --- /dev/null +++ b/src/files/lang/jap-final/mpweaponsP.c @@ -0,0 +1,296 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "Français\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, + /*284*/ NULL, + /*285*/ NULL, + /*286*/ NULL, + /*287*/ NULL, + /*288*/ NULL, + /*289*/ NULL, + /*290*/ NULL, + /*291*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_f.c b/src/files/lang/jap-final/mpweapons_str_f.c new file mode 100644 index 000000000..1d97c6827 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_f.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtient:\nRécepteur\n", + /* 1*/ "%s obtient:\nMallette\n", + /* 2*/ "%s obtient:\nMallette %s\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "Mallette %s", + /* 5*/ "Vous capturez:\nMallette %s\n", + /* 6*/ "%s capture notre\nMallette\n", + /* 7*/ "%s capture:\nMallette %s\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien joué!\n", + /* 12*/ "Vous décapsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous êtes la victime!\n", + /* 15*/ "Protégez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "Téléchargement réussi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "Début téléchargement.\n", + /* 20*/ "Il faut utiliser le récepteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa capturé\nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "L-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquil.\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps à corps\n", + /* 46*/ "Mine proximité\n", + /* 47*/ "L-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquil.\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annulé\n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak inséré\n", + /* 66*/ "endommagé ou\n", + /* 67*/ "mal branché.\n", + /* 68*/ "Tenter répar.\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Ne pas utiliser\n Controller Pak\n", + /* 71*/ "Controller Pak inséré\n", + /* 72*/ "Espace libre insuf.:\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n(maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings du dragon\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. inf. Pas de recharg.\n", + /* 82*/ "Ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Visée classique\n", + /* 92*/ "Têtes équipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. inf. Laptop sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Coffres armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scan rayonsX\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Spécial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilité\n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "Désertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficulté:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coopératif\n", + /*134*/ "Triche Contre-Opération\n", + /*135*/ "Déshonneur\n", + /*136*/ "Tricheur\n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et accédez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Visée à l'écran\n", + /*147*/ "Cible\n", + /*148*/ "Portée zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna Négociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Opér. impossible.\nUtilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score équipe:\n", + /*166*/ "Challenge réussi!\n", + /*167*/ "Challenge échoué!\n", + /*168*/ "Challenge triché!\n", + /*169*/ "Sous-titres ciné\n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enquête dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na été enlevé.\n", + /*176*/ "Tentative réparation\n", + /*177*/ "Tenter une\nréparation du\nController Pak?\n", + /*178*/ "Donnée être\nperdue!\n", + /*179*/ "Annuler\n", + /*180*/ "Réparer\n", + /*181*/ "Réparation réussie\n", + /*182*/ "Controller Pak\nréparé.\n", + /*183*/ "Réparation échouée\n", + /*184*/ "Controller Pak\nne peut être réparé.\nSauvegarde ou\nchargement impossible\navec ce Cont. Pak.\n", + /*185*/ "Handicap\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrôle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de précision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "Désactiver toutes les triches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix paramètres:\n", + /*224*/ "Vit. réaction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "Dégâts ennemis:\n", + /*227*/ "Précision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient déjà\n", + /*235*/ "un fichier nommé\n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut être effacé.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps spécial:\n", + /*244*/ "Nouvelle triche disponible:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauvé\na été effacé:\ncorrupu ou\nendommagé.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nVérifier connexions et s'assurer\nque la bonne cartouche est\nutilisée.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a été\n", + /*259*/ "effacée: corrompue\n", + /*260*/ "ou endommagée.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Français\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ "Style contrôle\n", + /*272*/ "Visée inv.\n", + /*273*/ "Voir droit\n", + /*274*/ "Vue tête\n", + /*275*/ "Visée auto\n", + /*276*/ "Contrôle cible\n", + /*277*/ "Fixe\n", + /*278*/ "Alt.\n", + /*279*/ "Sous-titres ciné\n", + /*280*/ "Sous-titres jeu\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_g.c b/src/files/lang/jap-final/mpweapons_str_g.c new file mode 100644 index 000000000..76a7f4616 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_g.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat den Koffer von %s\n", + /* 3*/ "%shat unseren\nAktenkoffer\n", + /* 4*/ "Aktenkoffer von %s geschnappt\n", + /* 5*/ "Sie haben den\nAktenkoffer von %s geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat den\nAktenkoffer von %s geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschützen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie müssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHügels!\n", + /* 22*/ "Der Hügel\nist unser!\n", + /* 23*/ "%shat den Hügel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Auto\n", + /* 28*/ "Raketenw.\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hügels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Der Koffer 1\n", + /* 33*/ "Höchste Vorsicht\n", + /* 34*/ "Der Koffer 2\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengs.\n", + /* 37*/ "Slayer\n", + /* 38*/ "B-Gewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drücken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zufällig\n", + /* 44*/ "Fünf Zuf.\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "A-Mine\n", + /* 47*/ "Raketenw.\n", + /* 48*/ "Granatw.\n", + /* 49*/ "Sprengs.\n", + /* 50*/ "G-Magnum\n", + /* 51*/ "Schwere\n", + /* 52*/ "Bet.-Gewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Autom.\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Contr.-Pak beschädigt\n", + /* 66*/ "ist beschädigt oder\n", + /* 67*/ "nicht korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten benötigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMenü ausreichend Platz. \n(Halte während des Einschaltens \nSTART gedrückt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfügbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Köpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegr. Muni für Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenw.\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Röntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis-Gewehr\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen für Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe für Jo im Solo-Modus\n", + /*125*/ "dataDyne Überlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfügbar", + /*138*/ "Komplettierung", + /*139*/ "für den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als ", + /*142*/ " oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Menü.", + /*143*/ "Wählen Sie den Cheat für mehr Infos aus.\n", + /*144*/ "Kumpel verfügbar", + /*145*/ "Erlangen Sie Gold am Schießstand, um klassische Waffen anzuwählen.\n", + /*146*/ "Display\n", + /*147*/ "Ziel\n", + /*148*/ "Zoom\n", + /*149*/ "Munition\n", + /*150*/ "Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Text\n", + /*153*/ "Zeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Möchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterhändler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive \nFiles können nicht \ngelöscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Abgeschlossen!\n", + /*167*/ "Fehlgeschlagen!\n", + /*168*/ "CHEATER!\n", + /*169*/ "Cutscene Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Datenverlust\nmöglich!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur nicht OK\n", + /*184*/ "Das Controller Pak \nkann nicht repariert\nwerden. Sie können\nkeine Daten laden \noder speichern.\n", + /*185*/ "Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C OBEN: ", + /*188*/ "C LINKS/RECHTS: ", + /*189*/ "C UNEN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D-STICK: ", + /*193*/ "Z: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "BLICK OBEN", + /*198*/ "BLICK UNTEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "BLICK OBEN", + /*201*/ "VORWÄRTS", + /*202*/ "RÜCKWÄRTS", + /*203*/ "AUSW.", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSW.", + /*210*/ "UMSCHAUEN/AUSW.", + /*211*/ "WIE C-KNÖPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einhändig)", + /*216*/ "(Beidhändig)", + /*217*/ "'Waffe' gedrückt halten = Quick-Menü\n'Aktions' gedrückt halten = 2. Funktion\nAktion+Feuer ändert die Funktion kurz\nZielfunktion = manuelles Zielen\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen wählen:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen ändern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelöscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfügbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen bestätigen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von beschädigten Daten \noder Hardware-Schäden \ngelöscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte überprüfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Beschädigung gelöscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "Wählen Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Französisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ "Steuerung\n", + /*272*/ "Blickrichtung\n", + /*273*/ "Geradeaus\n", + /*274*/ "Kopfbewegung\n", + /*275*/ "Auto-Visier\n", + /*276*/ "Fadenkreuz\n", + /*277*/ "Halten\n", + /*278*/ "Umsch.\n", + /*279*/ "Cutscene Untertitel\n", + /*280*/ "In-Game Untertitel\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_i.c b/src/files/lang/jap-final/mpweapons_str_i.c new file mode 100644 index 000000000..c5ec94eef --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_i.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha la\ncartella\n", + /* 2*/ "%sha la cartella di %s\n", + /* 3*/ "%sha la nostra\ncartella\n", + /* 4*/ "Presa la cartella di %s\n", + /* 5*/ "Hai preso la\ncartella di %s\n", + /* 6*/ "%s ha preso la nostra\ncartella\n", + /* 7*/ "%s ha preso la\ncartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Un-colpo-e-sei-morto\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "5 a caso\n", + /* 45*/ "Lotta\n", + /* 46*/ "Mina pross.\n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagran.\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum Oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "È danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio - premi\nSTART all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte le armi per missioni individuali\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalità DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficoltà:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalità\n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Lim. tempo:\n", + /*164*/ "Lim. punti:\n", + /*165*/ "Lim. punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\nè stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\nè stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIÙ: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIÙ", + /*199*/ "GUARDA GIÙ", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalità comandi %s %s\n", + /*215*/ "(una mano)", + /*216*/ "(due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIÙ per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocità reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene già un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon può essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\nè stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati\n", + /*260*/ "perché danneggiati.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ "Modalità comandi\n", + /*272*/ "Inv. punto vista\n", + /*273*/ "Vista in avanti\n", + /*274*/ "Rotazione testa\n", + /*275*/ "Mira automatica\n", + /*276*/ "Mirino\n", + /*277*/ "Tieni premuto\n", + /*278*/ "Dis/Attiva\n", + /*279*/ "Didascalie film\n", + /*280*/ "Didascalie nel gioco\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/jap-final/mpweapons_str_s.c b/src/files/lang/jap-final/mpweapons_str_s.c new file mode 100644 index 000000000..89654fec2 --- /dev/null +++ b/src/files/lang/jap-final/mpweapons_str_s.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el\nC. de Datos\n", + /* 1*/ "%stiene el\nMaletín\n", + /* 2*/ "%stiene el Maletín de %s\n", + /* 3*/ "%stiene nuestro Maletín\n", + /* 4*/ "Atrapaste el Maletín\nde %s\n", + /* 5*/ "Has capturado el\nMaletín de %s\n", + /* 6*/ "%sha capturado\nnuestro Maletín\n", + /* 7*/ "%sha capturado\nel Maletín de %s\n", + /* 8*/ "¡Un punto por sobrevivir!\n", + /* 9*/ "¡Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "¡Bien hecho!\n", + /* 12*/ "¡Tú la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "¡Eres la víctima!\n", + /* 15*/ "¡Protege a\n%s!\n", + /* 16*/ "¡Coge a\n%s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexión perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "¡Rey de\nla Colina!\n", + /* 22*/ "¡Tenemos\nla Colina!\n", + /* 23*/ "¡%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "¡1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Automáticas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mantén el Maletín\n", + /* 33*/ "Mata de Un Tiro\n", + /* 34*/ "Captura el Maletín\n", + /* 35*/ "Ocultación\n", + /* 36*/ "Explosivos Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "Cámara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco al Azar\n", + /* 45*/ "Mano a Mano\n", + /* 46*/ "Minas Proxim.\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Automáticas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Dañado\n", + /* 66*/ "está dañado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Está demasiado lleno. Se\nnecesitan 1 nota y 28\npáginas para guardar.\n", + /* 73*/ "Entra en el Menú del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puñetazos Huracán\n", + /* 77*/ "Dispositivo de Ocultación\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Munición Ilimitada\n", + /* 81*/ "Munición Ilimitada sin Recargas\n", + /* 82*/ "Un jugador Cámara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Súper Escudo\n", + /* 91*/ "Mirilla Clásica\n", + /* 92*/ "Sólo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Munición Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqués de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Alienígena\n", + /*102*/ "Rastreador/Localización de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Escáner de Rayos-X\n", + /*106*/ "SuperDragón\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversión\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compañeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Clásicas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extracción de dataDyne", + /*127*/ "Infiltración en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Co-operativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el menú", + /*143*/ "Elige truco para más información\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas clásicas.\n", + /*146*/ "Mirilla\n", + /*147*/ "Objetivo\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Munición\n", + /*150*/ "Función Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subtítulos\n", + /*153*/ "Tiempo Misión\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "¿Quieres interrumpir\nla misión?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar un\nfichero en uso.\n", + /*162*/ "Cancelar\n", + /*163*/ "Límite Tiempo:\n", + /*164*/ "Límite Puntos:\n", + /*165*/ "Límite P. Equipo:\n", + /*166*/ "¡Desafío Completado!\n", + /*167*/ "¡Desafío Fallado!\n", + /*168*/ "¡Desafío Trucado!\n", + /*169*/ "Subtítulos en Escenas\n", + /*170*/ "Subtítulos en el Juego\n", + /*171*/ "Pantalla de Título Alternativa\n", + /*172*/ "Empezar Desafío\n", + /*173*/ "Investigación dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparación\n", + /*177*/ "¿Quieres intentar\nreparar este\nController Pak?\n", + /*178*/ "¡Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con Éxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparación Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podrás cargar o\nguardar en este\nController Pak.\n", + /*185*/ "Hándicap Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTÓN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTÓN C ABAJO: ", + /*190*/ "BOTÓN A: ", + /*191*/ "BOTÓN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BÓTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRÁS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIÓN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mantén Arma para el menú rápido.\nMantén Acción para cambiar función.\nAcción+Disparo cambia temp. la función.\nApuntar aporta una mayor precisión.\nApuntar + Botón C Abajo te agacha.\nApuntar + Botón C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Vel. de Reacción Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Daño del Enemigo:\n", + /*227*/ "Precisión del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que estás copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "¡Nuevo Truco Disponible!:\n", + /*245*/ "Continuar\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "¿Guardar nuevo jugador\ny estadísticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "¡No, Gracias!\n", + /*251*/ "Confirmar nombre:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no dañados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegúrate\nde que estás usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban dañados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Inglés\n", + /*264*/ "Francés\n", + /*265*/ "Alemán\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ "Estilo C.\n", + /*272*/ "C. Opuesto\n", + /*273*/ "M. Frente\n", + /*274*/ "G. Cabeza\n", + /*275*/ "Auto-Apun.\n", + /*276*/ "C. Apuntar\n", + /*277*/ "Mant.\n", + /*278*/ "Camb.\n", + /*279*/ "Subt. Escenas\n", + /*280*/ "Subt. Juego\n", + /*281*/ "THE N64 EXPANSION PAK ACCESSORY MUST BE INSTALLED IN THE N64 FOR\nTHIS GAME. SEE THE N64 EXPANSION PAK INSTRUCTION BOOKLET.\n", + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/oatE.c b/src/files/lang/jap-final/oatE.c similarity index 100% rename from src/files/lang/oatE.c rename to src/files/lang/jap-final/oatE.c diff --git a/src/files/lang/oatJ.c b/src/files/lang/jap-final/oatJ.c similarity index 100% rename from src/files/lang/oatJ.c rename to src/files/lang/jap-final/oatJ.c diff --git a/src/files/lang/oatP.c b/src/files/lang/jap-final/oatP.c similarity index 100% rename from src/files/lang/oatP.c rename to src/files/lang/jap-final/oatP.c diff --git a/src/files/lang/oat_str_f.c b/src/files/lang/jap-final/oat_str_f.c similarity index 100% rename from src/files/lang/oat_str_f.c rename to src/files/lang/jap-final/oat_str_f.c diff --git a/src/files/lang/oat_str_g.c b/src/files/lang/jap-final/oat_str_g.c similarity index 100% rename from src/files/lang/oat_str_g.c rename to src/files/lang/jap-final/oat_str_g.c diff --git a/src/files/lang/oat_str_i.c b/src/files/lang/jap-final/oat_str_i.c similarity index 100% rename from src/files/lang/oat_str_i.c rename to src/files/lang/jap-final/oat_str_i.c diff --git a/src/files/lang/oat_str_s.c b/src/files/lang/jap-final/oat_str_s.c similarity index 100% rename from src/files/lang/oat_str_s.c rename to src/files/lang/jap-final/oat_str_s.c diff --git a/src/files/lang/oldE.c b/src/files/lang/jap-final/oldE.c similarity index 100% rename from src/files/lang/oldE.c rename to src/files/lang/jap-final/oldE.c diff --git a/src/files/lang/oldJ.c b/src/files/lang/jap-final/oldJ.c similarity index 100% rename from src/files/lang/oldJ.c rename to src/files/lang/jap-final/oldJ.c diff --git a/src/files/lang/oldP.c b/src/files/lang/jap-final/oldP.c similarity index 100% rename from src/files/lang/oldP.c rename to src/files/lang/jap-final/oldP.c diff --git a/src/files/lang/old_str_f.c b/src/files/lang/jap-final/old_str_f.c similarity index 100% rename from src/files/lang/old_str_f.c rename to src/files/lang/jap-final/old_str_f.c diff --git a/src/files/lang/old_str_g.c b/src/files/lang/jap-final/old_str_g.c similarity index 100% rename from src/files/lang/old_str_g.c rename to src/files/lang/jap-final/old_str_g.c diff --git a/src/files/lang/old_str_i.c b/src/files/lang/jap-final/old_str_i.c similarity index 100% rename from src/files/lang/old_str_i.c rename to src/files/lang/jap-final/old_str_i.c diff --git a/src/files/lang/old_str_s.c b/src/files/lang/jap-final/old_str_s.c similarity index 100% rename from src/files/lang/old_str_s.c rename to src/files/lang/jap-final/old_str_s.c diff --git a/src/files/lang/jap-final/optionsE.c b/src/files/lang/jap-final/optionsE.c new file mode 100644 index 000000000..89c4b331c --- /dev/null +++ b/src/files/lang/jap-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Japanese version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/optionsJ.c b/src/files/lang/jap-final/optionsJ.c new file mode 100644 index 000000000..e0de2bcda --- /dev/null +++ b/src/files/lang/jap-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "‚ó‚ô\n", + /* 1*/ "†µ‚ó‚ô\n", + /* 2*/ "‚µ‚¶‚ñ‚ò\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "‚˜†ä€¾", + /* 6*/ "€’€ù€ê€Ü€ã€÷‚„", + /* 7*/ "€«•¦™†å…ð", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "€£€€Ù€Ï‹€Ê€ã€Ü‚„€á\n", + /* 17*/ "€£€€ã€ù€Ï€à€Ù‚„€ã\n", + /* 18*/ "€£€€à€Ë€Ñ€äŠ€ù€Ü\n", + /* 19*/ "€£€‚ÎãÉŠ€ù€Ü\n", + /* 20*/ "€£€€Ü€à€Ì€û‚„‰€Ü\n", + /* 21*/ "€£€€Ò€È€Ê€ã€Ü‚„€á\n", + /* 22*/ "€£€€Ð€×€Ð€ö€Ï€þ\n", + /* 23*/ "€£€†ó„˜\n", + /* 24*/ "€£€„ÿ…€‚“\n", + /* 25*/ "€Ó€øŒ€Ü\n", + /* 26*/ "€î€Ñ€Ð€Ï\n", + /* 27*/ "€Ö€Ë€÷€Ï€ã€Ï\n", + /* 28*/ "€€œ€ß€Ö€Û‚„Š\n", + /* 29*/ "€ï€Ü€ß‚„€…€ú€ÏŠ\n", + /* 30*/ "€Õ€Ú€ÏŠ€ö\n", + /* 31*/ "€ã€ù€Ï€ã€…€Ñ‚„€Ü€ã€Ï\n", + /* 32*/ "‚€Í€ä€Ú€Ï\n", + /* 33*/ "‚£‚¤€„ÿ…€‚“€„œ\n", + /* 34*/ "‚£‚¤€„ÿ…€‚“€‚Ü\n", + /* 35*/ "‚£‚¤€‚‘‚’‚“\n", + /* 36*/ "˜€‡Ë‚‚‘‚’‚“\n", + /* 37*/ "˜€‚Ü€ü‚„Š\n", + /* 38*/ "˜€‚‰ƒŽ‚“\n", + /* 39*/ "˜€ƒ…ý\n", + /* 40*/ "˜€‚‘‚’‚“\n", + /* 41*/ "…µ†Ð\n", + /* 42*/ "Œ‚€ç€Ü€î€Ï€‘\n", + /* 43*/ "Œ‚€ç€Ü€î€Ï€’\n", + /* 44*/ "€¨€¥\n", + /* 45*/ "˜€€Ü€ä€Ñ‚„\n", + /* 46*/ "€ €•€€ü‚„Š\n", + /* 47*/ "€ €•€€Ü€û€Ê€ã\n", + /* 48*/ "€œ€¢€š€€Ü€Ñ\n", + /* 49*/ "€Ÿ€›€¢€€Ü€Ñ\n", + /* 50*/ "€Ó€÷€Ð€•€‘€€ü‚„Š\n", + /* 51*/ "€Ó€÷€Ð€•€‘€‚‘‚’‚“\n", + /* 52*/ "€Ñ€ú€Ê€ã\n", + /* 53*/ "ƒÛ„€á€ä€ý\n", + /* 54*/ "„„ž„Ÿ‰€Æ‚„€ü‚„Š\n", + /* 55*/ "„ÿ…€‚“€„œ\n", + /* 56*/ "„ÿ…€‚“€‚Ü\n", + /* 57*/ "˜€„ÿ…€‚“\n", + /* 58*/ "‹€Ñ€Ô„ÿ…€‚“\n", + /* 59*/ "€Ð€ö€Ü€Õ€€ü‚„Š\n", + /* 60*/ "„¹ƒˆƒÂ€€Ñ€ú€Ê€ã\n", + /* 61*/ "‚„€Ú‚„\n", + /* 62*/ "€Ü€à€Ì€û‚„‰€Ü€‘\n", + /* 63*/ "€Ü€à€Ì€û‚„‰€Ü€’\n", + /* 64*/ "ƒÆƒÇƒÈ\n", + /* 65*/ "„„ž„Ÿ€ƒû„±\n", + /* 66*/ "ƒÆƒÇƒÈ€¬€©\n", + /* 67*/ "ƒÆƒÇƒÈ€×€ú‚„€Ï\n", + /* 68*/ "“€ö‚€Ê€×€’€€ü‚„Š\n", + /* 69*/ "€î€Ñ€Ð€Ï‚‘…ý\n", + /* 70*/ "‰€Æ€ä‚„‚€Ë€Ø€Ê€ã\n", + /* 71*/ "€Ù€Ï€ã€ú‚„€ö€Ù€ç€×€ß€‘πـπã€ú‚„€öæ…Ñ‚¾ÄãÌ»ØÇ¹€Â", + /* 72*/ "„·‚‹ÒƒÉƒÒ¸„–´Ì¿à€€Ù€Ï€ã€ú‚„€ö¸…Ñ‚¾Å̇ÌÄ»€Â", + /* 73*/ "„‚Ÿ", + /* 74*/ "ƒ¼Å", + /* 75*/ "", + /* 76*/ "€ñ€ò€÷‚„†æ…˜€Ê€×", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDJ-JPN\n", + /* 84*/ "JPN version 8.9 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "€ë€Å€Ñ€ø†Â†Ã\n", + /* 96*/ "€ÿ‚„€ð€ë€Å€Ñ€ø¸†Â†ÃÅ̇ÌÄ»\n", + /* 97*/ "€å€Ì‚„€ë€Å€Ñ€ø€Ž\n", + /* 98*/ "€å€Ì‚„€Ó‚„‚€È€Ï€ã€Ž\n", + /* 99*/ "€ë€Å€Ñ€ø€ñ€å€Ì‚„\n", + /*100*/ "€Ù‘‚„€¾\n", + /*101*/ "ƒ‘ƒö€¾\n", + /*102*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×Ò€ñ€å€Ì‚„Ö\n", + /*103*/ "€‘„±ƒˆ€ÿ‚„€ð€ë€Å€Ñ€ø\n", + /*104*/ "€Ù€Ï‹€Ê€ã€Û€ï€Ì€ù‚„€ß€…€ÿ‚„€ð†ˆ„Ç\n", + /*105*/ "€Ù€Ï‹€Ê€ã€Û€ï€Ì€ù‚„€ß€…†¿„±†ˆ„Ç\n", + /*106*/ "‚„€ë€È€×€ã€ì€ÊŠ€ë€Å€Ñ€ø\n", + /*107*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×€ñ€å€Ì‚„\n", + /*108*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×Ò€ÿ‚„€ð€è‚„€ã¸\nƒ‘ƒöÆâÃÍæ‚ŸƒØÆ€Â\n", + /*109*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×҆†À¾\n", + /*110*/ "‚ãâ\n", + /*111*/ "€ÿ‚„€ð€Õ€Ý€Ê€ã\n", + /*112*/ "Controller PAK 1\n", + /*113*/ "Controller PAK 2\n", + /*114*/ "Controller PAK 3\n", + /*115*/ "Controller PAK 4\n", + /*116*/ "€ñ€Ñ€Ï€ñ€å€Ì‚„\n", + /*117*/ "€Þ€ú€…€ï€Ê€Û€Í€Ï\n", + /*118*/ "€Ù€Ï‹€Ê€ã€…€Û€ï€Ì€ù‚„€ß\n", + /*119*/ "‚£‚‚€ï€Ê€Û€Í€Ï\n", + /*120*/ "‚—‚ü€ï€Ê€Û€Í€Ï\n", + /*121*/ "€Û€ç€î\n", + /*122*/ "€ï€Ê€Û€Í€Ï†Â†Ã\n", + /*123*/ "€ï€Ê€Û€Í€Ï€‘\n", + /*124*/ "€ï€Ê€Û€Í€Ï€’\n", + /*125*/ "€ï€Ê€Û€Í€Ï€“\n", + /*126*/ "€ï€Ê€Û€Í€Ï€”\n", + /*127*/ "€ï€Ê€Û€Í€Ï€•\n", + /*128*/ "€ï€Ê€Û€Í€Ï€–\n", + /*129*/ "€ï€Ê€Û€Í€Ï€—\n", + /*130*/ "€ï€Ê€Û€Í€Ï€˜\n", + /*131*/ "€ï€Ê€Û€Í€Ï€™\n", + /*132*/ "€Ü“€Û€Ë€ø€ï€Ê€Û€Í€Ï\n", + /*133*/ "‰‚„€ß†€Ñ€Ï„·„“", + /*134*/ "€Š„؂Ā‹", + /*135*/ "‰‚„€ß†€Ñ€Ï‚˜‡Ì„ÿ…€ƒç", + /*136*/ "€Š„€†ç€‹", + /*137*/ "‰‚„€ß†€Ñ€Ï„·„“", + /*138*/ "€Š‚ºƒ÷€‹", + /*139*/ "€Ö€Ë€÷€Ï€ã€ÏÒƒÿ…Ö", + /*140*/ "€Š„±…Ú€‹", + /*141*/ "€Û€Õ€", + /*142*/ "€Š„‚ö€‹", + /*143*/ "€ €•Œ€ø", + /*144*/ "€Š†­†è€‹", + /*145*/ "€Ó€÷€Ð€•€‘", + /*146*/ "€ŠƒÅ‚΀‹", + /*147*/ "€Ó€÷€Ð€•€‘", + /*148*/ "€Š‚¨‚Ÿ€‹", + /*149*/ "€Ó€÷€Ð€•€‘", + /*150*/ "€Š‚ž‚Ÿ€‹", + /*151*/ "€Ð€ö€Ü€ÕƒÃ„¦„§‚˜", + /*152*/ "€Š‚ʂ̀‹", + /*153*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ", + /*154*/ "€Š„ñ†é€‹", + /*155*/ "ƒÌ‚؃̓Š", + /*156*/ "€Š‚üƒ½€‹", + /*157*/ "“€ö‚€Ê€×€’", + /*158*/ "€Š‚±‚²€‹", + /*159*/ "„‰„Š", + /*160*/ "€Šƒÿ》", + /*161*/ "€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€ø", + /*162*/ "€Š„žƒø€‹", + /*163*/ "€Ü€Ø†‚„†ê†ëƒù", + /*164*/ "€Š‚Œ„•€‹", + /*165*/ "€Ü€Ø†‚„Ò†…††", + /*166*/ "€Šƒ½‚‘€‹", + /*167*/ "€ï€Ü€ß‚„€…€ú€ÏŠ", + /*168*/ "€î€Ñ€Ð€Ï€¬€¨€¬", + /*169*/ "‚£‚¤Ò„ß‚Ò", + /*170*/ "€°€š€«€´", + /*171*/ "ƒ½‚’", + /*172*/ "‚µ‚¶ƒØ†Î\n", + /*173*/ "‚µ‚¶…dž‴\n", + /*174*/ "€»‚‰‚õ€»\n", + /*175*/ "ƒ•‚ÒÓ‚µ‚¶¸…džâÅØÆ¿€À\n", + /*176*/ "€Ö€Ë€Ï€Ý€ø\n", + /*177*/ "‚µ‚¶…džâ\n", + /*178*/ "‚Õʃ°\n", + /*179*/ "‚ùƒˆ‚¡‚¢Î‚Ì„½\n", + /*180*/ "€Ô’€Û€Í€Ï\n", + /*181*/ "€Ô‚„‰€Æ€Ô\n", + /*182*/ "Œ‰€Ô\n", + /*183*/ "…‰ƒÛ†ˆ„Ç\n", + /*184*/ "†Ó†—†ˆ„Ç\n", + /*185*/ "€à‚„€ã\n", + /*186*/ "€Ý‚„Æâ\n", + /*187*/ "€ë€Å€Ñ€ø‚Ê‚Ë\n", + /*188*/ "€»‚‰‚õ€»\n", + /*189*/ "ƒÿÒ€ÿ‚„€ð€ë€Å€Ñ€øÏ‚Ê‚ËÅØÆ¿€À\n", + /*190*/ "Ó»\n", + /*191*/ "»»½\n", + /*192*/ "…‰ƒÛ†ˆ„Ç\n", + /*193*/ "€’€©Ò…‰ƒÛ†ˆ„Ç\n", + /*194*/ "…‰ƒÛ€ò‚„Š\n", + /*195*/ "†ÑƒÎ„¨‚Ä҇ˇ̆Ò\n", + /*196*/ "ƒ—‚ă‚ԆуÎ\n", + /*197*/ "†ÈÒÞã\n", + /*198*/ "ƒ—‚Ă넥\n", + /*199*/ "‚ë„¥†ˆ„Ç\n", + /*200*/ "‚ãâ\n", + /*201*/ "€í‚„€øŠ\n", + /*202*/ "„–á†Ô½\n", + /*203*/ "†Ó†—†ˆ„Ç\n", + /*204*/ "€’€©Ò†Ó†—†ˆ„Ç\n", + /*205*/ "‚ë„¥„ì„íÒ†Ó†—\n", + /*206*/ "‚ë„¥¸ƒ¹Ï†Ó†—\n", + /*207*/ "ƒ‚„€ð„û‚›Ò†Ó†—\n", + /*208*/ "…¤†ÇÒ†Ó†—\n", + /*209*/ "‚Ì„½€ò‚„Іӆ—\n", + /*210*/ "“€Ñ€Ï€ã‚„€ø€ò‚„Š\n", + /*211*/ "†ß†àÒ†Ó†—\n", + /*212*/ "€ï€Ê€Û€Í€Ï€ß€Ñ€ðÒ†Ó†—\n", + /*213*/ "‚ãâ\n", + /*214*/ "Œ‰€Ô†ˆ„Ç\n", + /*215*/ "ƒœƒú€Ú€Ñƒ\n", + /*216*/ "ƒœ†À\n", + /*217*/ "€é€Ñ€ù…\n", + /*218*/ "€’€©€ò‚„ŠÒƒœƒúƒ˜†á\n", + /*219*/ "‚ãâ\n", + /*220*/ "€ë€ø\n", + /*221*/ "€û€ÑŠ\n", + /*222*/ "€Û€ç€î\n", + /*223*/ "€è‚„€î€ø\n", + /*224*/ "„ú†À\n", + /*225*/ "€õ€Ù\n", + /*226*/ "€ß€â\n", + /*227*/ "€Ô‚„‰€Æ€Ô†ˆ„Ç\n", + /*228*/ "ƒÜƒÝ…Ï\n", + /*229*/ "€›€ €¦\n", + /*230*/ "€ò‚„Š\n", + /*231*/ "‚ãâ\n", + /*232*/ "€ò€è€ö€ø", + /*233*/ "€Ü€â€ù€Ô", + /*234*/ "€ì€ÊŠ€í€Ï", + /*235*/ "€Ú€ö€Ò€ÏŠ", + /*236*/ "…‰ƒÛ†ˆ„Ç\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1-1", + /*240*/ "1-2", + /*241*/ "1-3", + /*242*/ "1-4", + /*243*/ "2-1", + /*244*/ "2-2", + /*245*/ "2-3", + /*246*/ "2-4", + /*247*/ "€ï€Ê€Û€Í€Ï„ì„í\n", + /*248*/ "…¨…惬†Â†Ã\n", + /*249*/ "…¨…惬\n", + /*250*/ "ހ܀ã€ß€Ñ€ð\n", + /*251*/ "€Ó‚„‚€È€Ï€ã\n", + /*252*/ "€ÐŠ‹€Ï€Ü€ã\n", + /*253*/ "‚„€ë€È€×€ã\n", + /*254*/ "€Ö€Ë€Ï€Ý€ø\n", + /*255*/ "‚£‚‚€ï€Ê€Û€Í€Ï€†ˆ„Ç\n", + /*256*/ "€ù‚„†‚„€€Ô€Ï\n", + /*257*/ "„³‚ÔÖÒ‚í‚×\n", + /*258*/ "‚£‚‚ƒî҆†Ã\n", + /*259*/ "‚·Ú\n", + /*260*/ "‚ãâ\n", + /*261*/ "’€ù€Ñ€ó‚„€’", + /*262*/ "€Û€ï€Ì€ö€Ï€ã€‘‚‹", + /*263*/ "€Û€ï€Ì€ö€Ï€ã€’‚‹", + /*264*/ "€Û€ï€Ì€ö€Ï€ã€“‚‹", + /*265*/ "€Û€ï€Ì€ö€Ï€ã€”‚‹", + /*266*/ "‚—‚ü€ï€Ê€Û€Í€Ï€†ˆ„Ç\n", + /*267*/ "€ù‚„†‚„€€Ô€Ï\n", + /*268*/ "‚—„²’€ù€Ñ€ó‚„\n", + /*269*/ "‚·Ú\n", + /*270*/ "‚ãâ\n", + /*271*/ "’€ù€Ñ€ó‚„€‘", + /*272*/ "’€ù€Ñ€ó‚„€’", + /*273*/ "ƒ‡†í‚µ‚¶\n", + /*274*/ "‚ô‚†Æâ\n", + /*275*/ "†î†ïÆâ\n", + /*276*/ "‚µ‚¶‚ó‚ô\n", + /*277*/ "‚µ‚¶‚ñ‚ò\n", + /*278*/ "‚µ‚¶†ÙƒÝ€¾\n", + /*279*/ "’€ù€Ñ€ó‚„ƒØ†Î€¾\n", + /*280*/ "€ï€Ê€Û€Í€Ï€ß€Ñ€ð€¾\n", + /*281*/ "‚ƒ‚ÆßÁ‚ù´É‚Ì„½€¾\n", + /*282*/ "‚ÙÅÉ…Ÿ†Ç€¾\n", + /*283*/ "ƒé‚…¥€¾\n", + /*284*/ "…Ÿ€Û€Í€Ê€ã†Ç€¾\n", + /*285*/ "€†È‚€ê€Ê€ã€¾\n", + /*286*/ "€†ð‚‹€ê€Ê€ã€¾\n", + /*287*/ "€‚݆ڀê€Ê€ã€¾\n", + /*288*/ "€ÈÒ†˜€¾\n", + /*289*/ "€Ü€ß‚„€ã€ß€Ï\n", + /*290*/ "‚°†™\n", + /*291*/ "†”†±\n", + /*292*/ "ƒ‰†™\n", + /*293*/ "‚µ‚¶‚ñ‚ò\n", + /*294*/ "‚µ‚¶‚ó‚ô\n", + /*295*/ "‚µ‚¶‚„¬\n", + /*296*/ "€÷€ã€ö€Ñ", + /*297*/ "ƒãÒ€ï€Ê€Û€Í€Ï", + /*298*/ "‚ô‚†Æâ\n", + /*299*/ "†î†ïÆâ\n", + /*300*/ "ƒ‡†í‚µ‚¶\n", + /*301*/ "€Ü€ß‚„€ã€ß€Ï\n", + /*302*/ "€ñ€Ñ€Ï€ñ€å€Ì‚„€ƒ†æ…˜€Ê€×ƒ¼Å€„\n", + /*303*/ "€Ù€Ï‹€Ê€ã€…€Û€ï€Ì€ù‚„€ß\n", + /*304*/ "€ã€ù‚„€å€Ï€þ\n", + /*305*/ "€Ô‚„‰€Æ€Ô€½Œ‰€Ô\n", + /*306*/ "€ë€Å€Ñ€ø‚Ê‚Ë\n", + /*307*/ "€Ô‚„‰€Æ€Ô€½Œ‰€Ô†ˆ„Çl\n", + /*308*/ "ƒÜƒÝ…Ï\n", + /*309*/ "€›€ €¦\n", + /*310*/ "€ò‚„Š\n", + /*311*/ "ƒœ†À\n", + /*312*/ "‚ãâ\n", + /*313*/ "€Š€§™«€‹\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "€Ù€Ï‹€Ê€ã€Û€ï€Ì€ù‚„€ß€…€ì€ÊŠ\n", + /*319*/ "€ï€Ê€Û€Í€Ï€…€ì€ÊŠ\n", + /*320*/ "€Ó€ö‚„\n", + /*321*/ "€Ö€Ë€Ï€Ý€ø\n", + /*322*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×æ\n‚ÉË¿áØÇ¹\n", + /*323*/ "€Ý‚„‚ŸƒØÇ¹\n", + /*324*/ "€ú‚„Š‚ŸƒØÇ¹\n", + /*325*/ "ƒ‘ƒö‚ŸƒØÇ¹\n", + /*326*/ "€ñ€ò€÷‚„‚ †ÚóÆ\n", + /*327*/ "ÆóÏÃÒ†ˆ„ÇÓ\n€ú‚„ŠÄãÌ»ØÆ\n", + /*328*/ "æƒááØÇ¹\n", + /*329*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×æ‚ÏãÌ»âß¼óÆ\n", + /*330*/ "€ÿ‚„€ð€è‚„€ãÒƒ‘ƒöÏ‚ñ‚òÅØÅÉ\n", + /*331*/ "€ú‚„Š€Ó€ö‚„\n", + /*332*/ "€Ý‚„€Ó€ö‚„\n", + /*333*/ "€ú‚„Š€Ó€ö‚„\n", + /*334*/ "€Ý‚„€Ó€ö‚„\n", + /*335*/ "€ú‚„Š€Ó€ö‚„\n", + /*336*/ "€Ý‚„€Ó€ö‚„\n", + /*337*/ "€ú‚„Š€Ó€ö‚„\n", + /*338*/ "€Ý‚„€Ó€ö‚„\n", + /*339*/ "€Ó€ö‚„\n", + /*340*/ "ƒ‘ƒö‚ñ‚ò\n", + /*341*/ "€ë€Å€Ñ€øÒƒ‘ƒö悟ƒØÇ¹\n", + /*342*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×æ\n… ÅÁ…Ñ‚¾ÄãÌ\n»ØÆ¿€À\n", + /*343*/ "€Ö€Ë€Ï€Ý€ø\n", + /*344*/ "ƒÃÀæºáØÇ¹\n", + /*345*/ "‚ó‚ô€´\n", + /*346*/ "€Ý‚„ÄãØÅÉ\n", + /*347*/ "€¨€¤\n", + /*348*/ "€Ý‚„‚€Ó€ö‚„‚ȃ¨\n", + /*349*/ "ܼ€‘ƒ¬\n", + /*350*/ "ƒÿÒƒŠƒçπ݂„\n", + /*351*/ "€Ö€Ë€Ï€Ý€ø\n", + /*352*/ "€ú‚„Š‚Ï€Ó€ö‚„æ\n‚ȃ¨ÅØÅÉ\n", + /*353*/ "ܼ€‘ƒ¬\n", + /*354*/ "€Ö€Ë€Ï€Ý€ø\n", + /*355*/ "€ì€ÊŠƒˆÒ€Ü“‚„€Ü惇ƒƒ\n", + /*356*/ "‡Ë†ÐÀÆâ€ì€ÊŠÒ†Â†Ã€¾\n", + /*357*/ "€¨€¤\n", + /*358*/ "€Ö€Ë€Ï€Ý€ø\n", + /*359*/ "€Ý‚„\n", + /*360*/ "ƒÿÒƒŠƒçÏ\n€Ý‚„ÅØÆ¿€À\n", + /*361*/ "€é€Ñ\n", + /*362*/ "€Ñ€Ñ€Ó\n", + /*363*/ "%sæ‚ö´É†ÅҀʀ׸…Ñ‚¾Å̇ÌÄ»\n", + /*364*/ "€Ý‚„ÅÉ»€Ù€Ï€ã€ú‚„€ö€Ê€×¸\nôã¿Ò€Ù€Ï€ã€ú‚„€öÏ\n‚öã̇ÌÄ»\n", + /*365*/ "€¨€¤\n", + /*366*/ "€Ö€Ë€Ï€Ý€ø\n", + /*367*/ "ƒŠƒç†Â†Ã\n", + /*368*/ "ƒŠƒç\n", + /*369*/ "ƒÃÀ\n", + /*370*/ "€ë€Å€Ñ€øƒ‘ƒö€Ž\n", + /*371*/ "€Ö€Ë€Ï€Ý€ø\n", + /*372*/ "ƒ¼", + /*373*/ "€ë€Å€Ñ€ø€Ù‘‚„\n", + /*374*/ "€Ù‘‚„€ë€Å€Ñ€øÒ†Â†Ã\n", + /*375*/ "€›€ß€Ïó‚ãâ\n", + /*376*/ "€ë€Å€Ñ€øƒ‘ƒö\n", + /*377*/ "ƒ‘ƒö€ë€Å€Ñ€øÒ†Â†Ã\n", + /*378*/ "€›€ß€Ïó‚ãâ\n", + /*379*/ "€»‚‰‚õ€»\n", + /*380*/ "ÃÒ€ë€Å€Ñ€ø¸ƒ‘ƒöÅ\nÌÜßäÅ»óÆ¿€À\n", + /*381*/ "€Ö€Ë€Ï€Ý€ø\n", + /*382*/ "€¨€¤\n", + /*383*/ "€ÿ‚„€ð€è‚„€ãÒƒ‘ƒö\n", + /*384*/ "„·‚ÓÏÃÒ\n€ÿ‚„€ð€è‚„€ã¸\nƒ‘ƒöÅØÆ¿€À\n", + /*385*/ "€Ñ€Ñ€Ó\n", + /*386*/ "€é€Ñ\n", + /*387*/ "€ÿ‚„€ð€è‚„€ã\n", + /*388*/ "€ÿ‚„€ð€è‚„€ãÒƒ‘ƒö€¾\n", + /*389*/ "€è‚„€ã\n", + /*390*/ "“‚„‚\n", + /*391*/ "€›€ß€Ïó‚ãâ\n", + /*392*/ "ƒÃÀ\n", + /*393*/ "--\n", + /*394*/ "ƒÃÀ“‚„‚€¾ \n", + /*395*/ "ƒÃÀ“‚„‚€¾ %d\n", + /*396*/ "‚ùƒˆ“‚„‚€¾ \n", + /*397*/ "‚ùƒˆ“‚„‚€¾ %d\n", + /*398*/ "ÃÒ€ÿ‚„€ðÒ€ÿ‚„€ð€è‚„€ãÓ\nÃҀـπã€ú‚„€ö€Ê€×Ï‚æÏ„Ö…ØÅØÆ\n", + /*399*/ "ÃÒ€ÿ‚„€ðÒ€ÿ‚„€ð€è‚„€ã¸ƒÛâÉÛÒ\n…ƃ˜ÎƒÃÀ€Ü“‚„€ÜæºáØÆ\n", + /*400*/ "€Ù€Ï€ã€ú‚„€ö€Ê€×æ»´ú»óÆ€€Ý‚„\nÆâÏÓ€‘€è‚„€ã€ƒ€’€˜“‚„‚€„惇ƒƒóÆ\n", + /*401*/ "…¼ƒÒ‚ö‚‚\n", + /*402*/ "€§™«€ë€Å€Ñ€ø€Ž\n", + /*403*/ "€§™«€Ó‚„‚€È€Ï€ã\n", + /*404*/ "„Ù„±€Ó‚„‚€È€Ï€ã", + /*405*/ "€ï€Ê€Û€Í€Ï€ß€Ñ€ð€¾", + /*406*/ "€à€Ë€ù€Ï‚€‘", + /*407*/ "€à€Ë€ù€Ï‚€’", + /*408*/ "€à€Ë€ù€Ï‚€“", + /*409*/ "€à€Ë€ù€Ï‚€”", + /*410*/ "€à€Ë€ù€Ï‚€•", + /*411*/ "€à€Ë€ù€Ï‚€–", + /*412*/ "€à€Ë€ù€Ï‚€—", + /*413*/ "€à€Ë€ù€Ï‚€˜", + /*414*/ "€à€Ë€ù€Ï‚€™", + /*415*/ "€à€Ë€ù€Ï‚€‘€", + /*416*/ "€à€Ë€ù€Ï‚€‘€‘", + /*417*/ "€à€Ë€ù€Ï‚€‘€’", + /*418*/ "€à€Ë€ù€Ï‚€‘€“", + /*419*/ "€à€Ë€ù€Ï‚€‘€”", + /*420*/ "€à€Ë€ù€Ï‚€‘€•", + /*421*/ "€à€Ë€ù€Ï‚€‘€–", + /*422*/ "€à€Ë€ù€Ï‚€‘€—", + /*423*/ "€à€Ë€ù€Ï‚€‘€˜", + /*424*/ "€à€Ë€ù€Ï‚€‘€™", + /*425*/ "€à€Ë€ù€Ï‚€’€", + /*426*/ "€à€Ë€ù€Ï‚€’€‘", + /*427*/ "€à€Ë€ù€Ï‚€’€’", + /*428*/ "€à€Ë€ù€Ï‚€’€“", + /*429*/ "€à€Ë€ù€Ï‚€’€”", + /*430*/ "€à€Ë€ù€Ï‚€’€•", + /*431*/ "€à€Ë€ù€Ï‚€’€–", + /*432*/ "€à€Ë€ù€Ï‚€’€—", + /*433*/ "€à€Ë€ù€Ï‚€’€˜", + /*434*/ "€à€Ë€ù€Ï‚€’€™", + /*435*/ "€à€Ë€ù€Ï‚€“€", + /*436*/ "€Ü“€Û€Ë€ø\n", + /*437*/ "€Ñ€Ï€ã€ú\n", + /*438*/ "€ï€Ê€Û€Í€Ï€‘€Ž‰‚„€ß†€Ñ€Ï„·„“\n", + /*439*/ "€ï€Ê€Û€Í€Ï€’€Ž€Ö€Ë€÷€Ï€ã€ÏÒƒÿ…Ö\n", + /*440*/ "€ï€Ê€Û€Í€Ï€“€Ž€ €•Œ€ø\n", + /*441*/ "€ï€Ê€Û€Í€Ï€”€Ž€Ó€÷€Ð€•€‘\n", + /*442*/ "€ï€Ê€Û€Í€Ï€•€ŽƒÆƒÇƒÈ„¹ƒˆƒÂ\n", + /*443*/ "€ï€Ê€Û€Í€Ï€–€Ž“€ö‚€Ê€×€’\n", + /*444*/ "€ï€Ê€Û€Í€Ï€—€Ž€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Œ€ø\n", + /*445*/ "€ï€Ê€Û€Í€Ï€˜€Ž€Ü€Ø†‚„†ê†ëƒù\n", + /*446*/ "€ï€Ê€Û€Í€Ï€™€Ž€Ü€Ø†‚„Ò†…††\n", + /*447*/ "€ë€Å€Ñ€ä€ø\n", + /*448*/ "ƒ…̸’€ù€Ñ\n", + /*449*/ "€Ô‚„’€å€Ï€þ\n", + /*450*/ "1-1€†ñ€¾†‰ÖÒ„Ø‚Ä\n", + /*451*/ "1-1€†³€¾ƒ…é‡Ì\n", + /*452*/ "1-2€†ñ€¾‚˜‡ÌÖ\n", + /*453*/ "1-2€†³€¾‚Ÿ‚¤»\n", + /*454*/ "1-3€†ñ€¾ƒ‘ƒ’\n", + /*455*/ "1-3€†³€¾€‡ôÃϾ‚Ÿ¿Â¿Åà€À€ˆ\n", + /*456*/ "2-1€†ñ€¾€Ô€ã€÷ƒÛ‚‘\n", + /*457*/ "2-1€†ñ€’€¾…âƒÒÍÜņò\n", + /*458*/ "2-1€†³€¾€Ö€Ë€÷€Ï€ã€ÏÒ‚¨‚Ÿ\n", + /*459*/ "3-1€†ñ€¾…À‚¸‚˜\n", + /*460*/ "3-1€†³€¾€ €•Œ€øÖ\n", + /*461*/ "3-2€†ñ€¾€Ü€Ñ€×€ú‚„€×\n", + /*462*/ "3-2€„­€¾€ï‚„€â€Æ€Ï€þ\n", + /*463*/ "3-2€†³€¾ƒ¸ƒ¹‚€\n", + /*464*/ "4-1€†ñ€¾ƒôƒõ΃¡ƒ¢\n", + /*465*/ "4-1€†³€¾„΃à\n", + /*466*/ "4-2€†ñ€¾€Ö€Ì‚„€ã€À΀ـπâ€ä\n", + /*467*/ "4-2€†³€¾‚¨‚Ÿ\n", + /*468*/ "4-3€†ñ€¾€ü€Ü€´\n", + /*469*/ "4-3€„­€¾€Ó€øŒ€ÜÒ„—‚áÛ\n", + /*470*/ "4-3€†³€¾‚ž‚Ÿ\n", + /*471*/ "5-1€†ñ€¾†ó„˜Òƒƒ†ô\n", + /*472*/ "5-1€†³€¾„Ì„Í\n", + /*473*/ "5-2€†ñ€¾€ö€Ü€ã€à€Ë€Ï€Ü\n", + /*474*/ "5-2€„­€¾Š€Ê€Ö€Ï€þ\n", + /*475*/ "5-2€†³€¾‚Œ†·‚ ‚¢\n", + /*476*/ "5-3€†ñ€¾†õÂɆó†ö\n", + /*477*/ "5-3€†³€¾€ú€ÏŠÒ„¾ƒ°\n", + /*478*/ "6-1€†ñ€¾ÕÉáÒ†€Ñ‹‚„\n", + /*479*/ "6-1€†³€¾„‰„ŠÖ\n", + /*480*/ "6-2€†ñ€¾„Š„øÏÌ\n", + /*481*/ "6-2€„­€¾ƒÿã\n", + /*482*/ "6-2€†³€¾ƒ‘†÷\n", + /*483*/ "7-1€†ñ€¾‚„€â€ÆƒÒ€Ž\n", + /*484*/ "7-1€†³€¾ƒ‰éÌ€´\n", + /*485*/ "8-1€†ñ€¾…ÛàåãÒ€Ž\n", + /*486*/ "8-1€†³€¾‡ÉÀ†øÖ\n", + /*487*/ "9-1€†ñ€¾†ùÒƒÒ€Ž\n", + /*488*/ "9-1€†³€¾‚€Í€Ð€Ï€ä\n", + /*489*/ "€Ó€Ï‰€Æ€Ï€þ\n", + /*490*/ "€Û€ç€î\n", + /*491*/ "€×€ú‚„€×%d\n", + /*492*/ "€ß‚„€ÿ€Ê€ã†Â†Ã\n", + /*493*/ "‚—¸‚ÙÆÍƒ¥ƒÎ\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/optionsP.c b/src/files/lang/jap-final/optionsP.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/jap-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_f.c b/src/files/lang/jap-final/options_str_f.c new file mode 100644 index 000000000..ae50a4297 --- /dev/null +++ b/src/files/lang/jap-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succès\n", + /* 1*/ "Inachevé\n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " préhistoire", + /* 7*/ "rare présente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna imper\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Hôtesse\n", + /* 21*/ "Joanna Plongée\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "Sécurité dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secrétaire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "Négociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femme\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hôtesse\n", + /* 63*/ "Chef Hôtesse\n", + /* 64*/ "Le président\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "Sécurité Président\n", + /* 67*/ "Clone Président\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branchée dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Développeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Présenté en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre réalité\n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier paramètres simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet éditeur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak à éditer:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coopératif\n", + /*120*/ "Contre-Opération\n", + /*121*/ "Cinéma\n", + /*122*/ "Sélection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions spéciales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- Défection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enquête", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base Aérienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- Défense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vidéo\n", + /*183*/ "Contrôle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrôle\n", + /*193*/ "Contrôle Joueur 2\n", + /*194*/ "Style de contrôle\n", + /*195*/ "Visée inversée\n", + /*196*/ "Regard tête\n", + /*197*/ "Vue tête\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrôle cible\n", + /*200*/ "Retour\n", + /*201*/ "Fixe\n", + /*202*/ "Alt.\n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Visée sur écran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer portée zoom\n", + /*208*/ "Munitions affichées\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vidéo\n", + /*215*/ "Taille écran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "Split écran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cinéma\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "Stéréo", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrôle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Sélection Difficulté\n", + /*249*/ "Difficulté\n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Spécial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coopératif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binôme Protégé\n", + /*258*/ "Binôme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Opération\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Opération\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succès\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de prédilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Précision:\n", + /*284*/ "Total de tirs:\n", + /*285*/ " Tirs Tête:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membres:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "Décédé\n", + /*291*/ "Actif\n", + /*292*/ "Suspendu\n", + /*293*/ "Echec\n", + /*294*/ "Terminé\n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entraînement\n", + /*305*/ "Audio / Vidéo\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak\nnon détecté.\n", + /*323*/ "Fichier non sauvegardé.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de mémoire.\n", + /*327*/ "Ce joueur est déjà\nchargé pour cette partie.\n", + /*328*/ "a été enlevé.\n", + /*329*/ "Controller Pak est défectueux ou mal inséré.\n", + /*330*/ "Effacement des notes échoué.\n", + /*331*/ "Erreur charg. jeu\n", + /*332*/ "Erreur sauv. jeu\n", + /*333*/ "Erreur charg. joueur\n", + /*334*/ "Erreur sauv. joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'écriture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- Vérifier que le Controller Pak est\ninséré correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegardé.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauver autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous\nsauvegarder votre\nfichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Insérez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Insérez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "Choix emplacement\n", + /*368*/ "Lieu\n", + /*369*/ "Dispo\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Saturé", + /*373*/ "Copier fichiers\n", + /*374*/ "Choix fichier à copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "Choix fichier à effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sûr de\nvouloir effacer?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sûr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilisées: \n", + /*397*/ "Pages utilisées: %d\n", + /*398*/ "Déjà un fichier Perfect Dark.\n", + /*399*/ "Assez de place pour sauver Perfect Dark.\n", + /*400*/ "Controller Pak trop plein pour sauver: 1 note\net 28 pages requises.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Spécial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Opération Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas où, toi?\n", + /*456*/ "2:1 Intro - Négocie-moi ça!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauvé\n", + /*459*/ "3:1 Intro - Sombre allée\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Spécial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vidéo\n", + /*465*/ "4:1 Conclusion - A négliger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Spécial - Réveil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - Décollage\n", + /*473*/ "5:2 Intro - Dernière chance\n", + /*474*/ "5:2 Spécial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Spécial - Virus!\n", + /*482*/ "6:2 Conclusion - En arrière!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course liberté\n", + /*485*/ "8:1 Intro - Piqué!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de séquence\n", + /*490*/ "Cinéma\n", + /*491*/ "Occult. %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_g.c b/src/files/lang/jap-final/options_str_g.c new file mode 100644 index 000000000..e83caad68 --- /dev/null +++ b/src/files/lang/jap-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in prähistorischer Zeit", + /* 7*/ "Rare präsentiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchgerät\n", + /* 23*/ "Joanna im Polar-Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI-Labortechniker m.\n", + /* 34*/ "CI-Labortechniker w.\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekretärin\n", + /* 42*/ "Bürokleidung\n", + /* 43*/ "lockere Bürokleidung\n", + /* 44*/ "Unterhändlerin\n", + /* 45*/ "dataDyne Scharfschütze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Männlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Präsident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Präsidentenwache\n", + /* 67*/ "Präsident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schließen Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Wähle deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicher\n", + /*100*/ "Kopieren:\n", + /*101*/ "Löschen:\n", + /*102*/ "Spielstand wird gelöscht...\n", + /*103*/ "Solo-Missionen Speicherstände\n", + /*104*/ "Kampfsimulator Einstellung Speicherstände\n", + /*105*/ "Kampfsimulator Spielerdaten\n", + /*106*/ "PerfectHead-Speicherstände\n", + /*107*/ "Controller Pak Menü\n", + /*108*/ "Dieses Menü dient dazu, Speicherstände von den\n Controller Paks zu löschen.\n", + /*109*/ "Wählen Sie das Controller Pak:\n", + /*110*/ "Abbruch\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menü\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrünnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufklärung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Stützpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die Übernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Möchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfügbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Möchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Auto-Visier\n", + /*199*/ "Fadenkreuz-Ausricht.\n", + /*200*/ "Zurück\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurück\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Größe\n", + /*216*/ "Verhältnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurück\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurück\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhörer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einh.\n", + /*238*/ "Beidh.\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Wähle den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "Überblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Hits:\n", + /*283*/ "Präz.:\n", + /*284*/ "Schüsse:\n", + /*285*/ " Kopf:\n", + /*286*/ " Rumpf:\n", + /*287*/ " Gliedm.:\n", + /*288*/ " Andere:\n", + /*289*/ "Drücke START\n", + /*290*/ "Gefallen\n", + /*291*/ "Überlebt\n", + /*292*/ "Abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "Nächste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drücke START\n", + /*302*/ "Kleines aber feines Menü\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verhältnis\n", + /*312*/ "Zurück\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Köpfe\n", + /*319*/ "Köpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein\nController Pak in den\nControllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelöscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist beschädigt oder nicht richtig eingelegt.\n", + /*330*/ "Löschvorgang konnte nicht durchgeführt werden.\n", + /*331*/ "Ladefehler\n", + /*332*/ "Speicherfehler\n", + /*333*/ "Ladefehler Spieler\n", + /*334*/ "Speicherfehler Spieler\n", + /*335*/ "Fehler während des Ladens von PerfectHead.\n", + /*336*/ "Fehler während des Speicherns von PerfectHead.\n", + /*337*/ "Fehler während des Lesevorgangs.\n", + /*338*/ "Fehler während des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Löschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelöscht werden.\n", + /*342*/ "- Überprüfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spiel gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "Während des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz wählen\n", + /*351*/ "Abbrechen\n", + /*352*/ "Während des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz für den Kopf benötigt.\n", + /*356*/ "Wählen Sie einen Kopf, der überschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Möchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit den %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern möchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "Speicherplatz wählen\n", + /*368*/ "Wo!\n", + /*369*/ "Plätze\n", + /*370*/ "Löschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "Wählen Sie den zu kopierenden Spielstand:\n", + /*375*/ "Abbruch\n", + /*376*/ "Spielstand löschen\n", + /*377*/ "Welchen Spielstand:\n", + /*378*/ "Abbruch\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Möchten Sie diesen Spielstand\nwirklich löschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten löschen\n", + /*384*/ "Möchten Sie diese Spielerdaten\nwirklich löschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten löschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Abbruch\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Plätze: \n", + /*395*/ "Freie Plätze: %d\n", + /*396*/ "Belegte Plätze: \n", + /*397*/ "Belegte Plätze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfügung.\n", + /*400*/ "Das Controller Pak ist zu voll, um das Spiel zu\nspeichern. Es werden 28 freie Plätze benötigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abwärts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin geht's?\n", + /*456*/ "2:1 Intro - Verhandle DARÜBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwörung\n", + /*463*/ "3:2 Outro - Über die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - Über den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanöver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entführt\n", + /*486*/ "8:1 Outro - Ärger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Hits\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_i.c b/src/files/lang/jap-final/options_str_i.c new file mode 100644 index 000000000..ad87b6209 --- /dev/null +++ b/src/files/lang/jap-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Jo in tuta da lotta\n", + /* 17*/ "Jo in impermeabile\n", + /* 18*/ "Jo in abito da sera\n", + /* 19*/ "Jo in abito strappato\n", + /* 20*/ "Jo come hostess\n", + /* 21*/ "Jo in muta da sub\n", + /* 22*/ "Jo con bombole da sub\n", + /* 23*/ "Jo in tenuta polare\n", + /* 24*/ "Jo in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacchè NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "PRESENTE", + /* 74*/ "ASSENTE", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realtà\n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio n°1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "Sì\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalità comandi\n", + /*195*/ "Inv. punto vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalità suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficoltà\n", + /*249*/ "Difficoltà\n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco sugli amici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocat. 1", + /*272*/ "Giocat. 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Rifiuta\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma più usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalità suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore già caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore caric. gioco\n", + /*332*/ "Errore salv. gioco\n", + /*333*/ "Errore caric. giocat.\n", + /*334*/ "Errore salv. giocat.\n", + /*335*/ "Errore caric. testaPerfect\n", + /*336*/ "Errore salv. testaPerfect\n", + /*337*/ "Errore lettura file\n", + /*338*/ "Errore scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "Sì\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Che file cancellare?\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "Sì\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene già\nun gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Interferenze\n", + /*465*/ "4:1 Epilogo - Lasciamo perdere...\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - Sotto i ferri\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Ad alta quota\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilità\n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - L'inevitabile\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va là?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora più giù\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libertà\n", + /*485*/ "8:1 Prologo - Prigioniera\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/jap-final/options_str_s.c b/src/files/lang/jap-final/options_str_s.c new file mode 100644 index 000000000..487d1222e --- /dev/null +++ b/src/files/lang/jap-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Az. Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrón\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isotérmico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Científica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Técnico Masculino del IC\n", + /* 34*/ "Técnico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantería de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Ropa de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociadora\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del Área 51\n", + /* 51*/ "Soldado del Área 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "Técnico Masculino Lab.\n", + /* 56*/ "Técnico Femenino Lab.\n", + /* 57*/ "Técnico del Lab. dataDyne\n", + /* 58*/ "Biotécnico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Menú Controller Pak\n", + /*108*/ "Usa este menú para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menú Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Películas\n", + /*122*/ "Selecciona Misión\n", + /*123*/ "Misión 1\n", + /*124*/ "Misión 2\n", + /*125*/ "Misión 3\n", + /*126*/ "Misión 4\n", + /*127*/ "Misión 5\n", + /*128*/ "Misión 6\n", + /*129*/ "Misión 7\n", + /*130*/ "Misión 8\n", + /*131*/ "Misión 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigación", + /*137*/ "Central dataDyne", + /*138*/ "- Extracción", + /*139*/ "Villa Carrington", + /*140*/ "- Rehén Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "Área 51", + /*146*/ "- Infiltración", + /*147*/ "Área 51", + /*148*/ "- Rescate", + /*149*/ "Área 51", + /*150*/ "- Escape", + /*151*/ "Base Aérea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontación", + /*157*/ "Pelagic II", + /*158*/ "- Exploración", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "¡GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "¡Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "¿Quieres abortar la misión?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vídeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "¿Quieres cargar otro agente?\n", + /*190*/ "Sí\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Munición en Pantalla\n", + /*209*/ "Mostrar Función del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subtítulos\n", + /*212*/ "Mostrar Tiempo de Misión\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vídeo\n", + /*215*/ "Tamaño de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolución\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panorámica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Música\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Estéreo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar Sí\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compañero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar Sí\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visión General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misión:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misión:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisión:\n", + /*284*/ "Total Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misión", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Menú Pequeño pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vídeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Música\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vacío >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontró\nen ningún mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargará.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado en este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak está dañado o mal insertado.\n", + /*330*/ "Falló el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando\n", + /*332*/ "Error Guardando\n", + /*333*/ "Error Cargando\n", + /*334*/ "Error Guardando\n", + /*335*/ "Error Cargando\n", + /*336*/ "Error Guardando\n", + /*337*/ "Error Leyendo\n", + /*338*/ "Error Escribiendo\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nestá insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "¡Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "¿Quieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "Sí\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde estés salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Dónde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "¿Seguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "¿Estás seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "Sí\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "Páginas\n", + /*391*/ "Pulsa B para salir.\n", + /*392*/ "Vacío\n", + /*393*/ "--\n", + /*394*/ "Páginas Libres: \n", + /*395*/ "Páginas Libres: %d\n", + /*396*/ "Páginas Usadas: \n", + /*397*/ "Páginas Usadas: %d\n", + /*398*/ "Ya existe información de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak está demasiado lleno - 1 nota\ny 28 páginas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misión:", + /*406*/ "Desafío 1", + /*407*/ "Desafío 2", + /*408*/ "Desafío 3", + /*409*/ "Desafío 4", + /*410*/ "Desafío 5", + /*411*/ "Desafío 6", + /*412*/ "Desafío 7", + /*413*/ "Desafío 8", + /*414*/ "Desafío 9", + /*415*/ "Desafío 10", + /*416*/ "Desafío 11", + /*417*/ "Desafío 12", + /*418*/ "Desafío 13", + /*419*/ "Desafío 14", + /*420*/ "Desafío 15", + /*421*/ "Desafío 16", + /*422*/ "Desafío 17", + /*423*/ "Desafío 18", + /*424*/ "Desafío 19", + /*425*/ "Desafío 20", + /*426*/ "Desafío 21", + /*427*/ "Desafío 22", + /*428*/ "Desafío 23", + /*429*/ "Desafío 24", + /*430*/ "Desafío 25", + /*431*/ "Desafío 26", + /*432*/ "Desafío 27", + /*433*/ "Desafío 28", + /*434*/ "Desafío 29", + /*435*/ "Desafío 30", + /*436*/ "Especial\n", + /*437*/ "Introducción\n", + /*438*/ "Misión 1 - Central dataDyne\n", + /*439*/ "Misión 2 - Villa Carrington\n", + /*440*/ "Misión 3 - Edificio G5\n", + /*441*/ "Misión 4 - Área 51\n", + /*442*/ "Misión 5 - Air Force One\n", + /*443*/ "Misión 6 - Pelagic II\n", + /*444*/ "Misión 7 - Instituto Carrington\n", + /*445*/ "Misión 8 - Nave de Ataque Skedar\n", + /*446*/ "Misión 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introducción\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso Rápido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ¿Dónde vas?\n", + /*456*/ "Intro 2:1 - ¡Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Línea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejón Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiración\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vídeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabiduría\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - ¡Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - Última Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Maníaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - Más Profundo\n", + /*481*/ "Especial 6:2 - ¡Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - ¡Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - ¡Te pillé!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Películas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuación\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pamE.c b/src/files/lang/jap-final/pamE.c similarity index 100% rename from src/files/lang/pamE.c rename to src/files/lang/jap-final/pamE.c diff --git a/src/files/lang/jap-final/pamJ.c b/src/files/lang/jap-final/pamJ.c new file mode 100644 index 000000000..910425da6 --- /dev/null +++ b/src/files/lang/jap-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚§æ‚¯×ôƒÉ‚¦ÅÌÁãÉ„ÿ…€‰‚„€ßÒ¾¿éó€€ó€áàÒ„…„¯æË»Ï‚ìà¿ÏÄãÉï€Â†úƒÆÎ€Ó€Ñ€÷€Ð€ÏÒƒù怄ô„õ„öÒ„Š„øÏ†ìÉå´Ì»â€Â‚ªÍÃÒƒùÓ€í´Í„º´ÌÓ»âæ€‚ƒ˜ƒÑÏ€‡ƒ´†²€ˆ¸‚Õ´Ì»âÒð€ÂƒÍ…ØÃÒƒù€‡€Ý€ß€Ï€Û€Ê’€ˆÓ€€‡€Ü€Ø†‚„€ˆÍ€‚ªÜ„Åàλó€ó€áàÏ‚£‚‚Å̻≂„€ß†€Ñ€ÏÒ„ã‚æ€…‚ƒÈÅÌ»â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚䂅惛áƒç‚Ú´É‚††ûÒ†ÙƒÝÓ€…„ϾôäÁøÀÜÒð´É€ÂÃÒ‰‚„€ßÏÜÍòÀ‚ä‚…ÓóÀâð„ÜÁÒƒ°„踅ƒÛ̄„踂ڴɀÂÃÒ„Š„øÒ†úƒÆÎ†ü…ʃ°Ó€È҂ÃҸÓ⿆ýҀӀр÷€Ð€Ïςմ̻â€ÂÃãÓ€‡€Ý€ß€Ï€ˆÍ„Õõãâ†×†ØÒ€‡ƒ´†²¸‚մɃù€ˆð怃•ÓØð„º´Ì»â€ÂÅ¿ÅÃÃÏÓ€‚ä‚…Ò…§ƒ¢¸‚ûÆâ߼΂­Üƒôƒõ΃„½æ‚”ƒŽÄãÌ»âÒð€´€´\n\n|‚µ‚¶€‘€¾€â€ù”‚„€ß‚„¸‚ÂÄÇß\n\n€â€ù”‚„€ß‚„¸‚ÂÄÄÇãõ€€Ý€ß€Ï€Û€Ê’Ò‚ó‚ÚÁÃÍæóÀο´É€Ó€÷€ÐÖ„Ñ‚öóÀâ€Â€ú€Ê€×ÄãÌ»â€Ù€Ï€ã€ú‚„€ø€ø‚„€ðÖÜιͿ‚ÚÀƒóÂâðä¼€Â\n\n|‚µ‚¶€’€¾‚­†³ƒ„½Ò‚ă۸‚±‚²Çß\n\n‚¯Ï܆šøÉ€‡…€†›Òƒ„½€ˆÏ‚ÅÌð€Â‚†…žÄãÉ€÷€Ú‚„€à†ÙƒÝÏßãõ€ÃÒƒ„½Ó€ƒ˜„ƒ¸†Ù„ÎÆâ…þ»†þÒ‚‚¸ƒ¼ƒÜÏÆâÃÍæóÀâÍ»¼Òð€ÂÜź҃º„ñ΀܀؆‚„æÃ㸂ö‚ÝÅÌÅØ½õ€‚˜†äÓ€‘ƒ“‚ýƒ«ƒ¬ó€‡†ê†ëÒ€à€÷€ˆÍδÌÅØ¼ð伀ƒ…ÌÓ‚§Ï¿¿´Ì»âÒð€´€€Žƒù‚ŽÒ€Ó€ç€ø€ý‚„€…€é¸ƒ…̂΂ÏÅÌ»Âõ€ÈÒƒ„½Ò‚ă۸‚±‚²óÀâóºä¼€Â»Á˿ҀéÏ‚ÅÌÓ€ƒÏƒ¹Ò‚Ì„½óӂ΂ÏóÀλ¿Ü„Åãλ怎\n\n|‚µ‚¶€“€¾€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¸‚Œ„•\n\n€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¿à€Ü€Ø†‚„¸‚¹…„Ï‚ƒ…ËÅÌ€Š€×€ß‚„€…€Ö€Ë€ú€øÒ„±…ޏ‚Ò„„Æâ…øÏ‚€Ë€îæ‚öàÎ»ß¼ÏÆâÒð€Â€ó€áàæÃ㸄žèÉÛÏô¹Î„žƒø‚݃иƒˆƒ´ÅÌ»â¿å¿àλÒó€…Æƒ˜Ïƒµ¸ËÂÌÁã€Â\n\n|‚µ‚¶€”€¾Š€×€ß‚„€…€Ö€Ë€ú€ø¸†ÅÏ\n\nÃãÓŠ€×€ß‚„€…€Ö€Ë€ú€øæºÒ„¸ƒÿ…ÖóƒüÌÉ‚ðƒœÒ‚­†³ƒÐ‚½ð€Â‚ÛÒ€‡„±…Ž€ˆ¸‹€Ê€×€Ð€Ê’‰‚„€ß¸‚ù´Ì‚Ò„„ÆâÒð€ÂЀ׀߂„€…€Ö€Ë€ú€øÓ€Ù€Ï€ã€ú‚„€ø¸‚Ò„„Å€€Ý€ß€Ï€Û€Ê’¸‚Œ†·ÆâÃÍæóÀâÓíð€Â\n\n|‚µ‚¶€•€¾€Ý€ß€Ï€Û€Ê’¿à‚ž‚ŸÇß\n\n€Ý€ß€Ï€Û€Ê’¸ô¹Î†ÿóÜ»»¿à‚΂ÏÅÌ€€Ó€øŒ€Ü€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚ƒ…öÏŠ€Ê€Ö€Ï€þ€…Ž€ÑØóƒ‰éâÒð€Â‚Âö“€ö‚€Ê€×€’¸‚ù´Ì„ŠƒúØó‡Ëæãõ€…¸½Ò€×€ø‚„‚„æ‚§Éʸ‚ç´Ì»âóºä¼€Â\n\nEND\n", + /* 1*/ "€Ý€ß€Ï€Û€Ê’\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚§æ‚¯×ôƒÉ‚¦ÅÌÁãÉ„ÿ…€‰‚„€ßÒ¾¿éó€€ó€áàÒ„…„¯æË»Ï‚ìà¿ÏÄãÉï€Â†úƒÆÎ€Ó€Ñ€÷€Ð€ÏÒƒù怄ô„õ„öÒ„Š„øÏ†ìÉå´Ì»â€Â‚ªÍÃÒƒùÓ€í´Í„º´ÌÓ»âæ€‚ƒ˜ƒÑÏ€‡ƒ´†²€ˆ¸‚Õ´Ì»âÒð€ÂƒÍ…ØÃÒƒù€‡€Ý€ß€Ï€Û€Ê’€ˆÓ€€‡€Ü€Ø†‚„€ˆÍ€‚ªÜ„Åàλó€ó€áàÏ‚£‚‚Å̻≂„€ß†€Ñ€ÏÒ„ã‚æ€…‚ƒÈÅÌ»â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚䂅惛áƒç‚Ú´É‚††ûÒ†ÙƒÝÓ€…„ϾôäÁøÀÜÒð´É€ÂÃÒ‰‚„€ßÏÜÍòÀ‚ä‚…ÓóÀâð„ÜÁÒƒ°„踅ƒÛ̄„踂ڴɀÂÃÒ„Š„øÒ†úƒÆÎ†ü…ʃ°Ó€È҂ÃҸÓ⿆ýҀӀр÷€Ð€Ïςմ̻â€ÂÃãÓ€‡€Ý€ß€Ï€ˆÍ„Õõãâ†×†ØÒ€‡ƒ´†²¸‚մɃù€ˆð怃•ÓØð„º´Ì»â€ÂÅ¿ÅÃÃÏÓ€‚ä‚…Ò…§ƒ¢¸‚ûÆâ߼΂­Üƒôƒõ΃„½æ‚”ƒŽÄãÌ»âÒð€´€´\n\n|‚µ‚¶€‘€¾€â€ù”‚„€ß‚„¸‚ÂÄÇß\n\n€â€ù”‚„€ß‚„¸‚ÂÄÄÇãõ€€Ý€ß€Ï€Û€Ê’Ò‚ó‚ÚÁÃÍæóÀο´É€Ó€÷€ÐÖ„Ñ‚öóÀâ€Â€ú€Ê€×ÄãÌ»â€Ù€Ï€ã€ú‚„€ø€ø‚„€ðÖÜιͿ‚ÚÀƒóÂâðä¼€Â\n\n|‚µ‚¶€’€¾‚­†³ƒ„½Ò‚ă۸‚±‚²Çß\n\n‚¯Ï܆šøÉ€‡…€†›Òƒ„½€ˆÏ‚ÅÌð€Â‚†…žÄãÉ€÷€Ú‚„€à†ÙƒÝÏßãõ€ÃÒƒ„½Ó€ƒ˜„ƒ¸†Ù„ÎÆâ…þ»†þÒ‚‚¸ƒ¼ƒÜÏÆâÃÍæóÀâÍ»¼Òð€ÂÜź҃º„ñ΀܀؆‚„æÃ㸂ö‚ÝÅÌÅØ½õ€‚˜†äÓ€‘ƒ“‚ýƒ«ƒ¬ó€‡†ê†ëÒ€à€÷€ˆÍδÌÅØ¼ð伀ƒ…ÌÓ‚§Ï¿¿´Ì»âÒð€´€€Ó€øŒ€ÜÎàÈÒƒ„½Ò‚ă۸‚±‚²óÀâÓíð€Â‚ÛÍ‚ƒ…öπـπã€ú‚„€ø€ø‚„€ðσ†¿½€´\n\n|‚µ‚¶€“€¾€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¸‚Œ„•\n\n€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¿à€Ü€Ø†‚„¸‚¹…„Ï‚ƒ…ËÅÌ€Š€×€ß‚„€…€Ö€Ë€ú€øÒ„±…ޏ‚Ò„„Æâ…øÏ‚€Ë€îæ‚öàÎ»ß¼ÏÆâÒð€Â€ó€áàæÃ㸄žèÉÛÏô¹Î„žƒø‚݃иƒˆƒ´ÅÌ»â¿å¿àλÒó€…Æƒ˜Ïƒµ¸ËÂÌÁã€Â\n\n|‚µ‚¶€”€¾€Ý€ß€Ï€Û€Ê’¿à‚ž‚ŸÇß\n\n€Ý€ß€Ï€Û€Ê’¸ô¹Î†ÿóÜ»»¿à‚΂ÏÅÌ€€Ó€øŒ€Ü€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚ƒ…öÏŠ€Ê€Ö€Ï€þ€…Ž€ÑØóƒ‰éâÒð€Â‚Âö“€ö‚€Ê€×€’¸‚ù´Ì„ŠƒúØó‡Ëæãõ€…¸½Ò€×€ø‚„‚„æ‚§Éʸ‚ç´Ì»âóºä¼€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚§æ‚¯×ôƒÉ‚¦ÅÌÁãÉ„ÿ…€‰‚„€ßÒ¾¿éó€€ó€áàÒ„…„¯æË»Ï‚ìà¿ÏÄãÉï€Â†úƒÆÎ€Ó€Ñ€÷€Ð€ÏÒƒù怄ô„õ„öÒ„Š„øÏ†ìÉå´Ì»â€Â‚ªÍÃÒƒùÓ€í´Í„º´ÌÓ»âæ€‚ƒ˜ƒÑÏ€‡ƒ´†²€ˆ¸‚Õ´Ì»âÒð€ÂƒÍ…ØÃÒƒù€‡€Ý€ß€Ï€Û€Ê’€ˆÓ€€‡€Ü€Ø†‚„€ˆÍ€‚ªÜ„Åàλó€ó€áàÏ‚£‚‚Å̻≂„€ß†€Ñ€ÏÒ„ã‚æ€…‚ƒÈÅÌ»â€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‚䂅惛áƒç‚Ú´É‚††ûÒ†ÙƒÝÓ€…„ϾôäÁøÀÜÒð´É€ÂÃÒ‰‚„€ßÏÜÍòÀ‚ä‚…ÓóÀâð„ÜÁÒƒ°„踅ƒÛ̄„踂ڴɀÂÃÒ„Š„øÒ†úƒÆÎ†ü…ʃ°Ó€È҂ÃҸÓ⿆ýҀӀр÷€Ð€Ïςմ̻â€ÂÃãÓ€‡€Ý€ß€Ï€ˆÍ„Õõãâ†×†ØÒ€‡ƒ´†²¸‚մɃù€ˆð怃•ÓØð„º´Ì»â€ÂÅ¿ÅÃÃÏÓ€‚ä‚…Ò…§ƒ¢¸‚ûÆâ߼΂­Üƒôƒõ΃„½æ‚”ƒŽÄãÌ»âÒð€´€´\n\n|‚µ‚¶€‘€¾€â€ù”‚„€ß‚„¸‚ÂÄÇß\n\n€â€ù”‚„€ß‚„¸‚ÂÄÄÇãõ€€Ý€ß€Ï€Û€Ê’Ò‚ó‚ÚÁÃÍæóÀο´É€Ó€÷€ÐÖ„Ñ‚öóÀâ€Â€ú€Ê€×ÄãÌ»â€Ù€Ï€ã€ú‚„€ø€ø‚„€ðÖÜιͿ‚ÚÀƒóÂâðä¼€Â\n\n|‚µ‚¶€’€¾‚­†³ƒ„½Ò‚ă۸‚±‚²Çß\n\n‚¯Ï܆šøÉ€‡…€†›Òƒ„½€ˆÏ‚ÅÌð€Â‚†…žÄãÉ€÷€Ú‚„€à†ÙƒÝÏßãõ€ÃÒƒ„½Ó€ƒ˜„ƒ¸†Ù„ÎÆâ…þ»†þÒ‚‚¸ƒ¼ƒÜÏÆâÃÍæóÀâÍ»¼Òð€ÂÜź҃º„ñ΀܀؆‚„æÃ㸂ö‚ÝÅÌÅØ½õ€‚˜†äÓ€‘ƒ“‚ýƒ«ƒ¬ó€‡†ê†ëÒ€à€÷€ˆÍδÌÅØ¼ð伀ƒ…ÌÓ‚§Ï¿¿´Ì»âÒð€´€€Ó€øŒ€ÜÎàÈÒƒ„½Ò‚ă۸‚±‚²óÀâÓíð€Â‚ÛÍ‚ƒ…öπـπã€ú‚„€ø€ø‚„€ðσ†¿½€´\n\n|‚µ‚¶€“€¾€Ý€ß€Ï€Û€Ê’¿à‚ž‚ŸÇß\n\n€Ý€ß€Ï€Û€Ê’¸ô¹Î†ÿóÜ»»¿à‚΂ÏÅÌ€€Ó€øŒ€Ü€Š€×€ß‚„€…€Ö€Ë€ú€øÍ‚ƒ…öÏŠ€Ê€Ö€Ï€þ€…Ž€ÑØóƒ‰éâÒð€Â‚Âö“€ö‚€Ê€×€’¸‚ù´Ì„ŠƒúØó‡Ëæãõ€…¸½Ò€×€ø‚„‚„æ‚§Éʸ‚ç´Ì»âóºä¼€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "€â€ù”‚„€ß‚„¸‚ÂÄÇß\n", + /* 6*/ "‚­†³ƒ„½Ò‚ă۸‚±‚²Çß\n", + /* 7*/ "€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¸‚Œ„•\n", + /* 8*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø¸†ÅÏ\n", + /* 9*/ "€Ý€ß€Ï€Û€Ê’¿à‚ž‚ŸÇß\n", + /* 10*/ "ÃãóÃÒƒùÒ‚¸\nܴ̓—‡³Ï‚ÄÂâ\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "ºã技׀߂„€…€Ö€Ë€ú€øÎ¹ðä€Â\n„·‚Óς۸‚Ò„„óÀâҿ΀Ž\n", + /* 13*/ "Ãÿà€Ü€þσ‰éÎÀµ€´\n", + /* 14*/ "€Ó€øŒ€Üæ‚ÙÄãÉ\n", + /* 15*/ "Ѐ׀߂„€…€Ö€Ë€ú€øæ‚ÙÄãÉ\n", + /* 16*/ "€Ý€ß€Ï€Û€Ê’¿à‚ž‚ŸóÀÉ\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "į€Ã҂ขù´Ì€€ï‚„ÒƒÛ„‚\n€Ü€Ø†‚„¸‚¼òÂλóÁ〴\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "€Ý€ß€ÏÒ‚­†³ƒ„½Ò‚ă۸‚±‚²ÅÉ\n", + /* 21*/ "€Ù€Ï€ã€ú‚„€ø€ø‚„€ð¸‚Œ„•ÅÉ\n", + /* 22*/ "Ѐ׀߂„€…€Ö€Ë€ú€øÒ„±…Žæ‚Ò„„ÅÉ\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "‹€Ê€×€Ð€Ê’‰‚„€ß\n", + /* 26*/ "‹€Ê€×€Ð€Ê’‰‚„€ß\n", + /* 27*/ "\n", + /* 28*/ "ÃÃÒ€ç€ø¸…‰ƒÛÆãõ\n‚­†³ƒ„½¸‚±‚²óÀȼð€Â\n", + /* 29*/ "倀â€ù”‚„€ß‚„¸‚Ä¿Æï€Â\n", + /* 30*/ "€â€ù”‚„€ß‚„¸‚ÂÄÅÉ\n", + /* 31*/ "¾¿Å»Î¯€ƒžÜ»Î»€Â\n", + /* 32*/ "€ó€ØÏ†©¿Ñ€Â\n‚‘´É†ÿ†Üλ倎\n", + /* 33*/ "‚‰ƒŽƒÜ»Î»Ò¿Î€À\n€î€ã€òìµÎ»ï€Â\n", + /* 34*/ "À´Í…®ÏÓƒž¿»âÓí߀Â\n€Õ‹‚„ÅÌ€Â\n", + /* 35*/ "ĺ„ØÛâå߀€ó€áàæ\n‚€Ë€îÅÌÃλ‚ŽÏ€Ž\n", + /* 36*/ "€Ò€Ñ€ø€Ü„‚Ÿ\n", + /* 37*/ "‚ñ‚òÅÉ¿Åà€´\n", + /* 38*/ "‚ü„Ã’€ú€þ€ö€ð‚ȂĀ…‚ü„Ãü€øä\nŸ€þ€ÿ€ý›§€ý€Ë€¶€´€´€™€¥¥«\npž€¥€¤€þ€Ôž€¶€Å€—ž€ë€È€ €Ö€È\n’’“€“€Ö†€Á€€Ò€Ž€Ò€Ç€€´€´\n", + /* 39*/ "Ѐ׀߂„€…€Ö€Ë€ú€ø€À€ƒÆ„Ó„Ô€À\nÃÃÒ’€ú€þ€ö€ð¸„¬Ûàãâ€À\n", + /* 40*/ "º¯€ÂιͿƒÆ„Ó„Ôð€Â\nſł­†³ƒ„½æƒôƒõð€´\np‚§ÉÊÒ‚±‚²ƒÛ„ӆ݄„Ä『\n", + /* 41*/ "ô¼»¼ÃÍ€À\n", + /* 42*/ "’€ú€þ€ö€ð¸„¬ÛâÉÛÏ\nƒ”æóÀâÃÍÓ€ŽÔÍË€Ž\np€Ž€Ž€Žƒ•¿à€Ý€ß€Ï€Û€Ê’¸…£‚ÎÆâ€Â\n…¹…õðæ€ƒ”æƒ—à…£‚ÈÆâſλ€Â\npƒŸ¸Å⃓̻‚ýÓλ€Â\nÆèÏ‚ž‚ŸÆâÒð€Â\np‚§Í‚ƒ…öσ™Â̼ãÅ¿´É߀Â\nÄßÎà€‚€Í€Ð€Ï€ä€…†‚„€×€Â\n", + /* 43*/ "€Ý€ß€ÏÒ‚­†³ƒ„½Ò‚ă۸‚±‚²ÅÉ\n", + /* 44*/ "…¤†¨æ€ð†Ï‚ùåãÉ€‚­†³ƒ„½Ò‚ü„Ã󇃃\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pamP.c b/src/files/lang/jap-final/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/jap-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_f.c b/src/files/lang/jap-final/pam_str_f.c new file mode 100644 index 000000000..f6ce2d90c --- /dev/null +++ b/src/files/lang/jap-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Sécuriser la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif 4: - Restaurer la personnalité du Dr. Caroll\n\nC'est la dernière étape du plan d'urgence mis en place par le Dr. Caroll durant le debriefing à la villa. Restaurer sa personnalité à l'I.A. lui permettra de reprendre le contrôle de l'enveloppe douée de raison et d'autres parties du vaisseau.\n\n|Objectif 5: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existé.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Sécuriser la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif 4: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver téléporteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "Sécuriser la Salle de Contrôle\n", + /* 8*/ "Restaurer la personnalité du Dr. Caroll\n", + /* 9*/ "S'échapper du vaisseau cetan\n", + /* 10*/ "Cela nous aidera à nous déplacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera à nous \nprotéger des défenses automatiques.\n", + /* 12*/ "Voilà le Dr. Caroll. Voyons voir si nous \npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a été tué.\n", + /* 15*/ "Dr. Caroll a été tué.\n", + /* 16*/ "Evacuation du vaisseau Cetan réussie.\n", + /* 17*/ "Elvis a déverrouillé la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars à distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralisée.\n", + /* 21*/ "Salle de Contrôle sécurisée.\n", + /* 22*/ " Personnalité du Dr. Caroll restaurée.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque sauvegarde\n", + /* 26*/ "Un disque sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n à ce truc.\n", + /* 29*/ "Il est temps de réactiver ces téléporteurs.\n", + /* 30*/ "Téléporteurs réactivés.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes à feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arrière-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'espère que la dataDyne n'a rien prévu pour empêcher ça...\n", + /* 36*/ "Virus détecté.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrôle? Pouvez-vous arrêter le programme?\n", + /* 40*/ "En effet, me voilà de retour, très chère. Le programme est lancé depuis trop longtemps pour que je puisse l'arrêter. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera terminé, j'aurai le contrôle d'une arme extrêmement puissante. Cette arme ne doit pas exister. Je dois par conséquent détruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous échapper. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a été neutralisée.\n", + /* 44*/ "Munitions épuisées - arme ennemie ne peut être détruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_g.c b/src/files/lang/jap-final/pam_str_g.c new file mode 100644 index 000000000..ce54ba24b --- /dev/null +++ b/src/files/lang/jap-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstören Sie alle Kraftknoten innerhalb des Schiffes. Nur so können Sie die Waffe außer Kraft setzen. Einige dieser Knoten könnten sich aber außerhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persönlichkeit ungestört restaurieren können. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persönlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, über den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persönlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle über den Sapienten, sondern auch über manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persönlichkeit ungestört restaurieren können. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunfähig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flüchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schützt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir müssen versuchen,\nseine Persönlichkeit wieder herzustellen.\n", + /* 13*/ "Wir müssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstört.\n", + /* 16*/ "Evakuierung erfolgreich\n", + /* 17*/ "Elvis hat die Tür entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, während ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presönlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage wäre hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhülsen oder Einschusslöcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein großes Mundwerk.\n", + /* 38*/ "Gegenmaßnahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Können Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm läuft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Möglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht länger existieren. Das Cetanische Schiff muss mit mir zerstört werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flüchten Sie! Es war mir eine große Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunfähig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_i.c b/src/files/lang/jap-final/pam_str_i.c new file mode 100644 index 000000000..b95cc1948 --- /dev/null +++ b/src/files/lang/jap-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta è l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sarà restituita la facoltà di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuterà a fare il giro \ndell'astronave più velocemente.\n", + /* 11*/ "Questa immuno-maschera ci proteggerà \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis è stato ucciso.\n", + /* 15*/ "Il Dr. Caroll è stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "È ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non è normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo di sé! Riesce a fermare il programma?\n", + /* 40*/ "Sì, sì, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C'è un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avrà finito, sarò ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c'è altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. È stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan è stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/jap-final/pam_str_s.c b/src/files/lang/jap-final/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/jap-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Depende de ti: destruye los nodos de energía a lo largo de la nave, y el arma dejará de ser operativa. Algunos estarán fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nÉsta es la última fase del plan de contingencia que el Dr. Caroll adelantó durante su informe en la Villa. Restaurar su personalidad a la del creador de códigos de apertura reafirmará su control sobre el caparazón inteligente y aquellas partes de la nave Cetan que como 'rompedor de códigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudará a recorrer la \nnave más rápido.\n", + /* 11*/ "Este disfraz de anticuerpos nos protegerá \nde las defensas automáticas.\n", + /* 12*/ "Ahí está el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "¡Tenemos que salir de aquí!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuación de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aquí. Coge este arma y mantén a los Skedar \nalejados de mí mientras trabajo.\n", + /* 19*/ "Máscara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeño sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aquí.\n", + /* 32*/ "No hay señales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debería haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien más adelante. Cúbreme.\n", + /* 35*/ "Allá vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "¡Qué bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** ¡¡ooOOoh!! *** ¡¡eeEEe!! *** ¡¡aaAhh!! *** ¡¡oOOoh!! *** ¡¡aAArRrgghh!! *** ¡¡YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "¿Dr. Caroll? ¿Tiene el control de nuevo? ¿Puede detener el programa?\n", + /* 40*/ "Sí, estoy de vuelta, cariño. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Sólo existe una manera de acabar con esto...\n", + /* 41*/ "¿Qué quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendré el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. Así que debo destruir la nave Cetan y a mí mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendrás tiempo para escapar. Ha sido un honor trabajar contigo. Adiós, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Munición desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/peteE.c b/src/files/lang/jap-final/peteE.c similarity index 100% rename from src/files/lang/peteE.c rename to src/files/lang/jap-final/peteE.c diff --git a/src/files/lang/jap-final/peteJ.c b/src/files/lang/jap-final/peteJ.c new file mode 100644 index 000000000..4095cb42c --- /dev/null +++ b/src/files/lang/jap-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•€Ù‚„”€ù‚„€Û€Í€ÏÓ€‰‚„€ß†€Ñ€ÏÒ‚Ý‚¯ðÍ‚©åãÌ»â€Â‡†ÈÏÓ‚ƒ‡‚‡ƒ„ÒÜ†Ž»Ì»âÒ󀂑‚’Ò…øÏÓ„®ƒ´æƒ‡ƒƒð€Â‚ä‚…Ò„‚„‹‚™¿àÒ„ì„íÏßâÍ€Œ€øÒ‚Ž‚–Ò‚‰ƒŽæ†Çƒ“‚ýƒ¿à¿Îჺ…¦ÄãÌ»âÒó€‚ßÅ»‚‘»æ„Æ…§Äãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‡ƒ‡‚‘Ò€ã€ù‚„€å€Ï€þ¸‚á½Ì»âðä¼€À€„‚„‹‚™¿àÒ„ì„í¿àƒØ†Îæ‚Êå´Ì»ÎÂãõ€ºÒƒ“Ò‡„‡…æƒûσüËÓíð€Âܼ€‘ƒÎ€‚—Ò‚‰ƒŽ€ú€Ê€ã悸‡Ë¸€ã€ú‚„€øÅÌ»âÒðæ€ÃãÏÓÎâøÁ‚¼ò¿Î»ß¼Ï€Â\n\n|‚µ‚¶€‘€¾ƒÂ…¶€Ð€Ñ€â€ð¸‚ÒƒÕÇß\n\n‚§Ò„¨‚ÄÏ‚¯æÂ̂䂅悦´É„‚„‹‚™æ€ƒÂ…¶€Ð€Ñ€â€ðÒ‚ö´É€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸ƒè„Ž‚¸Ò‚Ï…ÞÅÌ»â€ÂÈÃÏÓ‚§æƒ•‚ÒÒ‚µ‚¶¸ƒ‚ÚÆâ‡Ë󃇃ƒÎƒ…ÌҀႄ€øæƒˆƒ´ÄãÌ»âÓíð€Â\n\n|‚µ‚¶€’€¾€÷€ð‚€Ïςȃ¤„½¸€Ý€Ê€ã\n\n‚§æÃÃσⅫŃπ€ñ€Ñ€Ï€Ü€ã€÷‚„€ãÏ€÷€ð‚€ÏæƒòƒóÅÉ€ÂÃÒ€÷€ð‚€ÏÒƒÉƒŠƒç¸ƒ ó‚¹‚ÇóÀâ߼π…—‚‹Ï‚ȃ¤„½¸€Ý€Ê€ãÆâÒð€Â\n\n|‚µ‚¶€“€¾‚ž‚Ÿ€ø‚„€ã¸‚¹‚ºÇß\n\n€ €•Œ€øÒ„焲ςùåã̻λƒ¸ƒ¹‚€æºâ€ÂÃãÓ‚§æŒ€ø¿à‚ž‚ŸÆâÍÀσûƒüËÓíð€Â€ú€Ê€×ÄãÉŠ€ÐÏ€÷€ò‚„€ã…£…¤¸ƒ›áË€ƒ ó…£‚ÎóÀâß¼„¥ƒŽ¸Å̾ÁÒð€Â…£…Ïó‚Ðáσµò¿ãâÒ¸„žèÉÛ€€ï‚„€â€Æ€Ï€þ憳å´Éƒ ó‚Ã…£Æâ߼πÂ\n\n|‚µ‚¶€”€¾€ß€×€Û‚„¸‚ù»‡‡‚ăۂ‘…„‚Ú\n\n‚ª¿Äå縂ÃÃÇõ€€ €•Œ€øÒ‚ö‚€¸‚‰ƒŽÅÌ»â€ó€áàæÆè…ƒØ´ÌÁâðä¼€ÂÃ㸼ØÁƒâƒˆÅß¼€Â„ð…—ÅÌ»â€ß€×€Û‚„Ò€Ô‚„€ã€Ñ€ú€Ê€ã€…’€ú€þ€ö€ðω‚„€ß€÷€Ï€Õ¸‚ù´Ì€Ò€Ñ€ø€Ü¸€Ý€Ê€ãÅ€‚¼Á󅣂ȸ‚ÃÃÄÇâÒð€Â\n\n|‚µ‚¶€•€¾€ €•Œ€øÖ„‚öÇß\n\n€ €•Œ€øÒ‚ö‚€Ò‚¼Áϻ₉ƒŽƒæ€‚Ž‚ÏƒÏìâ€Ó€ùŽ‚„€ß‚„Ҁـπã€ú‚„€ø€ç€ø¸‚é‚êÅÌ¾á€…å…æÏ„‚öóÀâƒØ†ÎóÓλ€Â€ß€×€Û‚„¸…£‚ÈÄÇ⇇‚ăۂ‘惱„¶Æãõ‚‰ƒŽƒÝÈÒ†˜Ò„±‚…ÓƒÏáσÁö‚ŸÅÌÁâÓíð€ÂÈÒ‚ýÏ€„׻ɨØÏÎ´Ì»âŠ€Ð¿à„‚öÆâÒð€Â‚ƒ‡‚‡ƒ„ÒÖ„ý‚²¸„”½ÌÓÎàλÃ͸€‚èãλ߼πÂ\n\nEND\n", + /* 1*/ "€Û€Õ€\n\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•€Ù‚„”€ù‚„€Û€Í€ÏÓ€‰‚„€ß†€Ñ€ÏÒ‚Ý‚¯ðÍ‚©åãÌ»â€Â‡†ÈÏÓ‚ƒ‡‚‡ƒ„ÒÜ†Ž»Ì»âÒ󀂑‚’Ò…øÏÓ„®ƒ´æƒ‡ƒƒð€Â‚ä‚…Ò„‚„‹‚™¿àÒ„ì„íÏßâÍ€Œ€øÒ‚Ž‚–Ò‚‰ƒŽæ†Çƒ“‚ýƒ¿à¿Îჺ…¦ÄãÌ»âÒó€‚ßÅ»‚‘»æ„Æ…§Äãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‡ƒ‡‚‘Ò€ã€ù‚„€å€Ï€þ¸‚á½Ì»âðä¼€À€„‚„‹‚™¿àÒ„ì„í¿àƒØ†Îæ‚Êå´Ì»ÎÂãõ€ºÒƒ“Ò‡„‡…æƒûσüËÓíð€Âܼ€‘ƒÎ€‚—Ò‚‰ƒŽ€ú€Ê€ã悸‡Ë¸€ã€ú‚„€øÅÌ»âÒðæ€ÃãÏÓÎâøÁ‚¼ò¿Î»ß¼Ï€Â\n\n|‚µ‚¶€‘€¾ƒÂ…¶€Ð€Ñ€â€ð¸‚ÒƒÕÇß\n\n‚§Ò„¨‚ÄÏ‚¯æÂ̂䂅悦´É„‚„‹‚™æ€ƒÂ…¶€Ð€Ñ€â€ðÒ‚ö´É€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸ƒè„Ž‚¸Ò‚Ï…ÞÅÌ»â€ÂÈÃÏÓ‚§æƒ•‚ÒÒ‚µ‚¶¸ƒ‚ÚÆâ‡Ë󃇃ƒÎƒ…ÌҀႄ€øæƒˆƒ´ÄãÌ»âÓíð€Â\n\n|‚µ‚¶€’€¾‚ž‚Ÿ€ø‚„€ã¸‚¹‚ºÇß\n\n€ €•Œ€øÒ„焲ςùåã̻λƒ¸ƒ¹‚€æºâ€ÂÃãÓ‚§æŒ€ø¿à‚ž‚ŸÆâÍÀσûƒüËÓíð€Â€ú€Ê€×ÄãÉŠ€ÐÏ€÷€ò‚„€ã…£…¤¸ƒ›áË€ƒ ó…£‚ÎóÀâß¼„¥ƒŽ¸Å̾ÁÒð€Â…£…Ïó‚Ðáσµò¿ãâÒ¸„žèÉÛ€€ï‚„€â€Æ€Ï€þ憳å´Éƒ ó‚Ã…£Æâ߼πÂ\n\n|‚µ‚¶€“€¾€ß€×€Û‚„¸‚ù»‡‡‚ăۂ‘…„‚Ú\n\n‚ª¿Äå縂ÃÃÇõ€€ €•Œ€øÒ‚ö‚€¸‚‰ƒŽÅÌ»â€ó€áàæÆè…ƒØ´ÌÁâðä¼€ÂÃ㸼ØÁƒâƒˆÅß¼€Â„ð…—ÅÌ»â€ß€×€Û‚„Ò€Ô‚„€ã€Ñ€ú€Ê€ã€…’€ú€þ€ö€ðω‚„€ß€÷€Ï€Õ¸‚ù´Ì€Ò€Ñ€ø€Ü¸€Ý€Ê€ãÅ€‚¼Á󅣂ȸ‚ÃÃÄÇâÒð€Â\n\n|‚µ‚¶€”€¾€ €•Œ€øÖ„‚öÇß\n\n€ €•Œ€øÒ‚ö‚€Ò‚¼Áϻ₉ƒŽƒæ€‚Ž‚ÏƒÏìâ€Ó€ùŽ‚„€ß‚„Ҁـπã€ú‚„€ø€ç€ø¸‚é‚êÅÌ¾á€…å…æÏ„‚öóÀâƒØ†ÎóÓλ€Â€ß€×€Û‚„¸…£‚ÈÄÇ⇇‚ăۂ‘惱„¶Æãõ‚‰ƒŽƒÝÈÒ†˜Ò„±‚…ÓƒÏáσÁö‚ŸÅÌÁâÓíð€ÂÈÒ‚ýÏ€„׻ɨØÏÎ´Ì»âŠ€Ð¿à„‚öÆâÒð€Â‚ƒ‡‚‡ƒ„ÒÖ„ý‚²¸„”½ÌÓÎàλÃ͸€‚èãλ߼πÂ\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€ €•€Ù‚„”€ù‚„€Û€Í€ÏÓ€‰‚„€ß†€Ñ€ÏÒ‚Ý‚¯ðÍ‚©åãÌ»â€Â‡†ÈÏÓ‚ƒ‡‚‡ƒ„ÒÜ†Ž»Ì»âÒ󀂑‚’Ò…øÏÓ„®ƒ´æƒ‡ƒƒð€Â‚ä‚…Ò„‚„‹‚™¿àÒ„ì„íÏßâÍ€Œ€øÒ‚Ž‚–Ò‚‰ƒŽæ†Çƒ“‚ýƒ¿à¿Îჺ…¦ÄãÌ»âÒó€‚ßÅ»‚‘»æ„Æ…§Äãâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n‡ƒ‡‚‘Ò€ã€ù‚„€å€Ï€þ¸‚á½Ì»âðä¼€À€„‚„‹‚™¿àÒ„ì„í¿àƒØ†Îæ‚Êå´Ì»ÎÂãõ€ºÒƒ“Ò‡„‡…æƒûσüËÓíð€Âܼ€‘ƒÎ€‚—Ò‚‰ƒŽ€ú€Ê€ã悸‡Ë¸€ã€ú‚„€øÅÌ»âÒðæ€ÃãÏÓÎâøÁ‚¼ò¿Î»ß¼Ï€Â\n\n|‚µ‚¶€‘€¾ƒÂ…¶€Ð€Ñ€â€ð¸‚ÒƒÕÇß\n\n‚§Ò„¨‚ÄÏ‚¯æÂ̂䂅悦´É„‚„‹‚™æ€ƒÂ…¶€Ð€Ñ€â€ðÒ‚ö´É€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸ƒè„Ž‚¸Ò‚Ï…ÞÅÌ»â€ÂÈÃÏÓ‚§æƒ•‚ÒÒ‚µ‚¶¸ƒ‚ÚÆâ‡Ë󃇃ƒÎƒ…ÌҀႄ€øæƒˆƒ´ÄãÌ»âÓíð€Â\n\n|‚µ‚¶€’€¾€ß€×€Û‚„¸‚ù»‡‡‚ăۂ‘…„‚Ú\n\n‚ª¿Äå縂ÃÃÇõ€€ €•Œ€øÒ‚ö‚€¸‚‰ƒŽÅÌ»â€ó€áàæÆè…ƒØ´ÌÁâðä¼€ÂÃ㸼ØÁƒâƒˆÅß¼€Â„ð…—ÅÌ»â€ß€×€Û‚„Ò€Ô‚„€ã€Ñ€ú€Ê€ã€…’€ú€þ€ö€ðω‚„€ß€÷€Ï€Õ¸‚ù´Ì€Ò€Ñ€ø€Ü¸€Ý€Ê€ãÅ€‚¼Á󅣂ȸ‚ÃÃÄÇâÒð€Â\n\n|‚µ‚¶€“€¾€ €•Œ€øÖ„‚öÇß\n\n€ €•Œ€øÒ‚ö‚€Ò‚¼Áϻ₉ƒŽƒæ€‚Ž‚ÏƒÏìâ€Ó€ùŽ‚„€ß‚„Ҁـπã€ú‚„€ø€ç€ø¸‚é‚êÅÌ¾á€…å…æÏ„‚öóÀâƒØ†ÎóÓλ€Â€ß€×€Û‚„¸…£‚ÈÄÇ⇇‚ăۂ‘惱„¶Æãõ‚‰ƒŽƒÝÈÒ†˜Ò„±‚…ÓƒÏáσÁö‚ŸÅÌÁâÓíð€ÂÈÒ‚ýÏ€„׻ɨØÏÎ´Ì»âŠ€Ð¿à„‚öÆâÒð€Â‚ƒ‡‚‡ƒ„ÒÖ„ý‚²¸„”½ÌÓÎàλÃ͸€‚èãλ߼πÂ\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "ƒÂ…¶€Ð€Ñ€â€ð¸‚ÒƒÕÇß\n", + /* 10*/ "€÷€ð‚€Ïςȃ¤„½¸€Ý€Ê€ã\n", + /* 11*/ "‚ž‚Ÿ€ø‚„€ã¸‚¹‚ºÇß\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "€ß€×€Û‚„¸‚ù»‡‡‚ăۂ‘…„‚Ú\n", + /* 14*/ "€ €•Œ€øÖ„‚öÇß\n", + /* 15*/ "€÷€ò‚„€ã…£…¤æ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 16*/ "€÷€ò‚„€ã…£…¤æ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 17*/ "‚æÏ€Ò€Ñ€ø€ÜӀ݀ʀãÄãÌ»ØÆ\n", + /* 18*/ "€ß€×€Û‚„¿àƒêƒëÎÅ€‰‚„€ß€÷€Ï€Õ惇ƒƒ\n", + /* 19*/ "€ß€×€Û‚„Ò€Ô‚„€ã€Ñ€ú€Ê€ã\n’€ú€þ€ö€ðπЀ׀݀܂€Ž\n", + /* 20*/ "€Ò€Ñ€ø€ÜҀ݀ʀã‚ó‚ô\n", + /* 21*/ "€ß€×€Û‚„Ò€Ô‚„€ã€Ñ€ú€Ê€ã\n’€ú€þ€ö€ðÒ…É…Ê‚ó‚ô\n", + /* 22*/ "€ß€×€Û‚„ÖÒ€Ù€ç€×€Û€Í€Ïæ„–ƒ®ÄãÉ\n", + /* 23*/ "‚ȃ¤„½æ… ÅÁ€Ý€Ê€ãÄãÉ\n", + /* 24*/ "‚ȃ¤„½æ… ÅÁ€Ý€Ê€ãÄãÌ»ØÇ¹\n", + /* 25*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΂Àƒ°æ‚΂ÏÄãÉ\n", + /* 26*/ "‚µ‚¶‚ñ‚ò\n", + /* 27*/ "‚µ‚¶‚ó‚ô\n", + /* 28*/ "‰‚„€ß†€Ñ€ÏÒ€÷€ð‚€Ï悟‚ÈÅÉ\n", + /* 29*/ "‚µ‚¶‚ñ‚ò€„Ò‚ý„±æ‚ÙÄãÉ\n", + /* 30*/ "ƒµ¸ËÂ䀴€‚ขմ̻â\n", + /* 31*/ "‹€Ê€‹€Ø€ò€èæ„……ÇÅÏδ̻â\n", + /* 32*/ "„Ñ‚öƒî‚Ȃɀƒñ„¦¸‚¦áØÆ\n", + /* 33*/ "€Ó€ùŽ‚„€ß‚„æ€ú€Ê€×ÄãÉ\n", + /* 34*/ "¾»€‚ª¸Ý´Ì»â¹ð€À\n", + /* 35*/ "ƒ”¸ÃåæàλÎ\n", + /* 36*/ "‚ȃ¤„½æ‚È‚ÉÄãÌÅØ´É\n", + /* 37*/ "ùÏÊÓ\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "€÷€ò‚„€ã…£…¤\n", + /* 41*/ "€÷€ò‚„€ã…£…¤\n", + /* 42*/ "€÷€ò‚„€ã…£…¤¸‚ÝÏ‚öãÉ\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "‚ȃ¤„½\n", + /* 46*/ "‚ȃ¤„½\n", + /* 47*/ "‚ȃ¤„½¸‚ÝÏ‚öãÉ\n", + /* 48*/ "€Ó€ùŽ‚„€ß‚„ÒŠ€Ðæ„×ÀØÇ¹\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 52*/ "‰‚„€ß€÷€Ï€Õ\n", + /* 53*/ "‰‚„€ß€÷€Ï€Õ¸‚ÝÏ‚öãÉ\n", + /* 54*/ "Äå縂ÃÃÅÉ€½‡‡‚ăۂ‘‚ó‚ô\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "€ë€Å€ø€Ù€Ï€’\n", + /* 58*/ "€÷€ò‚„€ã…£…¤\n", + /* 59*/ "€÷€ò‚„€ã…£…¤¸‚ÝÏ‚öãÉ\n", + /* 60*/ "ƒè„Ž‚¸ÏƒÂ…¶€Ð€Ñ€â€ð¸…ÞÅ̾»Éï€Â\n", + /* 61*/ "€÷€ò‚„€ã…£…¤¸‚ù½õ€ô´ÊÒŠ€ÐÜ\n‚ž‚ŸƒˆÏ‚ù½È¼ðå€Â\n", + /* 62*/ "€ß€×€Û‚„πҀрø€Ü¸€Ý€Ê€ãÅ\n€Ô‚„€ã€Ñ€ú€Ê€ã€…’€ú€þ€ö€ð¸…É…ÊÆâ¹ð€Â\n", + /* 63*/ "ÃÒ‚„€Ö€Ï€þÒ€Ó€ùŽ‚„€ß‚„æ\n€ €•Œ€øÖÒ„’‚ƒÒ‚ö‚€ð€Â\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "ƒÿÒ„Ñ‚ö‚Ԅϸ‚¹‚ºÅÉ\n", + /* 67*/ "‚ȃ¤„½æ‚È‚ÉÄãÌÅØ´É\n", + /* 68*/ "€ €•€Ù‚„”€ù‚„€Û€Í€ÏÒ…„‚‹Ó\n‰‚„€ß†€Ñ€Ï„“ÈÒÜÒÎÒð€Â\np‡ŽÒ‚¤…Ãσžæ‚Ÿ†Å\n‚ªæ„—ƒÑÎÒ¿¸„Å⃇ƒƒæºâ€Â\np‚§æ‚ž‚ŸÆâÃäÏÓ\nƒ”Ò€‡€ë€ù€ÏŠ€ˆæƒòƒóÆâðä¼€Â\n", + /* 69*/ "Ѳ€€Üæ»ËÜ‚©¼\n€‡€ë€ù€ÏŠ€ˆ´ÌƒžÎÒ€À\n", + /* 70*/ "ƒ•ÓØð†€ñð€‚€Í€Ð€Ï€ä€Â\nƒÏƒ¤¸†³½â€Â€þ€ÊŠ€ö€Ê€×€Â\n", + /* 71*/ "€é€Ñ€é€Ñ€ºáæÍ€Ž\n", + /* 72*/ "€÷€ò‚„€ã…£…¤æ€ð†Ï‚ùåãÌÅØ´É\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/peteP.c b/src/files/lang/jap-final/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/jap-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_f.c b/src/files/lang/jap-final/pete_str_f.c new file mode 100644 index 000000000..b4a3498b4 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arrivée dans la rue principale peu après vous. Toutes les tentatives pour la pister ont échouées, il va falloir faire ça à l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'où elle vient.\n\n|Objectif 3: - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 4: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2 - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 3 - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Récupérer équipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Préparer voie de sortie\n", + /* 12*/ "Acquérir cible de diversion\n", + /* 13*/ "Créer diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionnée.\n", + /* 16*/ "Mine mal positionnée.\n", + /* 17*/ "Virus téléchargé dans le NavComp.\n", + /* 18*/ "Taxi incontrôlable - reprogrammation nécessaire.\n", + /* 19*/ "Accès au système de navigation du taxi.\n", + /* 20*/ "Virus téléchargé.\n", + /* 21*/ "Système de navigation taxi reprogrammé.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionné.\n", + /* 24*/ "Pisteur mal positionné.\n", + /* 25*/ "Véhicule crucial détruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission échouée - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Accès ascenseur scellé.\n", + /* 34*/ "Hé - Qu'est-ce que vous faites là?\n", + /* 35*/ "Pfff. Même pas peur!\n", + /* 36*/ "Pisteur remarqué.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine télécom.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine télécom\n", + /* 41*/ "Une mine télécom.\n", + /* 42*/ "Mine télécom. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus être ouvertes.\n", + /* 49*/ "Obtenir Reprogrammeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un reprogrammeur\n", + /* 53*/ "Reprogrammeur obtenu.\n", + /* 54*/ "Diversion créée.\n", + /* 55*/ "Obtenir mine télécom.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine télécom.\n", + /* 59*/ "Mine télécom.\n", + /* 60*/ "Nous avons caché l'équipement \ndans une bouche d'égout.\n", + /* 61*/ "N'importe laquelle de ces portes bloquée \npeut servir de sortie.\n", + /* 62*/ "Reprogrammez ce taxi, c'est un type 2. \nIl devrait être compatible.\n", + /* 63*/ "Cet ascenseur à voiture est votre \nseul point d'entrée.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a été créée!\n", + /* 67*/ "Pisteur à été découvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqué dans ce complot. Je sais que \nCassandra de Vries sera présente, mais j'ai besoin \nde savoir qui d'autre sera là et de quoi ils \nvont parler. Le temps que vous évacuiez, \nles renforts débarqueront.\n", + /* 69*/ "Une cavalerie va venir me sauver... \nA qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef.\n", + /* 72*/ "Mine télécom. gâchée.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_g.c b/src/files/lang/jap-final/pete_str_g.c new file mode 100644 index 000000000..9ec3eabc8 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Befestigen Sie das Peilgerät an der Limousine!\n\nDie Limousine, die auf der Hauptstraße steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilgerät anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilgerät am Wagen, damit wir ihren Weg verfolgen können.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrüstung!\n", + /* 10*/ "Befestigen Sie das Peilgerät am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "Wählen Sie ein Objekt für das Ablenkungsmanöver!\n", + /* 13*/ "Sorgen Sie für ein Ablenkungsmanöver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstört.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich außer Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da läuft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verstärkung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegrüßt, Bürger.\n", + /* 38*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "Eine Fernzünder-Mine\n", + /* 42*/ "Fernzünder-Mine aufgenommen\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen\n", + /* 48*/ "Aufzugstür kann nicht wieder geöffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen\n", + /* 54*/ "Ablenkungsmanöver erfolgreich\n", + /* 55*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernzünder-Mine\n", + /* 59*/ "Fernzünder-Mine aufgenommen\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrüstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Türen eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt für Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelöscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanöver durchgeführt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung für dataDyne fungiert. Ich weiß, \ndass Cassandra de Vries anwesend sein wird. \nAber ich muss wissen, wer außerdem an dem \nTreffen teilnimmt und worüber gesprochen wird. \nWenn Sie das Gebäude verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glück!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernzünder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_i.c b/src/files/lang/jap-final/pete_str_i.c new file mode 100644 index 000000000..2e671c664 --- /dev/null +++ b/src/files/lang/jap-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale è arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisognerà agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus già scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne è riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "È pazza! È pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia è stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogramm.\n", + /* 52*/ "Riprogramm.\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui è stato possibile \nnascondere gli strumenti era il canale.\n", + /* 61*/ "Una di quelle porte bloccate può \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: è un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \nè l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia è stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sarà presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sarà e di che cosa si parlerà. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno già arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. È ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/pete_str_s.c b/src/files/lang/jap-final/pete_str_s.c new file mode 100644 index 000000000..451c3591f --- /dev/null +++ b/src/files/lang/jap-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal llegó poco antes que tú. Todos los intentos de rastrearla han sido inútiles, así que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que así podamos rastrear adónde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distracción\n", + /* 13*/ "Crear distracción móvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramación.\n", + /* 19*/ "Accediendo al sistema de navegación del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegación del taxi reprogramado.\n", + /* 22*/ "Conexión con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehículo crítico de la misión destruido.\n", + /* 26*/ "MISIÓN FALLADA\n", + /* 27*/ "MISIÓN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misión fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. ¡Tiene un arma!\n", + /* 31*/ "¡Hay un maníaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "¡Hey! ¿Qué haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obtén la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obtén el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' R.\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obtén el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distracción en marcha.\n", + /* 55*/ "Obtén la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El único lugar donde pudimos asegurar \nel equipo fue en un desagüe.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \núnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "¡Una distracción alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporación G5 es sólo una \ntapadera de dataDyne y que está también \nenvuelta en este complot. Sé que Cassandra \nDe Vries va a estar aquí, pero necesito \nsaber quién más va a venir y sobre qué \nvan a discutir. Una vez salgas, la ayuda \nque solicité estará esperando.\n", + /* 69*/ "¿Pero a qué ayuda te estás \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mantén la radio en silencio. \n¡Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjE.c b/src/files/lang/jap-final/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/jap-final/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjJ.c b/src/files/lang/jap-final/propobjJ.c new file mode 100644 index 000000000..e9d4191f5 --- /dev/null +++ b/src/files/lang/jap-final/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 1*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 2*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 3*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 4*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 5*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 6*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 7*/ "%s¸‚ÝÏ‚öãÉ\n", + /* 8*/ "†€ø€…", + /* 9*/ "€Š…¤€‹", + /* 10*/ "€Õ‚„€ã€÷€Ê‚", + /* 11*/ "€î€þ€ä€ð‚àÒ…¤", + /* 12*/ "†Ü„™Ò…¤", + /* 13*/ "‚Ýá¶¼…¤", + /* 14*/ "€ €ö€Ï€à€ËÒ…¤", + /* 15*/ "€ú€Ø€Ê€ã…¤", + /* 16*/ "€í‚„€ï€Ï€þ€ú€Ø€Ê€ã", + /* 17*/ "€÷€ò‚„€ã…£…¤", + /* 18*/ "€Ý€Ï€Ú‚„…£…¤", + /* 19*/ "ƒ“„ù…£…¤", + /* 20*/ "€Ù€Ï‹€Ê€ã€ä€Ñ€ë", + /* 21*/ "€Ù€Ï‹€Ê€ã€ä€Ñ€ë", + /* 22*/ "†‚„€á", + /* 23*/ "€§€ð", + /* 24*/ "‡‹†©‡Œ", + /* 25*/ "“€Ï…£…¤", + /* 26*/ "€Õ‹€Ï…£…¤", + /* 27*/ "€ë€ù€Ð‚„", + /* 28*/ "‘€ã€Ï", + /* 29*/ "†€Ñ€ä€î€Ñ€ã", + /* 30*/ "€Ü€â€Æ€Ê€×", + /* 31*/ "€Ü€â€Æ€Ê€×", + /* 32*/ "‚ȃ¤„½", + /* 33*/ "€î€Ñ€×€ú€Õ€ñ€ö", + /* 34*/ "€‚„€ø‰€Ï€Ð€Ñ€…€Ö‚„", + /* 35*/ "€ë€ö€Ê€þ", + /* 36*/ "’€ö€Ü€à€Ê€×…£…¤", + /* 37*/ "€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 38*/ "€Û‚„€øŠ¸‚ÝÏ‚öãÉ\n", + /* 39*/ "€Û‚„€øŠ\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "ÃÒŠ€ÐÓ€ú€Ê€×ÄãÌ»ØÆ\n", + /* 42*/ "‡", + /* 43*/ "€Ô‚„", + /* 44*/ "€÷‚„‚„Ò…¤", + /* 45*/ "€Ü€Ñ€×€ú‚„€×", + /* 46*/ "‚„€Ü€ã‘€ø", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "‡", + /* 66*/ "€Ô‚„", + /* 67*/ "€÷‚„‚„Ò…¤", + /* 68*/ "€Ü€Ñ€×€ú‚„€×", + /* 69*/ "‚„€Ü€ã‘€ø", + /* 70*/ "€Š…¤€‹", + /* 71*/ "€Õ‚„€ã€÷€Ê‚", + /* 72*/ "€î€þ€ä€ð‚àÒ…¤", + /* 73*/ "†Ü„™Ò…¤", + /* 74*/ "‚Ýá¶¼…¤", + /* 75*/ "€ €ö€Ï€à€ËÒ…¤", + /* 76*/ "€ú€Ø€Ê€ã…¤", + /* 77*/ "€í‚„€ï€Ï€þ€ú€Ø€Ê€ã", + /* 78*/ "€÷€ò‚„€ã…£…¤", + /* 79*/ "€Ý€Ï€Ú‚„…£…¤", + /* 80*/ "ƒ“„ù…£…¤", + /* 81*/ "†‚„€á", + /* 82*/ "€§€ð", + /* 83*/ "‡‹†©‡Œ", + /* 84*/ "€ë€ö€Ê€þ", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobjP.c b/src/files/lang/jap-final/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/jap-final/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_f.c b/src/files/lang/jap-final/propobj_str_f.c new file mode 100644 index 000000000..504f77ac0 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette tête cher.", + /* 17*/ "Mine télécom.", + /* 18*/ "Mine prox.", + /* 19*/ "Mine retard.", + /* 20*/ "Couteau combat", + /* 21*/ "Couteaux combat", + /* 22*/ "Fléchette", + /* 23*/ "Bombe-N", + /* 24*/ "Sédatif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fusée", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "bâton ", + /* 31*/ "bâtons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Clé GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Clé obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "Elément obtenu.\n", + /* 41*/ "Cette porte est fermée.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munit. Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munit. Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles Magnum", + /* 73*/ "Balles en or", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes tête cher.", + /* 78*/ "Mines télécom.", + /* 79*/ "Mines prox.", + /* 80*/ "Mines retard.", + /* 81*/ "Fléchettes", + /* 82*/ "Bombes-N", + /* 83*/ "Sédatifs", + /* 84*/ "jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_g.c b/src/files/lang/jap-final/propobj_str_g.c new file mode 100644 index 000000000..bce046735 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen\n", + /* 1*/ "%s aufgenommen\n", + /* 2*/ "%s aufgenommen\n", + /* 3*/ "%s aufgenommen\n", + /* 4*/ "%s aufgenommen\n", + /* 5*/ "%s aufgenommen\n", + /* 6*/ "%s aufgenommen\n", + /* 7*/ "%s aufgenommen\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernzünder-Mine", + /* 18*/ "Annäherungs-Mine", + /* 19*/ "Zeitzünder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Betäubungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "Dynamit-", + /* 30*/ "Stab ", + /* 31*/ "Stäbe ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlüssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlüssel aufgenommen\n", + /* 38*/ "Schild aufgenommen\n", + /* 39*/ "Ein Schild\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tür ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "Stärkungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "Stärkungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "Goldkugeln", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Fernzünder-Minen", + /* 79*/ "Annäherungs-Minen", + /* 80*/ "Zeitzünder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Betäubungsgeschosse", + /* 84*/ "Jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_i.c b/src/files/lang/jap-final/propobj_str_i.c new file mode 100644 index 000000000..91b90bb2b --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s\n", + /* 1*/ "Presa %s\n", + /* 2*/ "Presa %s\n", + /* 3*/ "Preso %s\n", + /* 4*/ "Presi %s\n", + /* 5*/ "Prese %s\n", + /* 6*/ "Prese %s\n", + /* 7*/ "Prese %s\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimità", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "carica ", + /* 31*/ "cariche ", + /* 32*/ "cimice", + /* 33*/ "microcamera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chiave.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta è chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Presi ", + /* 51*/ "delle ", + /* 52*/ "Prese ", + /* 53*/ "", + /* 54*/ "Prese ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "pallottole d'oro", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimità", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "gettoni", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/propobj_str_s.c b/src/files/lang/jap-final/propobj_str_s.c new file mode 100644 index 000000000..a197bb941 --- /dev/null +++ b/src/files/lang/jap-final/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "munición", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitón", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microcámara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Plástico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta está cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "munición Segadora", + /* 45*/ "disp. de ocultación", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "Munición Segadora", + /* 68*/ "disp. de ocultación", + /* 69*/ "reforzadores", + /* 70*/ "Munición", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "balas doradas", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/refE.c b/src/files/lang/jap-final/refE.c similarity index 100% rename from src/files/lang/refE.c rename to src/files/lang/jap-final/refE.c diff --git a/src/files/lang/refJ.c b/src/files/lang/jap-final/refJ.c similarity index 100% rename from src/files/lang/refJ.c rename to src/files/lang/jap-final/refJ.c diff --git a/src/files/lang/refP.c b/src/files/lang/jap-final/refP.c similarity index 100% rename from src/files/lang/refP.c rename to src/files/lang/jap-final/refP.c diff --git a/src/files/lang/ref_str_f.c b/src/files/lang/jap-final/ref_str_f.c similarity index 100% rename from src/files/lang/ref_str_f.c rename to src/files/lang/jap-final/ref_str_f.c diff --git a/src/files/lang/ref_str_g.c b/src/files/lang/jap-final/ref_str_g.c similarity index 100% rename from src/files/lang/ref_str_g.c rename to src/files/lang/jap-final/ref_str_g.c diff --git a/src/files/lang/ref_str_i.c b/src/files/lang/jap-final/ref_str_i.c similarity index 100% rename from src/files/lang/ref_str_i.c rename to src/files/lang/jap-final/ref_str_i.c diff --git a/src/files/lang/ref_str_s.c b/src/files/lang/jap-final/ref_str_s.c similarity index 100% rename from src/files/lang/ref_str_s.c rename to src/files/lang/jap-final/ref_str_s.c diff --git a/src/files/lang/ritE.c b/src/files/lang/jap-final/ritE.c similarity index 100% rename from src/files/lang/ritE.c rename to src/files/lang/jap-final/ritE.c diff --git a/src/files/lang/jap-final/ritJ.c b/src/files/lang/jap-final/ritJ.c new file mode 100644 index 000000000..a94817a18 --- /dev/null +++ b/src/files/lang/jap-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nƒÆƒÇƒÈ¸„ê„ëÅß¼ÍÆâ€ã€ù€Ï€ãÒ‚ðƒœÓ‚æÏ‚ÄÀ‚ŸÅÌ»â€Â€ã€ù€Ï€ãßႯσƃǃȸ„ãゟÇâ¿ô¼¿ó€‚ä‚…Òƒ•ƒ Ò‚üƒë惽شÌÁâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ“‚ýÓλ€Í€Ð€Ï€ä€Â€ã€ù€Ï€ãÒ‚ðƒœ¸‚±‚²ÆâÉÛÏ€‚§ÓƒÁ‚ÚƒÂ¿àƒÆƒÇƒÈ¸„ãゟÄÎÁÌÓÎàλ€ÂÈÒÉÛÏÓ€ƒÆƒÇƒÈÏ€ã€ù€Ï€ãÒ‚‡ƒ¤¸‚¹ƒ¤ÄÇ⃇ƒƒæºâ€Â‚Ý„¿ƒ°‚•ÀƒŠ¿à‡ŽÒ„è„郰¸‚ÒƒÕÅÌ€ƒÆƒÇƒÈσå…Ñ‚ÉÇâÒð€Â\n\n|‚µ‚¶€‘€¾‚ÍƒŽ„»¸‚ÒƒÕÇß\n\nƒÁ‚ÚƒÂÒ„ø‚Ϻâ‚Ý„¿ƒ°‚•ÀƒŠó€‚§Ò‚ÍƒŽ„»¸‚ÒƒÕÆâÒð€ÂƒÆƒÇƒÈÒ‚‰ƒŽ‚“Ó€ã€ù€Ï€ãÍÓ‚„°Î»ÉÛ€‚àó‚×´ÉáÅλ߼ƒµ¸ËÂâÒð€Â\n\n|‚µ‚¶€’€¾ƒÆƒÇƒÈ¸‚È‚ÉÇß\n\nƒÆƒÇƒÈһ₅ßÒ… ‚¹ÎƒŠƒçÓ忴̻λ€Â‚È‚ÉÅÉà€‚§æË¿¹ð„è„鸃ƃǃÈÏ‚ÉÇâÒð€Âƒ‡í€ã€ù€Ï€ãßႯÏÈÃÏÉôáƒóÁß¼ÏÅÌÁã€ÂÄÜÎÁõ€€ó€áÓ‚©†«ÉÁÙÏ€ƒÆƒÇƒÈ¸‡Û‚ÁÜ¼ÍÆâóºä¼€Â\n\n|‚µ‚¶€“€¾ƒÆƒÇƒÈ¸‚ž‚Ÿ”€ÊШ󇑂Ž\n\nƒÁ‚ÚƒÂÒ„ø‚ϺↃ‚ž‚Ÿƒˆ”€ÊŠØóƒÆƒÇƒÈ¸‡‘‚ŽÇ߀ÂÈÒ‚ý€ƒÆƒÇƒÈÒƒÓƒ…ÏÓ…¯„†Ò„®ƒ´¸Óà¼Òð€Â\n\n|‚µ‚¶€”€¾ƒÆƒÇƒÈ„¹ƒˆƒÂÒƒÓƒ…¸‚¹‚º\n\n€ã€ù€Ï€ãÒ‚ðƒœÒ‡…¯ÓË¿Û̻λ怀é€Ñ‚€Ë€Ê€×¸ÅÌÁâ‚¡‚¢ƒß܃޻̈́ƅ§Äãâ€Â€Ù€×‘€Ê€ãςڴ̂À‚¶‚“ÒƒÓƒ…¸‚¹‚ÇÇ߀‚­ƒšÒ„ƒÙÍÎ´ÉƒŠ„ÎÓ€€Ô‚„€ã€Ñ€ú€Ê€ã¸‚Ã‚ÄÆâÒð€Â\n\n|‚µ‚¶€•€¾‚—ÒƒÁ‚ڃ¸„–á„ÌÇ\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÍ‚—҃¸Ëλó»â„ã†Ù€à€Ì‚„¸„–á„Ìǀ‚­Ü‚Ý´ƒ›áƒŒ»‚Ô„ÏÓ€„ã†Ù‚ƒ˜ÈÒÜÒ¸…£…¤ó‚Î‚ÏÆâÃÍð€Â\n\nEND\n", + /* 1*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂ\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nƒÆƒÇƒÈ¸„ê„ëÅß¼ÍÆâ€ã€ù€Ï€ãÒ‚ðƒœÓ‚æÏ‚ÄÀ‚ŸÅÌ»â€Â€ã€ù€Ï€ãßႯσƃǃȸ„ãゟÇâ¿ô¼¿ó€‚ä‚…Òƒ•ƒ Ò‚üƒë惽شÌÁâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ“‚ýÓλ€Í€Ð€Ï€ä€Â€ã€ù€Ï€ãÒ‚ðƒœ¸‚±‚²ÆâÉÛÏ€‚§ÓƒÁ‚ÚƒÂ¿àƒÆƒÇƒÈ¸„ãゟÄÎÁÌÓÎàλ€ÂÈÒÉÛÏÓ€ƒÆƒÇƒÈÏ€ã€ù€Ï€ãÒ‚‡ƒ¤¸‚¹ƒ¤ÄÇ⃇ƒƒæºâ€Â‚Ý„¿ƒ°‚•ÀƒŠ¿à‡ŽÒ„è„郰¸‚ÒƒÕÅÌ€ƒÆƒÇƒÈσå…Ñ‚ÉÇâÒð€Â\n\n|‚µ‚¶€‘€¾‚ÍƒŽ„»¸‚ÒƒÕÇß\n\nƒÁ‚ÚƒÂÒ„ø‚Ϻâ‚Ý„¿ƒ°‚•ÀƒŠó€‚§Ò‚ÍƒŽ„»¸‚ÒƒÕÆâÒð€ÂƒÆƒÇƒÈÒ‚‰ƒŽ‚“Ó€ã€ù€Ï€ãÍÓ‚„°Î»ÉÛ€‚àó‚×´ÉáÅλ߼ƒµ¸ËÂâÒð€Â\n\n|‚µ‚¶€’€¾ƒÆƒÇƒÈ¸‚È‚ÉÇß\n\nƒÆƒÇƒÈһ₅ßÒ… ‚¹ÎƒŠƒçÓ忴̻λ€Â‚È‚ÉÅÉà€‚§æË¿¹ð„è„鸃ƃǃÈÏ‚ÉÇâÒð€Âƒ‡í€ã€ù€Ï€ãßႯÏÈÃÏÉôáƒóÁß¼ÏÅÌÁã€ÂÄÜÎÁõ€€ó€áÓ‚©†«ÉÁÙÏ€ƒÆƒÇƒÈ¸‡Û‚ÁÜ¼ÍÆâóºä¼€Â\n\n|‚µ‚¶€“€¾ƒÆƒÇƒÈ¸‚ž‚Ÿ”€ÊШ󇑂Ž\n\nƒÁ‚ÚƒÂÒ„ø‚ϺↃ‚ž‚Ÿƒˆ”€ÊŠØóƒÆƒÇƒÈ¸‡‘‚ŽÇ߀ÂÈÒ‚ý€ƒÆƒÇƒÈÒƒÓƒ…ÏÓ…¯„†Ò„®ƒ´¸Óà¼Òð€Â\n\n|‚µ‚¶€”€¾‚—ÒƒÁ‚ڃ¸„–á„ÌÇ\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÍ‚—҃¸Ëλó»â„ã†Ù€à€Ì‚„¸„–á„Ìǀ‚­Ü‚Ý´ƒ›áƒŒ»‚Ô„ÏÓ€„ã†Ù‚ƒ˜ÈÒÜÒ¸…£…¤ó‚Î‚ÏÆâÃÍð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\nƒÆƒÇƒÈ¸„ê„ëÅß¼ÍÆâ€ã€ù€Ï€ãÒ‚ðƒœÓ‚æÏ‚ÄÀ‚ŸÅÌ»â€Â€ã€ù€Ï€ãßႯσƃǃȸ„ãゟÇâ¿ô¼¿ó€‚ä‚…Òƒ•ƒ Ò‚üƒë惽شÌÁâ€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\nƒ“‚ýÓλ€Í€Ð€Ï€ä€Â€ã€ù€Ï€ãÒ‚ðƒœ¸‚±‚²ÆâÉÛÏ€‚§ÓƒÁ‚ÚƒÂ¿àƒÆƒÇƒÈ¸„ãゟÄÎÁÌÓÎàλ€ÂÈÒÉÛÏÓ€ƒÆƒÇƒÈÏ€ã€ù€Ï€ãÒ‚‡ƒ¤¸‚¹ƒ¤ÄÇ⃇ƒƒæºâ€ÂÈã¿à€ƒÆƒÇƒÈÒ‚‰ƒŽ‚“Ó€ã€ù€Ï€ãÍÓ‚„°ƒ¼»Òó€‚àó‚×´ÉáÅλ߼ƒµ¸ËÂâÒð€Â\n\n|‚µ‚¶€‘€¾ƒÆƒÇƒÈ¸‚È‚ÉÇß\n\nƒÆƒÇƒÈһ₅ßÒ… ‚¹ÎƒŠƒçÓ忴̻λ€Â‚È‚ÉÅÉà€‚§æË¿¹ð„è„鸃ƃǃÈÏ‚ÉÇâÒð€Âƒ‡í€ã€ù€Ï€ãßႯÏÈÃÏÉôáƒóÁß¼ÏÅÌÁã€ÂÄÜÎÁõ€€ó€áÓ‚©†«ÉÁÙÏ€ƒÆƒÇƒÈ¸‡Û‚ÁÜ¼ÍÆâóºä¼€Â\n\n|‚µ‚¶€’€¾ƒÆƒÇƒÈ¸‚ž‚Ÿ”€ÊШ󇑂Ž\n\nƒÁ‚ÚƒÂÒ„ø‚ϺↃ‚ž‚Ÿƒˆ”€ÊŠØóƒÆƒÇƒÈ¸‡‘‚ŽÇ߀ÂÈÒ‚ý€ƒÆƒÇƒÈÒƒÓƒ…ÏÓ…¯„†Ò„®ƒ´¸Óà¼Òð€Â\n\n|‚µ‚¶€“€¾‚—ÒƒÁ‚ڃ¸„–á„ÌÇ\n\nƒÆƒÇƒÈ„¹ƒˆƒÂÍ‚—҃¸Ëλó»â„ã†Ù€à€Ì‚„¸„–á„Ìǀ‚­Ü‚Ý´ƒ›áƒŒ»‚Ô„ÏÓ€„ã†Ù‚ƒ˜ÈÒÜÒ¸…£…¤ó‚Î‚ÏÆâÃÍð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "‚ÍƒŽ„»¸‚ÒƒÕÇß\n", + /* 6*/ "ƒÆƒÇƒÈ¸‚È‚ÉÇß\n", + /* 7*/ "ƒÆƒÇƒÈ¸‚ž‚Ÿ”€ÊШ󇑂Ž\n", + /* 8*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂÒƒÓƒ…¸‚¹‚º\n", + /* 9*/ "‚—ÒƒÁ‚ڃ¸„–á„ÌÇ\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /* 13*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü\n", + /* 14*/ "€Ð€ß€Ê€Û€Ì€Ø‚„€Ü¸‚ÝÏ‚öãÉ\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "€×€ú€Ü€Ò\n", + /* 18*/ "€×€ú€Ü€Ò\n", + /* 19*/ "€×€ú€Ü€Ò¸‚ÝÏ‚öãÉ\n", + /* 20*/ "‚ƒüÒ„±ÉÊæ„ÜÁ€ý€Ý€ÑÏδÉ\n", + /* 21*/ "€®€Ÿ€¨Ò…Ñ‚¾‚ƒ˜æ‚΂ÏÄãÉ\n", + /* 22*/ "€®€Ÿ€¨¸„–á„ÌÆÃÍæóÀØÇ¹\n", + /* 23*/ "€Ô‚„€ã€Ñ€ú€Ê€ã‚ÂÄ\n", + /* 24*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂæƒÓ„ǃÁ‚ÚÏ‚ö´É\n", + /* 25*/ "€Ô‚„€ã€Ñ€ú€Ê€ã€…€Û€Ü€â€ðæ‚΂ÏÄãÉ\n", + /* 26*/ "ƒÆƒÇƒÈæ‚ÙÄãÉ\n", + /* 27*/ "€Ñ€ú€Ê€ãæ‚ÙÄãÉ\n\n", + /* 28*/ "€Ñ€ú€Ê€ã您ƒËÄãÉ\n", + /* 29*/ "ƒÆƒÇƒÈ„¹ƒˆƒÂӂ߃ÅÅß¼ÍÅÌ»â\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "€÷€ò‚„€ã…£…¤\n", + /* 33*/ "€÷€ò‚„€ã…£…¤\n", + /* 34*/ "€÷€ò‚„€ã…£…¤¸‚ÝÏ‚öãÉ\n", + /* 35*/ "‚§ÓÃÃ󂪸ÅÌ»âÒðÑ€¾‚÷Ĺ€Â\n", + /* 36*/ "€ü‚„Š€î€Ï€€ü‚„Š€î€Ï€´\n", + /* 37*/ "ƒÆƒÇƒÈ€ÃÃÓƒôƒõóƀ€ã€ù€Ï€ãæ\nºÎɸ„ê„ëÅß¼ÍÅÌ»âÒóÆß€´\n", + /* 38*/ "‚ƒ‚‹ƒ•ÒÓ‚ªð€´\n", + /* 39*/ "ƒ”悞‚Ÿ”€ÊШ󇑂ŽÅØÆ€Â\n˻̃̇ÌÄ»€Â\n", + /* 40*/ "„è„é܃¼Á†˜„±Ó‚õ‚ÈóÀλ߀Â\n‚ª¿„è„éÓ‚Õ´Ì»âÒ¿Ñ€À\n", + /* 41*/ "ÃãÓ€ã€ù€Ï€ãÍÈÒ‚ƒ„³æ€\n€Û€Õ€ó‚ڴɀ€â€Æ€Ï€þÒ…•…–óÆ€Â\n", + /* 42*/ "‚ªÍ»¼ÃÍð€Ž€ßÅ€„ƒÙÓ‚ô‚†ÅÉ€Â\nô¼Æãõ»»Ò¿Ñ€À\n", + /* 43*/ "¾»€ÃÃÓ€Ž\n", + /* 44*/ "„Ñ‚öƒîð€´\n", + /* 45*/ "‚ƒ‚‹ô¼Ý´ÌÃÒƒÁ‚ÚƒÂÏ‚Àáùð¹ð€´\n", + /* 46*/ "倇ŽÒ„è„é„»¸‚ÒƒÕÅÎÁʵрŽ\n", + /* 47*/ "‚€Í€Ð€Ï€ä€ƒÆƒÇƒÈÓÈÒ€ë€ú€Ð‚„ð€Â\n", + /* 48*/ "†¦ƒ¹„ƒÙð€Ž€€Ù€×‘€Ê€ã¸„‚øÌÙÌÁ〴\n", + /* 49*/ "…£…¤ÎàÃÒ€®€Ÿ€¨¸„–á„ÌÇâ¿ÜÑ€Â\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "€ÐŠ€ù€ä€÷€Ï€…‘€ø\n", + /* 53*/ "€ÐŠ€ù€ä€÷€Ï€…‘€ø\n", + /* 54*/ "€ÐŠ€ù€ä€÷€Ï€…‘€ø¸‚ÝÏ‚öãÉ\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "€Õ‚„Š€Ö‚„\n", + /* 58*/ "€Õ‚„Š€Ö‚„\n", + /* 59*/ "€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 60*/ "€Õ‚„€€÷€ë€ãæ‡Ì…éÅÉ\n", + /* 61*/ "€Õ‚„€€÷€ë€ãæ‡Ë†¤ÅÉ\n", + /* 62*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 63*/ "€Ð€×€Ý€Ü„Ú„Û€€Õ‚„Š€Ö‚„惇ƒƒóÆ\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "€÷€ë€ãÒ€Õ‚„Š€Ö‚„\n", + /* 67*/ "€÷€ë€ãÒ€Õ‚„Š€Ö‚„\n", + /* 68*/ "€÷€ë€ãÒ€Õ‚„Š€Ö‚„¸‚ÝÏ‚öãÉ\n", + /* 69*/ "ƒ“„ù…£…¤æ€ð†Ï‚ùåãÌÅØ´É\n", + /* 70*/ "€é€Ê€é€Ê€é€Ê€é€´\n", + /* 71*/ "ƒ•݂۸‚¨‚ŸÎôóÀâÜÒ¿€´\n", + /* 72*/ "ƒÆƒÇƒÈæ‚í‚×Äã̻‴\n", + /* 73*/ "ƒÆƒÇƒÈ€‡ŽÒ‡“Ò¾ƒ–„Ó€À\n", + /* 74*/ "€ã€ù€Ï€ã€€‡€è‚„€ˆð€Â\n“€ö‚€Ê€×€’Ó„Ò‚ýÏÓ‚úÅ‚ŸÄ¹€´\npį€ÃÒƒŸÓ†³åáð€Â\n", + /* 75*/ "ſŀÃãÓ€à€Ë€Ï€ÜóÆß€Â\nƒ¶ƒ·ÒƒüƒŠ¸‚ƒ‡‚φ—Å€Ž\n", + /* 76*/ "ÅËûã€ù€Ï€ã€´\n€è‚„Í‚©´É¿àÏӀ肄ÎÒð€´\np¾ƒÓÃÒêä‚Êðï€Â\n»»¿€´€ÃÒ‡“€€’ƒ¬ÍƒŸÓƒþ¿¹€Â\npÃãæ¾ƒÒ‚­ƒ Ò€à€Ë€Ï€Üð€Â\n", + /* 77*/ "¿ÅÃØáØÅÉ€ƒÆƒÇƒÈ€Â\n", + /* 78*/ "€Ô€ùÒ‚­ƒ Ò€à€Ë€Ï€ÜðÍ€À\n‹€ÕÛ€€Ö€Ú€îÒð\n", + /* 79*/ "€Ó€øŒ€Ü€€Ó€øŒ€Ü€´€€®€Ÿ€¨¸\n„–á„ÌÇλ倴€Î¹Í¿ÅÌ€´\n", + /* 80*/ "€¨€¤€‚€Í€Ð€Ï€ä€Â€‚ÉÌÌÑ€´\n", + /* 81*/ "€Ð€ù€ù€À\n", + /* 82*/ "‚ª¸‚ÉÌáµ»»Ò߀À\nÄ´Ä͂״Ì߀´\n", + /* 83*/ "¼‚„¹€…Ô‚Ôλ€Ž\n‚ª¿Ï˿شÌÌ€´\n", + /* 84*/ "€Ñ€ú€Ê€ãӃӄǃÁ‚Ú¸ƒ›á‚ãÅÉ€Â\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/ritP.c b/src/files/lang/jap-final/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/jap-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_f.c b/src/files/lang/jap-final/rit_str_f.c new file mode 100644 index 000000000..fee1613b8 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité du Président est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Sécurisez le plan de vol de Air Force One\n\nLes détails du plan de Trent sont encore inconnus, mais nous pensons que l'équipage de l'avion sera en danger. Vous devrez accéder à la cabine de pilotage pour découvrir ce qu'il prépare. Si la situation échappe à votre contrôle, activez l'auto-pilote.\n\n|Objectif 5: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité du Président est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 2: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et récupérer équipement\n", + /* 6*/ "Localiser Président\n", + /* 7*/ "Placer Président dans capsule\n", + /* 8*/ "Sécuriser plan de vol de Air Force One\n", + /* 9*/ "Détacher OVNI de Air Force One\n", + /* 10*/ "Obtenir mallette.\n", + /* 11*/ "\n", + /* 12*/ "Mallette\n", + /* 13*/ "Mallette\n", + /* 14*/ "Mallette obtenue.\n", + /* 15*/ "Obtenir Arbalète.\n", + /* 16*/ "\n", + /* 17*/ "Arbalète\n", + /* 18*/ "Arbalète\n", + /* 19*/ "Arbalète obtenue.\n", + /* 20*/ "Trop de victimes neutres.\n", + /* 21*/ "Connexion à l'OVNI détruite.\n", + /* 22*/ "Impossible de détruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclenché.\n", + /* 24*/ "Air Force One stabilisé.\n", + /* 25*/ "Système Auto-pilote détruit.\n", + /* 26*/ "Le Président est K.O.\n", + /* 27*/ "Pilotes tués.\n", + /* 28*/ "Pilotes sauvés.\n", + /* 29*/ "Air Force One va s'écraser.\n", + /* 30*/ "Obtenir mine télécom.\n", + /* 31*/ "\n", + /* 32*/ "Mine télécom.\n", + /* 33*/ "Mine télécom.\n", + /* 34*/ "Mine télécom. obtenue.\n", + /* 35*/ "Qui êtes-vous, jeune fille?\n", + /* 36*/ "Securité, SECURITE!!\n", + /* 37*/ "Mr. le Président, vous êtes en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Mais? Que se passe-t-il?!\n", + /* 39*/ "Vous devez gagner sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont très graves.\n", + /* 41*/ "Voici l'enregistrement de la réunion entre \nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois. \nQue fait-on maintenant?\n", + /* 43*/ "Hé, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter à bord?\n", + /* 46*/ "Bon, récupérons les preuves.\n", + /* 47*/ "Le bureau du Président est dans \nle secteur, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez à la cabine de pilotage! \n", + /* 49*/ "Peut-être une mine pourrait détruire la connexion à l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adrénaline\n", + /* 53*/ "Pilule d'adrénaline\n", + /* 54*/ "Pilule d'adrénaline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baissée.\n", + /* 61*/ "Soute levée.\n", + /* 62*/ "Objet crucial détruit.\n", + /* 63*/ "Accès refusé - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Président est attaqué.\n", + /* 73*/ "Avez-vous réfléchi à la proposition que je vous ai présentée, monsieur?\n", + /* 74*/ "Ma réponse est toujours la même: désolé Trent, c'est non. Je ne confierai pas le Pelagic II à la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Amérique a foi en son industrie et que vous êtes prêt à les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre dernière chance. Je ne reviendrai pas sur ma décision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma dernière chance? Ha! Pauvre fou. C'était plutôt la tienne, crétin!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas à détacher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, ça va secouer!\n", + /* 84*/ "Les pilotes ont stabilisé Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_g.c b/src/files/lang/jap-final/rit_str_g.c new file mode 100644 index 000000000..0f8ffdee8 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen über Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in höchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall müssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|3. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrüstung!\n", + /* 6*/ "Finden Sie den Präsidenten!\n", + /* 7*/ "Bringen Sie den Präsidenten zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lösen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstört.\n", + /* 22*/ "Verankerung kann nicht gelöst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstört.\n", + /* 26*/ "Der Präsident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustürzen.\n", + /* 30*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernzünder-Mine\n", + /* 33*/ "Fernzünder-Mine\n", + /* 34*/ "Fernzünder-Mine aufgenommen\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hölle, war das?\n", + /* 39*/ "Rasch! Wir müssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie können solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwörern.\n", + /* 42*/ "Das ist mehr als überzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Büro des Präsidenten befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie müssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelöst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlüsselkarte\n", + /* 58*/ "Schlüsselkarte\n", + /* 59*/ "Schlüsselkarte aufgenommen\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstört.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen\n", + /* 69*/ "Die Zeitzünder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Präsident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals über meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unverändert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Können wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das wäre die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht ändern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschläge erteilt. Hören Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wünschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lösen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhören und schießen?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_i.c b/src/files/lang/jap-final/rit_str_i.c new file mode 100644 index 000000000..7bb65c525 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se è accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Porta il Presidente alla capsula\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One è stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente è stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina distanza\n", + /* 33*/ "Mina distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei è in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Cosa diavolo è stato?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non può mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa è una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non è...\n", + /* 44*/ "È un intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "È ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente è su \nquesto piano, Joanna!\n", + /* 48*/ "C'è qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si può staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria è stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi più salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha più pensato alla proposta che le ho fatto, signore?\n", + /* 74*/ "La mia risposta è sempre la stessa, Trent! No, mi dispiace! Non metterò il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa è un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed è NO! Non mi farà cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si può proprio dire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa è la sua ultima possibilità, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilità? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/rit_str_s.c b/src/files/lang/jap-final/rit_str_s.c new file mode 100644 index 000000000..cd2cba581 --- /dev/null +++ b/src/files/lang/jap-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deberás sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles específicos del plan de Trent, pero se cree que la tripulación está en peligro. Llega hasta la cabina y asegúrate de su bienestar. Si ocurre lo peor, activa el piloto automático.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la cápsula\n", + /* 8*/ "Asegurar trayectoría del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obtén la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexión del OVNI dañado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Automático ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Automático ha sido destruido.\n", + /* 26*/ "El Presidente ha sido eliminado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One está a punto de estrellarse.\n", + /* 30*/ "Obtén la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "¿Quién es usted, jovencita?\n", + /* 36*/ "¡¡Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, está usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "¡Qué demonios es eso!\n", + /* 39*/ "Debemos llevarle a la cápsula de escape. \nSígame.\n", + /* 40*/ "No puede hacer acusaciones como ésa sin evidencias.\n ¿Asumo que tendrá alguna?\n", + /* 41*/ "Ésta es una grabación de una reunión entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \n¿Qué hacemos ahora?\n", + /* 43*/ "Hey, tú no eres...\n", + /* 44*/ "Es una intrusa...\n", + /* 45*/ "¿Cómo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitación del Presidente está en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... ¡Debes llegar a la cabina!\n", + /* 49*/ "Quizá una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magnética\n", + /* 58*/ "Llave magnética \n", + /* 59*/ "Llave magnética obtenida.\n", + /* 60*/ "La bahía de carga ha sido bajada.\n", + /* 61*/ "La bahía de carga ha sido subida.\n", + /* 62*/ "Objeto crítico de la misión destruido.\n", + /* 63*/ "Acceso denegado: llave magnética del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave ascensor\n", + /* 67*/ "Llave magnética del ascensor \n", + /* 68*/ "Llave magnética del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podrás salvarle.\n", + /* 72*/ "Están atacando al Presidente.\n", + /* 73*/ "¿Ha reconsiderado algo más la propuesta que le hice, señor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ¿podemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero ésta es una oportunidad de oro para demostrar que América tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "¡Maldición! ¡He dicho no y significa no! ¡No pienso cambiar de opinión! Necesito que mis asesores sean imparciales, y ahora no me estás dando la imparcialidad que necesito. Déjalo, y no hablemos más de ello. Es tu última oportunidad.\n", + /* 77*/ "Como quiera, señor.\n", + /* 78*/ "¿Mi última oportunidad? ¡Ja! Idiota. Fue la tuya...\n", + /* 79*/ "¡Elvis! ¡Elvis! ¡No puedo soltar ese tubo del fuselaje! ¿Puedes hacerlo tú?\n", + /* 80*/ "Pan comido, Joanna. ¡Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "¿Mirar, qué? ¿Quieres dejar de juguetear? ¡Dispara!\n", + /* 83*/ "No hay más opciones... ¡Joanna, prepárate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/runE.c b/src/files/lang/jap-final/runE.c similarity index 100% rename from src/files/lang/runE.c rename to src/files/lang/jap-final/runE.c diff --git a/src/files/lang/runJ.c b/src/files/lang/jap-final/runJ.c similarity index 100% rename from src/files/lang/runJ.c rename to src/files/lang/jap-final/runJ.c diff --git a/src/files/lang/runP.c b/src/files/lang/jap-final/runP.c similarity index 100% rename from src/files/lang/runP.c rename to src/files/lang/jap-final/runP.c diff --git a/src/files/lang/run_str_f.c b/src/files/lang/jap-final/run_str_f.c similarity index 100% rename from src/files/lang/run_str_f.c rename to src/files/lang/jap-final/run_str_f.c diff --git a/src/files/lang/run_str_g.c b/src/files/lang/jap-final/run_str_g.c similarity index 100% rename from src/files/lang/run_str_g.c rename to src/files/lang/jap-final/run_str_g.c diff --git a/src/files/lang/run_str_i.c b/src/files/lang/jap-final/run_str_i.c similarity index 100% rename from src/files/lang/run_str_i.c rename to src/files/lang/jap-final/run_str_i.c diff --git a/src/files/lang/run_str_s.c b/src/files/lang/jap-final/run_str_s.c similarity index 100% rename from src/files/lang/run_str_s.c rename to src/files/lang/jap-final/run_str_s.c diff --git a/src/files/lang/sevE.c b/src/files/lang/jap-final/sevE.c similarity index 100% rename from src/files/lang/sevE.c rename to src/files/lang/jap-final/sevE.c diff --git a/src/files/lang/jap-final/sevJ.c b/src/files/lang/jap-final/sevJ.c new file mode 100644 index 000000000..427930956 --- /dev/null +++ b/src/files/lang/jap-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€¬€¨€¬ƒ¤ƒÚ¸‚Åɀ€î€Ñ€Ð€ÏÒ†ê†ëƒùXD-310372ƒÚ怺⇔†øó‚׃ÌÄãÉÍÒÃÍð€Â’€ú€â€×€ß‚„€‘€ƒ€Ó€ø€ë€Å€Ñ€Ü€…€î€Ï€ü€÷‚„€„æ„’‚ƒÒƒ¨„Öƒîð€Â‡”†øÒƒØ†Î€¾€ö€è€Ñ€Ðƒß€Ž€›’€ö€Ü€‡•ƒëƒß€Ž€›€„“…ìƒß€Ž€œ€Â…¹´Ì»â€î€Ñ€Ð€ÏÍÈÒ€â€×€è€ú‚‚„¸†¢ƒ˜Å€‚—Ò„ÿ…€¸„«„¬Ç߀Â\n\n|‚µ‚¶€‘€¾‚—Ò† …†…„ƒ§¸„«„¬Çß\n\n€ï‚„æ€ü‚„ŠÆâÓíð´É‚˜†äÒ€î€Ñ€Ð€ÏƒÆ‚ù憠…†…„ƒ§ÏÄàÄãß¼ÍÅÌ»â€Â’€ú€â€×€ß‚„ÍÅÌÒ‚µ‚¶¸ƒ…¼ÆâÉÛ€‚ÛÒ†€‚‹¸‚¹…„φ¢ƒ˜ÅÎÁÌÓ€Ž\n\n|‚µ‚¶€’€¾ƒÕ…åÄãÉ€î€Ñ€Ð€Ïƒù¸‚΂Ï\n\n€ï‚„Ò‚­ƒ Ò‚µ‚¶Ó€€ï‚„ÉÊæ‚˜†äσɃù‚ŽÏºâÜÒƒ…̸‚Î‚ÏÆâÃÍð€ÂÜÅ€ƒž¿æ€ï‚„ÉÊÒ…‡…ˆæ€Ö€Ë€÷€Ï€ã€Ï‚£‚¤Ò‚È‚ìÍ€ÏÌ»âÃÍσµæË»Éà€Ö€Ë€÷€Ï€ã€Ï‚£‚¤æƒôƒõÏÄàÄãâÃÍÏÎâ€ÂÈãÓ„«„¬ÅÎÁÌÓÎàλ€Â\n\n|‚µ‚¶€“€¾„³‚ÔÏ€¬€¨€¬¸‚¦ã\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤æ€ï‚„¸ƒËÂÌÁãâÓíð€Â€¬€¨€¬ƒ¤ƒÚ¸‚¦âÃÍæóÀãõ€‚ÛàÏ€ï‚„ÒƒŠƒçÍƒØ†Îæ„äåâð伀€æÉôáƒóÂλƒŠƒçϺâ‚Í‚•ÎôÒ†¢ƒ˜Ü€‚ÛàÎàÀ´ÍóÀ‴\n\nEND\n", + /* 1*/ "€Ó€÷€Ð€•€‘€€ç‹†€‚˜†ä\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€¬€¨€¬ƒ¤ƒÚ¸‚Åɀ€î€Ñ€Ð€ÏÒ†ê†ëƒùXD-310372ƒÚ怺⇔†øó‚׃ÌÄãÉÍÒÃÍð€Â’€ú€â€×€ß‚„€‘€ƒ€Ó€ø€ë€Å€Ñ€Ü€…€î€Ï€ü€÷‚„€„æ„’‚ƒÒƒ¨„Öƒîð€Â‡”†øÒƒØ†Î€¾€ö€è€Ñ€Ðƒß€Ž€›’€ö€Ü€‡•ƒëƒß€Ž€›€„“…ìƒß€Ž€œ€Â…¹´Ì»â€î€Ñ€Ð€ÏÍÈÒ€â€×€è€ú‚‚„¸†¢ƒ˜Å€‚—Ò„ÿ…€¸„«„¬Ç߀Â\n\n|‚µ‚¶€‘€¾‚—Ò† …†…„ƒ§¸„«„¬Çß\n\n€ï‚„æ€ü‚„ŠÆâÓíð´É‚˜†äÒ€î€Ñ€Ð€ÏƒÆ‚ù憠…†…„ƒ§ÏÄàÄãß¼ÍÅÌ»â€Â’€ú€â€×€ß‚„ÍÅÌÒ‚µ‚¶¸ƒ…¼ÆâÉÛ€‚ÛÒ†€‚‹¸‚¹…„φ¢ƒ˜ÅÎÁÌÓ€Ž\n\n|‚µ‚¶€’€¾„³‚ÔÏ€¬€¨€¬¸‚¦ã\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤æ€ï‚„¸ƒËÂÌÁãâÓíð€Â€¬€¨€¬ƒ¤ƒÚ¸‚¦âÃÍæóÀãõ€‚ÛàÏ€ï‚„ÒƒŠƒçÍƒØ†Îæ„äåâð伀€æÉôáƒóÂλƒŠƒçϺâ‚Í‚•ÎôÒ†¢ƒ˜Ü€‚ÛàÎàÀ´ÍóÀ‴\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€¬€¨€¬ƒ¤ƒÚ¸‚Åɀ€î€Ñ€Ð€ÏÒ†ê†ëƒùXD-310372ƒÚ怺⇔†øó‚׃ÌÄãÉÍÒÃÍð€Â’€ú€â€×€ß‚„€‘€ƒ€Ó€ø€ë€Å€Ñ€Ü€…€î€Ï€ü€÷‚„€„æ„’‚ƒÒƒ¨„Öƒîð€Â‡”†øÒƒØ†Î€¾€ö€è€Ñ€Ðƒß€Ž€›’€ö€Ü€‡•ƒëƒß€Ž€›€„“…ìƒß€Ž€œ€Â…¹´Ì»â€î€Ñ€Ð€ÏÍÈÒ€â€×€è€ú‚‚„¸†¢ƒ˜Å€‚—Ò„ÿ…€¸„«„¬Ç߀Â\n\n|‚µ‚¶€‘€¾„³‚ÔÏ€¬€¨€¬¸‚¦ã\n\n€Ö€Ë€÷€Ï€ã€Ï‚£‚¤æ€ï‚„¸ƒËÂÌÁãâÓíð€Â€¬€¨€¬ƒ¤ƒÚ¸‚¦âÃÍæóÀãõ€‚ÛàÏ€ï‚„ÒƒŠƒçÍƒØ†Îæ„äåâð伀€æÉôáƒóÂλƒŠƒçϺâ‚Í‚•ÎôÒ†¢ƒ˜Ü€‚ÛàÎàÀ´ÍóÀ‴\n\nEND\n", + /* 4*/ "‚—Ò† …†…„ƒ§¸„«„¬Çß\n", + /* 5*/ "ƒÕ…åÄãÉ€î€Ñ€Ð€Ïƒù¸‚΂Ï\n", + /* 6*/ "„³‚ÔÏ€¬€¨€¬¸‚¦ã\n", + /* 7*/ "† …†…„ƒ§Ò„«„¬‚ó‚ô\n", + /* 8*/ "€î€Ñ€Ð€Ïƒù҂΂ςó‚ô\n", + /* 9*/ "€¬€¨€¬ƒ¤ƒÚ҂ȃ¤‚ó‚ô\n", + /* 10*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 11*/ "€ï€Ê€Û€Í€Ï‚ñ‚ò€† …†…„ƒ§…¿à‚ž‚Ÿ‚ ‚¡‚¢\n", + /* 12*/ "ƒÿÒ‚ž‚Ÿ€ø‚„€ã‚È‚É\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sevP.c b/src/files/lang/jap-final/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/jap-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_f.c b/src/files/lang/jap-final/sev_str_f.c new file mode 100644 index 000000000..0394aff11 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Détruire le vaisseau maian capturé\n\nMon dernier objectif sera de détruire les restes du vaisseau avec lequel je suis arrivé sur Terre. Si quelqu'un découvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alliés seront en danger et j'aurai échoué dans ma mission.\n\n|Objectif 3: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "Détruire vaisseau maian capturé\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Labo de tests saboté.\n", + /* 8*/ "Vaisseau maian capturé détruit.\n", + /* 9*/ "Signal de détresse activé.\n", + /* 10*/ "Objet crucial détruit.\n", + /* 11*/ "Mission échouée - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activée.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_g.c b/src/files/lang/jap-final/sev_str_g.c new file mode 100644 index 000000000..35de19d9a --- /dev/null +++ b/src/files/lang/jap-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Zerstören Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfüllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstören. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts ähnlich ist, geraten unsere Verbündeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstören Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstört.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstört.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr möglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_i.c b/src/files/lang/jap-final/sev_str_i.c new file mode 100644 index 000000000..904104465 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sarà quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione è simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico è stato sabotato.\n", + /* 8*/ "La navicella Maian è stata distrutta.\n", + /* 9*/ "Il segnale di pericolo è stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/jap-final/sev_str_s.c b/src/files/lang/jap-final/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/jap-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi último acto y mi deber será destruir lo que queda del vehículo en el que llegué a la Tierra. Si alguien descubre que su tecnología es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrícolas estarán en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 1*/ "ÁREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento médico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "El experimento médico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La señal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crítico de la misión ha sido destruido.\n", + /* 11*/ "Misión fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/sevbE.c b/src/files/lang/jap-final/sevbE.c similarity index 100% rename from src/files/lang/sevbE.c rename to src/files/lang/jap-final/sevbE.c diff --git a/src/files/lang/sevbJ.c b/src/files/lang/jap-final/sevbJ.c similarity index 100% rename from src/files/lang/sevbJ.c rename to src/files/lang/jap-final/sevbJ.c diff --git a/src/files/lang/sevbP.c b/src/files/lang/jap-final/sevbP.c similarity index 100% rename from src/files/lang/sevbP.c rename to src/files/lang/jap-final/sevbP.c diff --git a/src/files/lang/sevb_str_f.c b/src/files/lang/jap-final/sevb_str_f.c similarity index 100% rename from src/files/lang/sevb_str_f.c rename to src/files/lang/jap-final/sevb_str_f.c diff --git a/src/files/lang/sevb_str_g.c b/src/files/lang/jap-final/sevb_str_g.c similarity index 100% rename from src/files/lang/sevb_str_g.c rename to src/files/lang/jap-final/sevb_str_g.c diff --git a/src/files/lang/sevb_str_i.c b/src/files/lang/jap-final/sevb_str_i.c similarity index 100% rename from src/files/lang/sevb_str_i.c rename to src/files/lang/jap-final/sevb_str_i.c diff --git a/src/files/lang/sevb_str_s.c b/src/files/lang/jap-final/sevb_str_s.c similarity index 100% rename from src/files/lang/sevb_str_s.c rename to src/files/lang/jap-final/sevb_str_s.c diff --git a/src/files/lang/sevxE.c b/src/files/lang/jap-final/sevxE.c similarity index 100% rename from src/files/lang/sevxE.c rename to src/files/lang/jap-final/sevxE.c diff --git a/src/files/lang/sevxJ.c b/src/files/lang/jap-final/sevxJ.c similarity index 100% rename from src/files/lang/sevxJ.c rename to src/files/lang/jap-final/sevxJ.c diff --git a/src/files/lang/sevxP.c b/src/files/lang/jap-final/sevxP.c similarity index 100% rename from src/files/lang/sevxP.c rename to src/files/lang/jap-final/sevxP.c diff --git a/src/files/lang/sevx_str_f.c b/src/files/lang/jap-final/sevx_str_f.c similarity index 100% rename from src/files/lang/sevx_str_f.c rename to src/files/lang/jap-final/sevx_str_f.c diff --git a/src/files/lang/sevx_str_g.c b/src/files/lang/jap-final/sevx_str_g.c similarity index 100% rename from src/files/lang/sevx_str_g.c rename to src/files/lang/jap-final/sevx_str_g.c diff --git a/src/files/lang/sevx_str_i.c b/src/files/lang/jap-final/sevx_str_i.c similarity index 100% rename from src/files/lang/sevx_str_i.c rename to src/files/lang/jap-final/sevx_str_i.c diff --git a/src/files/lang/sevx_str_s.c b/src/files/lang/jap-final/sevx_str_s.c similarity index 100% rename from src/files/lang/sevx_str_s.c rename to src/files/lang/jap-final/sevx_str_s.c diff --git a/src/files/lang/sevxbE.c b/src/files/lang/jap-final/sevxbE.c similarity index 100% rename from src/files/lang/sevxbE.c rename to src/files/lang/jap-final/sevxbE.c diff --git a/src/files/lang/sevxbJ.c b/src/files/lang/jap-final/sevxbJ.c similarity index 100% rename from src/files/lang/sevxbJ.c rename to src/files/lang/jap-final/sevxbJ.c diff --git a/src/files/lang/sevxbP.c b/src/files/lang/jap-final/sevxbP.c similarity index 100% rename from src/files/lang/sevxbP.c rename to src/files/lang/jap-final/sevxbP.c diff --git a/src/files/lang/sevxb_str_f.c b/src/files/lang/jap-final/sevxb_str_f.c similarity index 100% rename from src/files/lang/sevxb_str_f.c rename to src/files/lang/jap-final/sevxb_str_f.c diff --git a/src/files/lang/sevxb_str_g.c b/src/files/lang/jap-final/sevxb_str_g.c similarity index 100% rename from src/files/lang/sevxb_str_g.c rename to src/files/lang/jap-final/sevxb_str_g.c diff --git a/src/files/lang/sevxb_str_i.c b/src/files/lang/jap-final/sevxb_str_i.c similarity index 100% rename from src/files/lang/sevxb_str_i.c rename to src/files/lang/jap-final/sevxb_str_i.c diff --git a/src/files/lang/sevxb_str_s.c b/src/files/lang/jap-final/sevxb_str_s.c similarity index 100% rename from src/files/lang/sevxb_str_s.c rename to src/files/lang/jap-final/sevxb_str_s.c diff --git a/src/files/lang/shoE.c b/src/files/lang/jap-final/shoE.c similarity index 100% rename from src/files/lang/shoE.c rename to src/files/lang/jap-final/shoE.c diff --git a/src/files/lang/jap-final/shoJ.c b/src/files/lang/jap-final/shoJ.c new file mode 100644 index 000000000..801f94625 --- /dev/null +++ b/src/files/lang/jap-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ü€Ø†‚„Ò„·„邘æË»Ï‚È‚ÉÄãɀ€“ËÒ„ô‡‡¸‚ÕˇÉÀ‡·Ò‡”†øð€Â€Ü€Ø†‚„ҀրπþÓÃÒ†øÏºâ€‡‚‘»Ò†…††€ˆÏ»âß¼ð€ÂÃÒ†…††¸‚΂Ïŀրπþ¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„ÉÊÏ€ÜÓÝ„†Ò„éáƒçÓƒ¼ÁÎâÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n€Ö€Ï€þÏ»ôÚƒÏØíÓ‚˜‡ËƒÛ‚‘æºâ€Â… ‚¹Î…£‚×ÒÉÛχŻ…È‚•„ì„íæƒ‡ƒƒÎ¹ð€ÂƒÉ„ƒ€î‚„€Õ¸‚ù´Ìßр€րπþ悹…„Ï‚ÙãÉÃ͸‚É…ÜÂ⃇ƒƒÜº´Ì€ƒ¼‡°ƒÿÏ…£‚ׯâåÂÏÓ»¿Î»ÒĀ‚€Í€Ð€Ï€ä€€Ö€Ï€þÓ€ô‚„Ï‚µÇÉ߀€ó€áÒ€û€ë€øÎ€Û‚„€øŠÓ€‚à†òóÓ†ÌÊ‚Îãλ¿ÜÅãλ€Â€ãŠ€ñ¸ÄÆÏÓ€†…††ÈÒÜÒ¸‚ÏÆƒ‡ƒƒÜºâ¿ÜÅãλ€Â\n\n|‚µ‚¶€‘€¾ƒÉ„ƒ€î‚„€Õ¸ƒ›á‚»Âß\n\n‚˜‡ËÏ»ÁË¿ºâ€ÔŽ€÷€Ü€×€ƒ‡¸‡¹€„Ò‚Ž€ØðƒÂ‚¢Å̻⃰€“ËσɄƒ€î‚„€Õ¸ƒ›á‚»ÂÌÁã€ÂÃã฀î€Ñ€Ð€Ï„¦æ… ‚¹Ï…£‚×€…‚Î‚ÏÆãõ€†…††Ò€Û‚„€øŠÓƒ¼ÁÎâð伀ƒ‚¢ÅÌ»â€ÔŽ€÷€Ü€×¸‚Ƀ˜ÂâÏÓ€€«€ã€ö€Ê€Õ¸‚ù¼Òð€Â\n\n|‚µ‚¶€’€¾€÷€Ê‚¸‚ÂÄÇß\n\n†…††€Ó€÷€ÐÒ‚öá‚€æ‚É‚ÓÉàλÒ󀆧҅þ»‚ƒ˜¸‚ÏÆÒæ»»ð伀‚ÉËÂâÏÓIR€Ü€Ö€Ë€ÏæƒáƒÜð€Â†…††€Ó€÷€Ð‚ނ܇»Ïߴ̃˜†áÄã̾áÄàÏ…®Ò‡ºÎâ€Ó€÷€ÐÖ‚·ÚÏÓ€‡»¸„ü⃇ƒƒæºâ€Â¾ÈàÁ€Ü€Ø†‚„ÉÊÓ€ÈÃÏ€÷€Ê‚¸ƒÛ´Ì»âÓíð€ÂÜÅ€‚É‚ÓÉàÎÂãõôÿπ܀рʀàÒƒû„—¸ÆâÜÒæºâðä¼€ÂÅ¿ÅÈÃÓ€ÀöÅ»‚‰ƒŽæÎÄãÌ»âÏ‚þ»Î»€Â\n\n|‚µ‚¶€“€¾†…††Ò‡ºÎâ€Ó€÷€ÐÏ‚·‚ö\n\n€Ü€Ø†‚„ҀրπþÓ†…††Ò‚­Ü‡ºÎâ€Ó€÷€ÐÏ»âðä¼€ÂÈÃÖÒ‚öá‚€Ó‚ª¿„­ƒÿ΀ú€Ê€×æÄãÌ»â¿ÜÅãλ€ÂÃÃÓ€‡‚‘»Ò†…††€ˆð€Â‚—Ò‚í‚×ÓÄàÏ‚ßÅ»ÜÒÏÎâÏ‚þ»Î»€Â\n\n|‚µ‚¶€”€¾€Ó€÷‚„€ã‚‘…ý¸ƒ…Ì‚ÙÇ\n\n€î€Ñ€Ð€Ï‚­ƒÞ‡£†Œ„¢Ò„Æ…§óÓ€€Ü€Ø†‚„Ò€Ó€÷‚„€ã‚‘…ýÉÊæ€‡ºÎâ€Ó€÷€ÐÒôÿςçƒÂÅÌ»âÍÒÃÍð€Â€ó€áàÏ‚ŸÁåÅɃ“Óƒ…Ì‚ÙÆÒð€Â\n\n|‚µ‚¶€•€¾€Ü€Ø†‚„Ҁրπþ¸‚ÙÇ\n\n€Ö€Ï€þÍÒƒ½‚‘ð€Â€Ö€Ï€þӀڀрրʀ׸‚ù´Ì€Ü€Ø†‚„‚‘…ý¸ƒ¨Ù‚ŸÆÃÍæóÀ€€ó€áÒ€Û‚„€øŠÓ‚à†òóÓ†ÌÊ‚Îãλóºä¼€Â€ó€á¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„Ö҃Dž¥‚‚܃¼ÁÎကó€áàÒ„…„¯Ï‘€÷€ÔŠæ†ÌÉãâÃÍÏÎâ€ÂÈÅ̃…Ìæ„õ†¶ÏÎâÒð€Â\n\nEND\n", + /* 1*/ "€Ü€Ø†‚„€‡‚‘»Ò†…††€ˆ\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ü€Ø†‚„Ò„·„邘æË»Ï‚È‚ÉÄãɀ€“ËÒ„ô‡‡¸‚ÕˇÉÀ‡·Ò‡”†øð€Â€Ü€Ø†‚„ҀրπþÓÃÒ†øÏºâ€‡‚‘»Ò†…††€ˆÏ»âß¼ð€ÂÃÒ†…††¸‚΂Ïŀրπþ¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„ÉÊÏ€ÜÓÝ„†Ò„éáƒçÓƒ¼ÁÎâÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n€Ö€Ï€þÏ»ôÚƒÏØíÓ‚˜‡ËƒÛ‚‘æºâ€Â… ‚¹Î…£‚×ÒÉÛχŻ…È‚•„ì„íæƒ‡ƒƒÎ¹ð€ÂƒÉ„ƒ€î‚„€Õ¸‚ù´Ìßр€րπþ悹…„Ï‚ÙãÉÃ͸‚É…ÜÂ⃇ƒƒÜº´Ì€ƒ¼‡°ƒÿÏ…£‚ׯâåÂÏÓ»¿Î»ÒĀ‚€Í€Ð€Ï€ä€€Ö€Ï€þÓ€ô‚„Ï‚µÇÉ߀€ó€áÒ€û€ë€øÎ€Û‚„€øŠÓ€‚à†òóÓ†ÌÊ‚Îãλ¿ÜÅãλ€Â€ãŠ€ñ¸ÄÆÏÓ€†…††ÈÒÜÒ¸‚ÏÆƒ‡ƒƒÜºâ¿ÜÅãλ€Â\n\n|‚µ‚¶€‘€¾ƒÉ„ƒ€î‚„€Õ¸ƒ›á‚»Âß\n\n‚˜‡ËÏ»ÁË¿ºâ€ÔŽ€÷€Ü€×€ƒ‡¸‡¹€„Ò‚Ž€ØðƒÂ‚¢Å̻⃰€“ËσɄƒ€î‚„€Õ¸ƒ›á‚»ÂÌÁã€ÂÃã฀î€Ñ€Ð€Ï„¦æ… ‚¹Ï…£‚×€…‚Î‚ÏÆãõ€†…††Ò€Û‚„€øŠÓƒ¼ÁÎâð伀ƒ‚¢ÅÌ»â€ÔŽ€÷€Ü€×¸‚Ƀ˜ÂâÏÓ€€«€ã€ö€Ê€Õ¸‚ù¼Òð€Â\n\n|‚µ‚¶€’€¾€÷€Ê‚¸‚ÂÄÇß\n\n†…††€Ó€÷€ÐÒ‚öá‚€æ‚É‚ÓÉàλÒ󀆧҅þ»‚ƒ˜¸‚ÏÆÒæ»»ð伀‚ÉËÂâÏÓIR€Ü€Ö€Ë€ÏæƒáƒÜð€Â†…††€Ó€÷€Ð‚ނ܇»Ïߴ̃˜†áÄã̾áÄàÏ…®Ò‡ºÎâ€Ó€÷€ÐÖ‚·ÚÏÓ€‡»¸„ü⃇ƒƒæºâ€Â¾ÈàÁ€Ü€Ø†‚„ÉÊÓ€ÈÃÏ€÷€Ê‚¸ƒÛ´Ì»âÓíð€ÂÜÅ€‚É‚ÓÉàÎÂãõôÿπ܀рʀàÒƒû„—¸ÆâÜÒæºâðä¼€ÂÅ¿ÅÈÃÓ€ÀöÅ»‚‰ƒŽæÎÄãÌ»âÏ‚þ»Î»€Â\n\n|‚µ‚¶€“€¾†…††Ò‡ºÎâ€Ó€÷€ÐÏ‚·‚ö\n\n€Ü€Ø†‚„ҀրπþÓ†…††Ò‚­Ü‡ºÎâ€Ó€÷€ÐÏ»âðä¼€ÂÈÃÖÒ‚öá‚€Ó‚ª¿„­ƒÿ΀ú€Ê€×æÄãÌ»â¿ÜÅãλ€ÂÃÃÓ€‡‚‘»Ò†…††€ˆð€Â‚—Ò‚í‚×ÓÄàÏ‚ßÅ»ÜÒÏÎâÏ‚þ»Î»€Â\n\n|‚µ‚¶€”€¾€Ü€Ø†‚„Ҁրπþ¸‚ÙÇ\n\n€Ö€Ï€þÍÒƒ½‚‘ð€Â€Ö€Ï€þӀڀрրʀ׸‚ù´Ì€Ü€Ø†‚„‚‘…ý¸ƒ¨Ù‚ŸÆÃÍæóÀ€€ó€áÒ€Û‚„€øŠÓ‚à†òóÓ†ÌÊ‚Îãλóºä¼€Â€ó€á¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„Ö҃Dž¥‚‚܃¼ÁÎကó€áàÒ„…„¯Ï‘€÷€ÔŠæ†ÌÉãâÃÍÏÎâ€ÂÈÅ̃…Ìæ„õ†¶ÏÎâÒð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€Ü€Ø†‚„Ò„·„邘æË»Ï‚È‚ÉÄãɀ€“ËÒ„ô‡‡¸‚ÕˇÉÀ‡·Ò‡”†øð€Â€Ü€Ø†‚„ҀրπþÓÃÒ†øÏºâ€‡‚‘»Ò†…††€ˆÏ»âß¼ð€ÂÃÒ†…††¸‚΂Ïŀրπþ¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„ÉÊÏ€ÜÓÝ„†Ò„éáƒçÓƒ¼ÁÎâÒð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n„ã…œ‚ ‚¢\n\n|€Ó€øŒ€Ü€¾\n\n€Ö€Ï€þÏ»ôÚƒÏØíÓ‚˜‡ËƒÛ‚‘æºâ€Â… ‚¹Î…£‚×ÒÉÛχŻ…È‚•„ì„íæƒ‡ƒƒÎ¹ð€ÂƒÉ„ƒ€î‚„€Õ¸‚ù´Ìßр€րπþ悹…„Ï‚ÙãÉÃ͸‚É…ÜÂ⃇ƒƒÜº´Ì€ƒ¼‡°ƒÿÏ…£‚ׯâåÂÏÓ»¿Î»ÒĀ‚€Í€Ð€Ï€ä€€Ö€Ï€þÓ€ô‚„Ï‚µÇÉ߀€ó€áÒ€û€ë€øÎ€Û‚„€øŠÓ€‚à†òóÓ†ÌÊ‚Îãλ¿ÜÅãλ€Â€ãŠ€ñ¸ÄÆÏÓ€†…††ÈÒÜÒ¸‚ÏÆƒ‡ƒƒÜºâ¿ÜÅãλ€Â\n\n|‚µ‚¶€‘€¾ƒÉ„ƒ€î‚„€Õ¸ƒ›á‚»Âß\n\n‚˜‡ËÏ»ÁË¿ºâ€ÔŽ€÷€Ü€×€ƒ‡¸‡¹€„Ò‚Ž€ØðƒÂ‚¢Å̻⃰€“ËσɄƒ€î‚„€Õ¸ƒ›á‚»ÂÌÁã€ÂÃã฀î€Ñ€Ð€Ï„¦æ… ‚¹Ï…£‚×€…‚Î‚ÏÆãõ€†…††Ò€Û‚„€øŠÓƒ¼ÁÎâð伀ƒ‚¢ÅÌ»â€ÔŽ€÷€Ü€×¸‚Ƀ˜ÂâÏÓ€€«€ã€ö€Ê€Õ¸‚ù¼Òð€Â\n\n|‚µ‚¶€’€¾€÷€Ê‚¸‚ÂÄÇß\n\n†…††€Ó€÷€ÐÒ‚öá‚€æ‚É‚ÓÉàλÒ󀆧҅þ»‚ƒ˜¸‚ÏÆÒæ»»ð伀‚ÉËÂâÏÓIR€Ü€Ö€Ë€ÏæƒáƒÜð€Â†…††€Ó€÷€Ð‚ނ܇»Ïߴ̃˜†áÄã̾áÄàÏ…®Ò‡ºÎâ€Ó€÷€ÐÖ‚·ÚÏÓ€‡»¸„ü⃇ƒƒæºâ€Â¾ÈàÁ€Ü€Ø†‚„ÉÊÓ€ÈÃÏ€÷€Ê‚¸ƒÛ´Ì»âÓíð€ÂÜÅ€‚É‚ÓÉàÎÂãõôÿπ܀рʀàÒƒû„—¸ÆâÜÒæºâðä¼€ÂÅ¿ÅÈÃÓ€ÀöÅ»‚‰ƒŽæÎÄãÌ»âÏ‚þ»Î»€Â\n\n|‚µ‚¶€“€¾€Ü€Ø†‚„Ҁրπþ¸‚ÙÇ\n\n€Ö€Ï€þÍÒƒ½‚‘ð€Â€Ö€Ï€þӀڀрրʀ׸‚ù´Ì€Ü€Ø†‚„‚‘…ý¸ƒ¨Ù‚ŸÆÃÍæóÀ€€ó€áÒ€Û‚„€øŠÓ‚à†òóÓ†ÌÊ‚Îãλóºä¼€Â€ó€á¸‚ÙÇõ€…¹ÄãɃ…†ê†ëҀ܀؆‚„Ö҃Dž¥‚‚܃¼ÁÎကó€áàÒ„…„¯Ï‘€÷€ÔŠæ†ÌÉãâÃÍÏÎâ€ÂÈÅ̃…Ìæ„õ†¶ÏÎâÒð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "ƒÉ„ƒ€î‚„€Õ¸ƒ›á‚»Âß\n", + /* 6*/ "€÷€Ê‚¸‚ÂÄÇß\n", + /* 7*/ "†…††Ò‡ºÎâ€Ó€÷€ÐÏ‚·‚ö\n", + /* 8*/ "€Ó€÷‚„€ã‚‘…ý¸ƒ…Ì‚ÙÇ\n", + /* 9*/ "€Ü€Ø†‚„Ҁրπþ¸‚ÙÇ\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 13*/ "€ä€Ñ€ã€Ð€Ñ\n", + /* 14*/ "€ä€Ñ€ã€Ð€Ñ¸‚ÝÏ‚öãÉ\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "ƒÉ„ƒ€î‚„€Õ\n", + /* 23*/ "ƒÉ„ƒ€î‚„€Õ\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "ƒÉ„ƒ€î‚„€ÕÒƒ›á‚»Â€¨€¤\n", + /* 26*/ "ƒÉ„ƒ€î‚„€ÕÒƒ›á‚»Â…È‚•æ‚þ»ØÆ\n", + /* 27*/ "‡º‚˜ÖÒ‚·‚öæ…©‚¡ÄãÉ\n", + /* 28*/ "€Ü€Ø†‚„Ò‡º‚˜Ï‚·‚öÅÉ\n", + /* 29*/ "€Ü€Ø†‚„Ò€Ó€÷‚„€ã‚‘…ý¸ƒ…Ì‚ÙÅÉ\n", + /* 30*/ "ÃãÓ€‡ŽÒ„­ƒÿ΀Ԏ€÷€Ü€×Ï‚þ»Î»å€Â\n", + /* 31*/ "ÃÒ€Ó€÷€ÐÓ‚ª¿„­ƒÿ΀û‚„¸…Áìâå€Â\n‡º‚˜Ó‚¼ÁϺáȼрÂ\n", + /* 32*/ "‚ªÃ〴€Ü€Ø†‚„Ò‡˜‡™€Õ’€Ý€ø€À€À\n", + /* 33*/ "€¨€¤€´€Ã»Ë¸€ÊÍõÇõ»»åÂÑ€Â\n", + /* 34*/ "ÃÃӀ܀؆‚„Ò‡ºÎ⇔†ø€Â\n€ó€áàÏʹ̃Ƅ–ÎÍÃä€Â\npÃÒ‡”†øÒ‚­Ü†…‡ºÎƒŠƒçÏÓ\n€‡‚‘»Ò†…††€ˆæºâ¹ð€Â\n", + /* 35*/ "ó€ÈÒ‡º‚˜Ï‚ª¿ƒÔƒƒÎƒ´„³æºâÒ€À\n", + /* 36*/ "€ï‚„ÉÊӀ܀؆‚„ÍÒ‚‘‡Â‚\ní´ÍÃø„€Å̻ɹð€Â\np€‡‚‘»Ò†…††€ˆæƒ¼ÁÎãõ\n€Ü€Ø†‚„Ó‚‘¼ƒµ‚‚¸ƒ¼ÁÆ€Â\npð¿àô¼ÅÌÜÃø\n€ÊË÷ÅÉ¿´É¹ð€Â\npȼÆãõ€ƒ…†ê†ëÏ„·‚ÓÒ\n„õ†¶æ„£ãâÓíιð€´\n", + /* 37*/ "쵺€ÃÃÒ€ÜÓƒ”Ï‚µÇÌ€´\npºÎÉÓ€€î€Ñ€Ð€Ï„¦¸„Õ¹ó\nƒ…‚ÃøƒÃ…£ÅÌÊ·¼ð»€Â\n", + /* 38*/ "óÜ€î€Ñ€Ð€Ï„¦æƒó»Éƒ“\n€ô‚„æ…ÛØ´Ì»Éà€Ž\n", + /* 39*/ "ȹ΀ï€ÜÓ†‹Äλå€Â\n", + /* 40*/ "Ý´É€Ž\n", + /* 41*/ "‚€Í€Ð€Ï€ä€´€‚€Í€Ð€Ï€ä€´\n", + /* 42*/ "€Ó€øŒ€Ü€´€€Ó€øŒ€Ü€´€Ã´Ê߀´\n", + /* 43*/ "ܼƒÆ„Ó„ÔÄ€Âĺ‚ݸ€Â\n…£‚׿„ØØâ€Â‚ž‚ŸÅß¼€Â\n", + /* 44*/ "‚ç´Ì€´€‚à¸Ê·¼ð»€´\n", + /* 45*/ "Ӏ΀ŀ€…€…€…Ì߀´€´\n", + /* 46*/ "€ô‚„¸‚ÉËÂâØó€…£‚׸\n‚ç´Ì»É¹ð€Â倂Úü€Â\n", + /* 47*/ "†Ú¸Ë¿Øãο´Éà\nƒ“‚ýƒÏáÏ‚ž‚ŸÅÌÉå€Â\n", + /* 48*/ "ÜÊä¹Ä€‚€Í€Ð€Ï€ä€Â\n", + /* 49*/ "Ê·´Í€€€í€Ï€ã߀´\n", + /* 50*/ "€Žƒ¤ìâ߀Â\n", + /* 51*/ "€‡‚‘»Ò†…€ˆÏ‚ª¿ÄÄéß\n", + /* 52*/ "…£‚ȃ°æ…¤„–ã󯀆…††Ï„Ñ‚öóÀØÇ¹\n", + /* 53*/ "†…††Ö„Ñ‚öÆâÉÛπܼ€‘Ë҂Ԅϸ‚È‚É\n", + /* 54*/ "ôÃð€»€ƒÆ„Ó„Ô¿€»€À\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/shoP.c b/src/files/lang/jap-final/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/jap-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_f.c b/src/files/lang/jap-final/sho_str_f.c new file mode 100644 index 000000000..d69096fcb --- /dev/null +++ b/src/files/lang/jap-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion Skedar. Il se trouve sur une planète désertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, nous pouvons seulement garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au Centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter à une résistance acharnée. Tu vas te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'armée Skedar\n\nLe haut commandement maian pense que des soldats skedars sont gardés dans des champs de stase à l'intérieur de cette installation. Si cela est vrai, il faudra les détruire. La dernière chose dont nous avons besoin c'est une armée de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion skedar. Il se trouve sur une planète désertique. Le chef des terroristes skedars se cache dans un Temple de la guerre placé à la surface de la planète. La destruction du Temple et l'élimination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement te garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter à une résistance acharnée. Tu vas te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion skedar. Il se trouve sur une planète désertique. Le chef des terroristes skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement te garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Accéder au centre du sanctuaire\n", + /* 8*/ "Détruire l'armée secrète Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vue nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vue nocturne\n", + /* 13*/ "Vue nocturne\n", + /* 14*/ "Vue nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Ampli cible.\n", + /* 21*/ "\n", + /* 22*/ "Ampli cible\n", + /* 23*/ "Ampli cible\n", + /* 24*/ "Ampli cible obtenu.\n", + /* 25*/ "Ampli cible positionné correctement.\n", + /* 26*/ "Ampli cible mal positionné.\n", + /* 27*/ "Générateur activé.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Armée secrète Skedar détruite.\n", + /* 30*/ "Ca ressemble à un des piliers que je suis censée trouver.\n", + /* 31*/ "Cette zone est plus stable. \nLe sanctuaire doit être proche.\n", + /* 32*/ "OH, NON!!! Une armée skedar en animation suspendue!\n", + /* 33*/ "Très bien, il faut trancher la tête...le reste périra lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette planète est sacrée. L'Autel de Bataille est le lieu le plus vénéré de cette planète.\n", + /* 35*/ "Je vois. Cet endroit est sacré pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la clé de la victoire. Nous avons combattu jusqu'à obtenir un cessez-le-feu, mais nous avons toujours été sur nos gardes. La destruction de cet endroit pourra enfin donner une chance à la paix.\n", + /* 37*/ "Nous devons être certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu prépares l'armada maian pour pulvériser ce satané temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le détail.\n", + /* 39*/ "Je ne compte pas vraiment m'éterniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de problème. Attrape mon bras. On va te sortir de là.\n", + /* 44*/ "Non, vite! Donne-moi ton arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai réussi à retarder le bombardement, la flotte est en attente. Ils vont commencer dès que nous serons partis.\n", + /* 47*/ "Je m'en serais tirée si ce gros lourdaud ne m'avait pas attrapé le pied.\n", + /* 48*/ "J'en suis sûr, Joanna, j'en suis sûr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes prières au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre accès au Temple créé.\n", + /* 54*/ "Où es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_g.c b/src/files/lang/jap-final/sho_str_g.c new file mode 100644 index 000000000..ec4420891 --- /dev/null +++ b/src/files/lang/jap-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine große Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. Der Schrein könnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstört werden. Das Letzte, was wir jetzt brauchen können, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brücke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anführer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtgerät\n", + /* 13*/ "Nachtsichtgerät\n", + /* 14*/ "Nachtsichtgerät aufgenommen\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen\n", + /* 20*/ "Erlangen Sie das Peilgerät!\n", + /* 21*/ "\n", + /* 22*/ "Peilgerät\n", + /* 23*/ "Peilgerät\n", + /* 24*/ "Peilgerät aufgenommen\n", + /* 25*/ "Peilgerät wurde korrekt platziert.\n", + /* 26*/ "Peilgerät wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei Säulen zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter. \nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tatsächlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Körper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Land zu sein. Der Schrein befindet sich am heiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resümieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gekämpft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden würde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstörung des Schreins wäre eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also müssen wir dafür sorgen, dass kein Skedar überlebt. Ich gehe rein und kümmere mich um den Anführer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort verschwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drüben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich hätte es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt hätte.\n", + /* 48*/ "Natürlich, Joanna, natürlich.\n", + /* 49*/ "Ich hätte es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmöglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_i.c b/src/files/lang/jap-final/sho_str_i.c new file mode 100644 index 000000000..ae79fe392 --- /dev/null +++ b/src/files/lang/jap-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perciò lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora è un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regnerà la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore è stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra più costante. \nIl Santuario Interno non può essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morirà!\n", + /* 34*/ "Questo è il luogo più SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte più SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora è SACRO! Però c'è anche dell'altro, vero?\n", + /* 36*/ "Sì! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finché non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicherà una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai più possibilità di salvezza!\n", + /* 39*/ "È un errore che intendo evitare!\n", + /* 40*/ "Proprio così...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "Sì, sì, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/jap-final/sho_str_s.c b/src/files/lang/jap-final/sho_str_s.c new file mode 100644 index 000000000..1a2f061dd --- /dev/null +++ b/src/files/lang/jap-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a través del laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ejército Secreto Skedar\n\nEl Alto Comando Maian sospecha que más guerreros Skedar están en estado de hibernación en lugares desconocidos. Éste puede ser uno de esos lugares. Si así es, destrúyelos. La última cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicóticos.\n\n|Objetivo Cinco: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos en el templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ejército secreto Skedar\n", + /* 9*/ "Eliminar al líder Skedar\n", + /* 10*/ "Obtén la Visión Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "V. Nocturna\n", + /* 13*/ "Visión Nocturna\n", + /* 14*/ "Visión Nocturna obtenida.\n", + /* 15*/ "Obtén el Escáner.\n", + /* 16*/ "\n", + /* 17*/ "Escáner\n", + /* 18*/ "Escáner\n", + /* 19*/ "Escáner obtenido.\n", + /* 20*/ "Obtén el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ejército secreto Skedar ha sido derrotado.\n", + /* 30*/ "Éste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energía es más constante en este área. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "¡¡¡OH, NO!!! ¡Un ejército Skedar en animación suspendida!\n", + /* 33*/ "Vale, entonces... Cortémosle la cabeza y el \ncuerpo perecerá.\n", + /* 34*/ "Éste es el lugar más sagrado de los fanáticos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla está situado en la parte más sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ¿no? Pero hay bastante más que eso, ¿no es así?\n", + /* 36*/ "Sí. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabíamos que hasta que no fuera destruido, la guerra no terminaría. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destrucción de este lugar puede significar una paz verdadera.\n", + /* 37*/ "Así que tenemos que asegurarnos de que ningún fanático sobreviva. Entraré a por el líder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si estás en tierra cuando la flota llegue aquí, no tendrás ninguna oportunidad.\n", + /* 39*/ "Ése es un error que no pienso cometer.\n", + /* 40*/ "Siiií...\n", + /* 41*/ "¡Joanna! ¡Joanna! \n", + /* 42*/ "¡Elvis! ¡Elvis! Aquí.\n", + /* 43*/ "Ningún problema. Agárrate a mis brazos. Te sacaré enseguida.\n", + /* 44*/ "¡No, rápido! ¡Dame tu arma!\n", + /* 45*/ "¡Quieres! ¡Soltarme! ¡De! ¡Una! ¡Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezarán de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "¿Dónde estás? ¿Estás herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/siloE.c b/src/files/lang/jap-final/siloE.c similarity index 100% rename from src/files/lang/siloE.c rename to src/files/lang/jap-final/siloE.c diff --git a/src/files/lang/siloJ.c b/src/files/lang/jap-final/siloJ.c similarity index 100% rename from src/files/lang/siloJ.c rename to src/files/lang/jap-final/siloJ.c diff --git a/src/files/lang/siloP.c b/src/files/lang/jap-final/siloP.c similarity index 100% rename from src/files/lang/siloP.c rename to src/files/lang/jap-final/siloP.c diff --git a/src/files/lang/silo_str_f.c b/src/files/lang/jap-final/silo_str_f.c similarity index 100% rename from src/files/lang/silo_str_f.c rename to src/files/lang/jap-final/silo_str_f.c diff --git a/src/files/lang/silo_str_g.c b/src/files/lang/jap-final/silo_str_g.c similarity index 100% rename from src/files/lang/silo_str_g.c rename to src/files/lang/jap-final/silo_str_g.c diff --git a/src/files/lang/silo_str_i.c b/src/files/lang/jap-final/silo_str_i.c similarity index 100% rename from src/files/lang/silo_str_i.c rename to src/files/lang/jap-final/silo_str_i.c diff --git a/src/files/lang/silo_str_s.c b/src/files/lang/jap-final/silo_str_s.c similarity index 100% rename from src/files/lang/silo_str_s.c rename to src/files/lang/jap-final/silo_str_s.c diff --git a/src/files/lang/statE.c b/src/files/lang/jap-final/statE.c similarity index 100% rename from src/files/lang/statE.c rename to src/files/lang/jap-final/statE.c diff --git a/src/files/lang/jap-final/statJ.c b/src/files/lang/jap-final/statJ.c new file mode 100644 index 000000000..2a55d8497 --- /dev/null +++ b/src/files/lang/jap-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€î€Ñ€Ð€Ï„¦Ó…£‚׸„ð„¬Å€€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„ÉÊæ…ƒÛà。˜‡ËƒÛ‚‘Ò…Ô‡Ë鿄ׄØÄãɀ†€„䄃€Ü€Ö€Ë€å€Ï€þ€…€Û€Ü€â€ðæ„€„ÅÅÉÍÃäÏßâÍ€€Ü€Ø†‚„€Ö€Ï€þÒ€×€ú‚„€ÏæØð€Ò€ú˻̻âß¼ð€Â\n\n|‚µ‚¶€‘€¾€Ö€Ï€þÒ€×€ú‚„€Ï¸‚ÙÇ\n\nÃҀ܀؆‚„€Ö€Ï€þÒ€×€ú‚„€ÏÓ€‚€Í€Ð€Ï€äæ€Ö€Ï€þ¸‚×Ê‚ÙÅÌÆèςÂÄÄãɀƒ̓“ƒÎóӃҀրπþ×ôƒïƒðóÓλ怀ó€áæ€Ü€Ø†‚„Ò…¹†½¸…¥»â‚‚¸‚Õ˃πƒ‘Ńö´ÌÅØ¼Òð€Â\n\n|‚µ‚¶€’€¾€Ö€Ï€þÒ€×€ú‚„€Ï€’ƒÚ¸‚ÙÇ\n\n€Ö€Ï€þÒ€×€ú‚„€Ïæ€Ü¼€‘‡—»É€€Ü€Ø†‚„€×€ú‚„€ÏÒ‡˜‡™€Õ’€Ý€øÒ‚ †”ó€„÷ƒ“Ï€’‡—Ò€×€ú‚„€Ïæ‚ÂÄÄãÉß¼ð€Â€Ù€Ñ€áÒ‚Ôæ‡š‡›Ï‡•ƒëÆâƒ“‚ý愵¿´Éƒ˜€ßáƒôƒõÍδ̻â€Â€Ù€Ñ€á¸‚ÙÇõ€Ý´Íƒïƒð情̃‘½âðä¼€Â\n\n|‚µ‚¶€“€¾€Ö€Ï€þÒ€×€ú‚„€Ï€“ƒÚ¸‚ÙÇ\n\n»Ý‚„€ÆØ¹ÆØ¹€Â€“‡—„—Ò€×€ú‚„€Ïæ»Éß¼ð€Â€î€Ñ€Ð€Ï„¦Ò…£‚×ÒÉÛÏ€‚˜†ÓÒ‚Î…èæºØáÏÜ‚ßÅÁ€‚ä‚…Ò€Ü€Ö€Ë€ä‚„æ¼ØÁƒÂ‚¢Å̻ο´ÉàÅ»€ÂÍ€Íáº½í€€Ù€Ñ€áæ‚ƒ‚Æ„ñã‚Ò´Ì»âÉÛ€‚ªÍÅÌÜ‚ÙÄÎÁÌÓ€´\n\nEND\n", + /* 1*/ "‚‘»Ò†…††\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€î€Ñ€Ð€Ï„¦Ó…£‚׸„ð„¬Å€€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„ÉÊæ…ƒÛà。˜‡ËƒÛ‚‘Ò…Ô‡Ë鿄ׄØÄãɀ†€„䄃€Ü€Ö€Ë€å€Ï€þ€…€Û€Ü€â€ðæ„€„ÅÅÉÍÃäÏßâÍ€€Ü€Ø†‚„€Ö€Ï€þÒ€×€ú‚„€ÏæØð€Ò€ú˻̻âß¼ð€Â\n\n|‚µ‚¶€‘€¾€Ö€Ï€þÒ€×€ú‚„€Ï¸‚ÙÇ\n\nÃҀ܀؆‚„€Ö€Ï€þÒ€×€ú‚„€ÏÓ€‚€Í€Ð€Ï€äæ€Ö€Ï€þ¸‚×Ê‚ÙÅÌÆèςÂÄÄãɀƒ̓“ƒÎóӃҀրπþ×ôƒïƒðóÓλ怀ó€áæ€Ü€Ø†‚„Ò…¹†½¸…¥»â‚‚¸‚Õ˃πƒ‘Ńö´ÌÅØ¼Òð€Â\n\n|‚µ‚¶€’€¾€Ö€Ï€þÒ€×€ú‚„€Ï€’ƒÚ¸‚ÙÇ\n\n€Ö€Ï€þÒ€×€ú‚„€Ïæ€Ü¼€‘‡—»É€€Ü€Ø†‚„€×€ú‚„€ÏÒ‡˜‡™€Õ’€Ý€øÒ‚ †”ó€„÷ƒ“Ï€’‡—Ò€×€ú‚„€Ïæ‚ÂÄÄãÉß¼ð€Â€Ù€Ñ€áÒ‚Ôæ‡š‡›Ï‡•ƒëÆâƒ“‚ý愵¿´Éƒ˜€ßáƒôƒõÍδ̻â€Â€Ù€Ñ€á¸‚ÙÇõ€Ý´Íƒïƒð情̃‘½âðä¼€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n€î€Ñ€Ð€Ï„¦Ó…£‚׸„ð„¬Å€€î€Ñ€Ð€ÏÒ’€ú€â€×€ß‚„ÉÊæ…ƒÛà。˜‡ËƒÛ‚‘Ò…Ô‡Ë鿄ׄØÄãɀ†€„䄃€Ü€Ö€Ë€å€Ï€þ€…€Û€Ü€â€ðæ„€„ÅÅÉÍÃäÏßâÍ€€Ü€Ø†‚„€Ö€Ï€þÒ€×€ú‚„€ÏæØð€Ò€ú˻̻âß¼ð€Â\n\n|‚µ‚¶€‘€¾€Ö€Ï€þÒ€×€ú‚„€Ï¸‚ÙÇ\n\nÃҀ܀؆‚„€Ö€Ï€þÒ€×€ú‚„€ÏÓ€‚€Í€Ð€Ï€äæ€Ö€Ï€þ¸‚×Ê‚ÙÅÌÆèςÂÄÄãɀƒ̓“ƒÎóӃҀրπþ×ôƒïƒðóÓλ怀ó€áæ€Ü€Ø†‚„Ò…¹†½¸…¥»â‚‚¸‚Õ˃πƒ‘Ńö´ÌÅØ¼Òð€Â\n\nEND\n", + /* 4*/ "€Ö€Ï€þÒ€×€ú‚„€Ï¸‚ÙÇ\n", + /* 5*/ "€Ö€Ï€þÒ€×€ú‚„€Ï€’ƒÚ¸‚ÙÇ\n", + /* 6*/ "€Ö€Ï€þÒ€×€ú‚„€Ï€“ƒÚ¸‚ÙÇ\n", + /* 7*/ "€î€Ñ€Ð€ÏÒ€÷‚„†‚„æ‚ÙÄãÉ€´\n", + /* 8*/ "€Ü€Ø†‚„€Ö€Ï€þÒ€×€ú‚„€Ï¸‚ÙÅÉ€´\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/statP.c b/src/files/lang/jap-final/statP.c similarity index 100% rename from src/files/lang/statP.c rename to src/files/lang/jap-final/statP.c diff --git a/src/files/lang/jap-final/stat_str_f.c b/src/files/lang/jap-final/stat_str_f.c new file mode 100644 index 000000000..d29db6670 --- /dev/null +++ b/src/files/lang/jap-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\n|Objectif 3: - Régicide Acte trois\n\nPardon, désolé, il y a un troisième Roi. Nos détecteurs n'ont pu le repérer auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux préparé que les deux autres, il est impératif qu'il soit éliminé dans les plus brefs délais. Dépêchez-vous, il ne faut pas qu'il rassemble ses armées.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'armée skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi skedar\n", + /* 5*/ "Tuer Roi skedar 2\n", + /* 6*/ "Tuer Roi skedar 3\n", + /* 7*/ "Le Dirigeant maian a été tué.\n", + /* 8*/ "Le Roi skedar a été tué.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_g.c b/src/files/lang/jap-final/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/jap-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\n|3. Ziel: - Königsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als gäbe es noch einen dritten König. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser König konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gefährlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch größer.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-König!\n", + /* 5*/ "Vernichten Sie den Skedar-König 2!\n", + /* 6*/ "Vernichten Sie den Skedar-König 3!\n", + /* 7*/ "Der Maianische Anführer wurde eliminiert.\n", + /* 8*/ "Der Skedar-König wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_i.c b/src/files/lang/jap-final/stat_str_i.c new file mode 100644 index 000000000..4294e1bfc --- /dev/null +++ b/src/files/lang/jap-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non sussisterà più.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficoltà nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re è più pericoloso degli altri due! È pertanto di vitale importanza che venga soppresso al più presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non al più presto.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al più presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2° re degli Skedar\n", + /* 6*/ "Uccidi il 3° re degli Skedar\n", + /* 7*/ "Il capo dei Maian è stato ucciso.\n", + /* 8*/ "Il re degli Skedar è stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/stat_str_s.c b/src/files/lang/jap-final/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/jap-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdón, perdón... Parece que existe un tercer Rey. Nuestros escáneres han tenido problemas de detección debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey está más preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El líder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleE.c b/src/files/lang/jap-final/titleE.c new file mode 100644 index 000000000..bdb8fdaad --- /dev/null +++ b/src/files/lang/jap-final/titleE.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ "ncl staff\n", + /*185*/ "s. miyamoto\n", + /*186*/ "k. miki\n", + /*187*/ "s. kojoh\n", + /*188*/ "y. nakano\n", + /*189*/ "k. yamaguchi\n", + /*190*/ "k. terasaki\n", + /*191*/ "m. goto\n", + /*192*/ "super mario club\n", + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleJ.c b/src/files/lang/jap-final/titleJ.c new file mode 100644 index 000000000..bdb8fdaad --- /dev/null +++ b/src/files/lang/jap-final/titleJ.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ "ncl staff\n", + /*185*/ "s. miyamoto\n", + /*186*/ "k. miki\n", + /*187*/ "s. kojoh\n", + /*188*/ "y. nakano\n", + /*189*/ "k. yamaguchi\n", + /*190*/ "k. terasaki\n", + /*191*/ "m. goto\n", + /*192*/ "super mario club\n", + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/titleP.c b/src/files/lang/jap-final/titleP.c new file mode 100644 index 000000000..4e6c21f3e --- /dev/null +++ b/src/files/lang/jap-final/titleP.c @@ -0,0 +1,200 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", + /*184*/ NULL, + /*185*/ NULL, + /*186*/ NULL, + /*187*/ NULL, + /*188*/ NULL, + /*189*/ NULL, + /*190*/ NULL, + /*191*/ NULL, + /*192*/ NULL, + /*193*/ NULL, + /*194*/ NULL, + /*195*/ NULL, +}; diff --git a/src/files/lang/jap-final/title_str_f.c b/src/files/lang/jap-final/title_str_f.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/jap-final/title_str_f.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_g.c b/src/files/lang/jap-final/title_str_g.c new file mode 100644 index 000000000..37e3b0196 --- /dev/null +++ b/src/files/lang/jap-final/title_str_g.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle höhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschütterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergründe\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark für immer\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_i.c b/src/files/lang/jap-final/title_str_i.c new file mode 100644 index 000000000..32d6fc491 --- /dev/null +++ b/src/files/lang/jap-final/title_str_i.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci al buio\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare alla luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "verifica prodotto (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "verifica prodotto (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-più buio di te!\n", + /*130*/ "la casa nell'albero\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark e pd device\n", + /*147*/ "sono trademark\n", + /*148*/ "rare\n", + /*149*/ "design del futuro\n", + /*150*/ "perfect dark è per sempre\n", + /*151*/ "verifica prodotto (noe)\n", + /*152*/ "supervisore\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "aiuto supervisore\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinatori\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "redattore\n", + /*160*/ "aiuto redattore\n", + /*161*/ "aiuto redattori\n", + /*162*/ "localizzazione (francese)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizzazione (tedesco)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizzazione (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizzazione (spagnolo)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localizzazione\n", + /*178*/ "coordinatore prodotto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisore prodotto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "manager localizzazione prodotto\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/jap-final/title_str_s.c b/src/files/lang/jap-final/title_str_s.c new file mode 100644 index 000000000..69567bb3c --- /dev/null +++ b/src/files/lang/jap-final/title_str_s.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animación\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseños futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "maníaco diseñador galés\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios biónicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "tío del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "técnicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el núcleo perfecto\n", + /*129*/ "- más oscuro que tú -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseñando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ "testeo (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "vicesupervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinadores\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "traductor principal\n", + /*160*/ "traductor asistente\n", + /*161*/ "traductores asistentes\n", + /*162*/ "localización (francés)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localización (alemán)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localización (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localización (español)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia & ruth\n", + /*177*/ "localización\n", + /*178*/ "coordinador producto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisora producto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "director dpto. localización\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/traE.c b/src/files/lang/jap-final/traE.c similarity index 100% rename from src/files/lang/traE.c rename to src/files/lang/jap-final/traE.c diff --git a/src/files/lang/jap-final/traJ.c b/src/files/lang/jap-final/traJ.c new file mode 100644 index 000000000..43785c22d --- /dev/null +++ b/src/files/lang/jap-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n…Ú„¤æºâÒÓå¿´Ìâ€Í€Ð€Ï€ä€Â‚§æÄÀ×ôƒËÂÉ„àÄ΀‡€ë€ù€ÏŠ€ˆÓ€€î€Ñ€Ð€ÏÍ»¼†×†ØÒ€Ó€Ñ€÷€Ð€Ïð€Â‚×Ê‚ØÍÄãɃÁ‚ÚƒÂÏ„÷‚ÀÅ̻ɃÿÒ€î€Ñ€Ð€ÏÉÊÓ€‡‚˜†äƒÆ‚ù€ˆóº´É€ÂƒË¿´É‚ÛÓ€ÈÒ‰€Æ€ü‚„Šð´ÉÒð€Â€Žƒ•ÓÃÒÁà»ó€ÂÍÜ¿Áƒé€´\n\n|‚µ‚¶€‘€¾ƒ—‚Ă݅ˆ‚Í‚•¸‚È‚ÉÇß\n\n€î€Ñ€Ð€ÏÒƒùÏÓ€€Ô‚„€ã€Ô“Í„Õõãâ‚­‚¯…ÐÒƒ—‚Ă݅ˆ‚Í‚•愼Øã̻ɀÂÃãÓ€î€Ñ€Ð€Ïƒ¨‚ꅆτ§ò»Ì†ˆ‚ðÄãÌ»âÒó€‚Û¸ƒËÂâÏÓÃãæ‚­ÜƒŒÁÌ‚¹…„ð€ÂÃãÓƒùÒ…¹æ»¿€ÜÅÁÓ„‚„‹ƒˆÏ…„ƒ§…Ï‚´õãɀЀрâ€ð҂ϺâÓíÎÒ󀄀łŸÅÌ…¾Å»€Â\n\n|‚µ‚¶€’€¾‚€Í€ä€Ú€Ï̈́΃àÇß\n\n‚€Í€ä€Ú€ÏÓ… ‚‹æ‹€ùȼÏÎ´Ì¾á€ÆèÏÜ…ÛØáȼðÍ„í‚õÅÌÀÌ»â€Â‚Ûæ‚‰ƒŽ‚“Ï‚ÉË¿âƒÏ€‚§æ„€Å‚ÓÌâÒð€Â\n\n|‚µ‚¶€“€¾…µ…¶…Ž„Á„ÊÖ„Ñ‚öÇß\n\n‚€Í€ä€Ú€ÏÓ€ƒ•ØóÈÒ… ‚‹¸…ÞÆÉÛÏ…µ…¶…Ž„Á„ÊÏ‚¼òÂλó»É€Âſŀƒ•Ýȹ΄†‚”Óƒ¼ƒˆð€Â‚€Í€ä€Ú€Ïæ…Ž„Á„ÊÖÒŠ€Ð¸‚Î‚ÏÆâÒó€ÈÒ‚ý‚Û¸ƒñƒ÷ÆâÒð€Â‚ä‚…Ò…žÙóÓ€†Ý‚ê…±Ò€î€Ñ€Ð€ÏƒùæÈÃϺâÓíð€Â\n\n|‚µ‚¶€”€¾€î€Ñ€Ð€Ï¸„—‚áÛÄÇß\n\n€í‹‚„Ž€ÊŠÓ€ºË¿»ÏÁ»¿à€‚ž‚ŸƒÏ€Ô‚„€ã€Ô“¸‚ù´Ì€€î€Ñ€Ð€ÏÒ‚Û¸‚ÃÃÅ̾ÁÒð€Â‚Ûæ„—¸‚áØÇõ€€î€Ñ€Ð€Ïƒù¸…‰…ŠÅÌ€€Ó€÷€Ð€•€‘¿à‚ž‚ŸÄÇÌÁãâðä¼€Â\n\n|‚µ‚¶€•€¾€Ó€÷€Ð€•€‘¿à‚ž‚ŸÇß\n\nØí€î€Ñ€Ð€ÏÒ‰€Æ€ü‚„Џ‚¯ÏƒùÏÒÇÈã¿à‚§Í‚€Í€ä€Ú€ÏóƒùÏÒâÒð€Â„§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÓ‚§æÆóς΂ÏÅÌ»âÒ󀄤…úƒ¼Á‚ž‚ŸóÀâÓíð€Â\n\nEND\n", + /* 1*/ "€Ó€÷€Ð€•€‘€‚ž‚Ÿ\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n…Ú„¤æºâÒÓå¿´Ìâ€Í€Ð€Ï€ä€Â‚§æÄÀ×ôƒËÂÉ„àÄ΀‡€ë€ù€ÏŠ€ˆÓ€€î€Ñ€Ð€ÏÍ»¼†×†ØÒ€Ó€Ñ€÷€Ð€Ïð€Â‚×Ê‚ØÍÄãɃÁ‚ÚƒÂÏ„÷‚ÀÅ̻ɃÿÒ€î€Ñ€Ð€ÏÉÊÓ€‡‚˜†äƒÆ‚ù€ˆóº´É€ÂƒË¿´É‚ÛÓ€ÈÒ‰€Æ€ü‚„Šð´ÉÒð€Â€Žƒ•ÓÃÒÁà»ó€ÂÍÜ¿Áƒé€´\n\n|‚µ‚¶€‘€¾‚€Í€ä€Ú€Ï̈́΃àÇß\n\n‚€Í€ä€Ú€ÏÓ… ‚‹æ‹€ùȼÏÎ´Ì¾á€ÆèÏÜ…ÛØáȼðÍ„í‚õÅÌÀÌ»â€Â‚Ûæ‚‰ƒŽ‚“Ï‚ÉË¿âƒÏ€‚§æ„€Å‚ÓÌâÒð€Â\n\n|‚µ‚¶€’€¾…µ…¶…Ž„Á„ÊÖ„Ñ‚öÇß\n\n‚€Í€ä€Ú€ÏÓ€ƒ•ØóÈÒ… ‚‹¸…ÞÆÉÛÏ…µ…¶…Ž„Á„ÊÏ‚¼òÂλó»É€Âſŀƒ•Ýȹ΄†‚”Óƒ¼ƒˆð€Â‚€Í€ä€Ú€Ïæ…Ž„Á„ÊÖÒŠ€Ð¸‚Î‚ÏÆâÒó€ÈÒ‚ý‚Û¸ƒñƒ÷ÆâÒð€Â‚ä‚…Ò…žÙóÓ€†Ý‚ê…±Ò€î€Ñ€Ð€ÏƒùæÈÃϺâÓíð€Â\n\n|‚µ‚¶€“€¾€î€Ñ€Ð€Ï¸„—‚áÛÄÇß\n\n€í‹‚„Ž€ÊŠÓ€ºË¿»ÏÁ»¿à€‚ž‚ŸƒÏ€Ô‚„€ã€Ô“¸‚ù´Ì€€î€Ñ€Ð€ÏÒ‚Û¸‚ÃÃÅ̾ÁÒð€Â‚Ûæ„—¸‚áØÇõ€€î€Ñ€Ð€Ïƒù¸…‰…ŠÅÌ€€Ó€÷€Ð€•€‘¿à‚ž‚ŸÄÇÌÁãâðä¼€Â\n\n|‚µ‚¶€”€¾€Ó€÷€Ð€•€‘¿à‚ž‚ŸÇß\n\nØí€î€Ñ€Ð€ÏÒ‰€Æ€ü‚„Џ‚¯ÏƒùÏÒÇÈã¿à‚§Í‚€Í€ä€Ú€ÏóƒùÏÒâÒð€Â„§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÓ‚§æÆóς΂ÏÅÌ»âÒ󀄤…úƒ¼Á‚ž‚ŸóÀâÓíð€Â\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚ä‚…Ò€‡€ë€ù€ÏŠ€ˆÉÊæ€€ç‹†‡ËƒÃ¸ƒÁ‚Ú‚Ï‚×Ê‚ØÍÄãÌÅØ´É€Â…¹æ»Í€‡€ë€ù€ÏŠ€ˆÉÊÓ„¦Ò…µ…¶„§‚˜€‡€Ó€÷€Ð€•€‘€ˆÖ‚´õãɀ„÷„§‚˜‚ŽÏ»â‚ä‚…Ò€Ü€Ñæ€ƒ¨„ÖƒîÒ‚¡‚¢ƒß¸†—ƃ¡ƒ¢¸ƒÉ‚¦ÅÌÀɀƒ•‚ÒÒ‚µ‚¶ÓÈÒƒ¨„ÖƒîÒ‚¨‚Ÿð€Â\n\n|€Ö€Ë€÷€Ï€ã€Ï€¾\n\n…Ú„¤æºâÒÓå¿´Ìâ€Í€Ð€Ï€ä€Â‚§æÄÀ×ôƒËÂÉ„àÄ΀‡€ë€ù€ÏŠ€ˆÓ€€î€Ñ€Ð€ÏÍ»¼†×†ØÒ€Ó€Ñ€÷€Ð€Ïð€Â‚×Ê‚ØÍÄãɃÁ‚ÚƒÂÏ„÷‚ÀÅ̻ɃÿÒ€î€Ñ€Ð€ÏÉÊÓ€‡‚˜†äƒÆ‚ù€ˆóº´É€ÂƒË¿´É‚ÛÓ€ÈÒ‰€Æ€ü‚„Šð´ÉÒð€Â€Žƒ•ÓÃÒÁà»ó€ÂÍÜ¿Áƒé€´\n\n|‚µ‚¶€‘€¾‚€Í€ä€Ú€Ï̈́΃àÇß\n\n‚€Í€ä€Ú€ÏÓ… ‚‹æ‹€ùȼÏÎ´Ì¾á€ÆèÏÜ…ÛØáȼðÍ„í‚õÅÌÀÌ»â€Â‚Ûæ‚‰ƒŽ‚“Ï‚ÉË¿âƒÏ€‚§æ„€Å‚ÓÌâÒð€Â\n\n|‚µ‚¶€’€¾…µ…¶…Ž„Á„ÊÖ„Ñ‚öÇß\n\n‚€Í€ä€Ú€ÏÓ€ƒ•ØóÈÒ… ‚‹¸…ÞÆÉÛÏ…µ…¶…Ž„Á„ÊÏ‚¼òÂλó»É€Âſŀƒ•Ýȹ΄†‚”Óƒ¼ƒˆð€Â‚€Í€ä€Ú€Ïæ…Ž„Á„ÊÖÒŠ€Ð¸‚Î‚ÏÆâÒó€ÈÒ‚ý‚Û¸ƒñƒ÷ÆâÒð€Â‚ä‚…Ò…žÙóÓ€†Ý‚ê…±Ò€î€Ñ€Ð€ÏƒùæÈÃϺâÓíð€Â\n\n|‚µ‚¶€“€¾€Ó€÷€Ð€•€‘¿à‚ž‚ŸÇß\n\nØí€î€Ñ€Ð€ÏÒ‰€Æ€ü‚„Џ‚¯ÏƒùÏÒÇÈã¿à‚§Í‚€Í€ä€Ú€ÏóƒùÏÒâÒð€Â„§‚˜Ò‚üƒÃ…¸‚×€ú€Ê€ãÓ‚§æÆóς΂ÏÅÌ»âÒ󀄤…úƒ¼Á‚ž‚ŸóÀâÓíð€Â\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "ƒ—‚Ă݅ˆ‚Í‚•¸‚È‚ÉÇß\n", + /* 10*/ "‚€Í€ä€Ú€Ï̈́΃àÇß\n", + /* 11*/ "€î€Ñ€Ð€Ï¸„—‚áÛÄÇß\n", + /* 12*/ "…µ…¶…Ž„Á„ÊÖ„Ñ‚öÇß\n", + /* 13*/ "€Ó€÷€Ð€•€‘¿à‚ž‚ŸÇß\n", + /* 14*/ "ÃÊà‚€Í€ä€Ú€Ïð€Â\ní»÷¹€ã€ö´Ì»âß¼ð΀Â\n", + /* 15*/ "‚Éä߀€ü€ÜÒ„Šðî€Â\n", + /* 16*/ "Øí€‡€ë€ù€ÏŠ€ˆ¸…Ó„Ê€Ó€÷€ÐÏ‚´÷¹ð€Â\n", + /* 17*/ "ôÿυÞÅƒŠƒçæºâðä¼€ÂóÓƒ ó€Ž\n", + /* 18*/ "»»ï‚€Í€Ð€Ï€ä€ƒãÓ€Ô€ùÉÊæ„΃àð€Â\n", + /* 19*/ "ôÊÒ€Ó€÷€ÐÖÒŠ€Ð€ú€Ê€×¸„×Â̾»É€Âƒé€´\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "€Ô‚„€ã€Ô“\n", + /* 23*/ "", + /* 24*/ "€Ô‚„€ã€Ô“¸‚ÝÏ‚öãÉ\n", + /* 25*/ "‚€Í€Ð€Ï€ä€Ã´Êð€´\n", + /* 26*/ "€‡€ë€ù€ÏŠ€ˆÒÍÃäÖ‚ãàÎÀµÎ€Â\n", + /* 27*/ "ßÅ€€Ô€ùæÃø…£‚ÎÆâ€Â\n‚€Í€Ð€Ï€ä€€Õ‹‚„ÅÌÁ〴\n", + /* 28*/ "€¨€¤€‡Ìæ´ÌÁã€Â\n", + /* 29*/ "‚€Í€ä€Ú€Ïæ‚ÙÄãÉ\n", + /* 30*/ "€Ó€øŒ€Üæ‚ÙÄãÉ\n", + /* 31*/ "…µ…¶…Ž„Á„ÊÖÒ„Ñ‚ö‚ó‚ô\n", + /* 32*/ "€¨€¤€‚€Í€Ð€Ï€ä€Â‚Úü€´\n", + /* 33*/ "€Ô‚„€ã€Ô“‚ÂÄ\n", + /* 34*/ "€Ô‚„€ã€Ô“҃‚¢æ„ð„¬ÅÉ\n", + /* 35*/ "€Ô‚„€ã€Ô“ƒÛ„‚ó‚ô\n", + /* 36*/ "‚µ‚¶ƒ‚ÚÏ‚ ‚¡ƒ‚΃ƒƒ„æ‚΂ÏÄãÉ\n", + /* 37*/ "…Ž„Á„ÊÒ‚–‚€é€Ê€àæ„×»É\n", + /* 38*/ "…Ž„Á„ÊÒ‚–‚€é€Ê€àæ…ëÄãÉ\n", + /* 39*/ "…Ž„Á„ÊÒ‚Ž‚€é€Ê€àæ„×»É\n", + /* 40*/ "…Ž„Á„ÊÒ‚Ž‚€é€Ê€àæ…ëÄãÉ\n", + /* 41*/ "†˜Ï‚ž‚ŸÆâ‚Ô„ÏÓλå€Â\n", + /* 42*/ "…‰…ŠóÀâÒӀЀπßðÂ߀ƒŒÁ‚À´Ì€´\n", + /* 43*/ "ºÎɸÃÃÏ‚•»ÌÓ‚ÚÂλå€Â\n", + /* 44*/ "‚Ÿ‚€Ó†˜ÏܺâÓíð¿à€Ž€Â\n", + /* 45*/ "‚€Í€Ð€Ï€ä€€Ô€ùÉÊÒôÊà¿æÃÃÏ…¹´Ì\n…Ž„Á„ÊÒ€é€Ê€à¸„×Â⃇ƒƒæºâ΀Â\n", + /* 46*/ "€Ô€ùÓƒ óºÒ€í‹‚„‹€Ñ€×ó‚–Ï‚Ÿß¼€Â\n€é€Ê€à¸„×Ââ¿à€ÈÒ‚ýƒñƒ÷ÅÌÁã€Â\n", + /* 47*/ "‚€Í€ä€Ú€Ï€€Ó€øŒ€ÜÍ‚ž‚ŸÅÌ€´\nƒ”æ€é€Ê€à¸„×Ââå\n", + /* 48*/ "ƒôƒõð€Í€Ð€Ï€ä€Ž\n", + /* 49*/ "óÀâ倎€ƒ”¸ƒ¤ìÌ€Â\n", + /* 50*/ "€Ž€¨€¤€Â\n", + /* 51*/ "€×€Þ€Ž€‚€Í€Ð€Ï€ä€ƒñƒ÷¸…»Ú€´\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "…Ž„Á„ÊÒ€é€Ê€àæ„×»É\n", + /* 54*/ "† ‚¶ƒŽ„»…ÒŠ€Ðæ„×»É\n", + /* 55*/ "€î€Ñ€Ð€ÏÒƒ—‚Ă݅ˆ‚Í‚•Ó\nÀ´ÍÃÒƒìϺâÓíð倎\n", + /* 56*/ "ƒ»ó‚€Í€ä€Ú€Ï̈́΃àÅÎÀµ€Â\n€Ð€Ñ€á†¯´ÌâÙÉ»ðÅ€Ž\n", + /* 57*/ "ÃÒ€å€Ô€ÑӀހ€Ô€Ñ€øÑ€Â\nƒ†Ã¼Ò…Ž„Á„ÊÍ„÷ì€å€Ô€Ñðå\n", + /* 58*/ "€ó€áàæ„§‚˜¸€ú€Ê€×ÅÌÅØ¼ƒÏ\n‚€È€Ê€ã‹€Ñ€×óƒ‰éÎÀµ€Â\n", + /* 59*/ "¼‚„¹€ÅØ´É€´ÃãÓ€‘„±‚Àáιð€Â\n", + /* 60*/ "€’„±Ó‚ÀãâÂô€Èニ‡ËÓ€ð€÷ð€Â\n", + /* 61*/ "‚˜†äÓ€ù‰€Æ€ë€Å‚„€Ü€ãð€€ï‚„Óƒ ó€Ž\n", + /* 62*/ "ÃãÓ€Ô€ùÉÊÒÜÒìµÎ»€Âƒ¶ƒ·ÒƒÔƒƒ\nƒÂ…¶ð€Â‚–ÏÓ‚û‚ü‚ŸÅÌÓ»Âλ¹ð€Â\n", + /* 63*/ "„×ÀƒåáÝæ´Ì€ÂÙÌä߀´\n€ü€ÜÒ€Ó‚€ÖÏÎâæ»»€Â\npÃãó€’ƒ¬Íº¹Î€î€çÓ\nóÀλÓíð€´\n", + /* 64*/ "‚ª€ÃÒ…Ï€À€ØÄ¿€Ž€ü€Ü€À\n", + /* 65*/ "€ý€Ó‚„‚„‚„€Ã¹Î€éƒìµÎ¿´É€´\n", + /* 66*/ "…»Ú€„¬Ø´ÌÁ〴€Ô€ùæ‚°¹óô¼Æâ\n¹ð€´€Ð€Ñ€áð䀀þ€û€û€´\n", + /* 67*/ "‚ªÌ€Ž€Â€ƒŒÁÃø‚ŸÎÀµ€´\n", + /* 68*/ "€€í€€ÿ€í€Ž\n", + /* 69*/ "€Ò€û€Ð€Ð€Ð‚„€´€´\n", + /* 70*/ "ƒ¨ÀÌ‎€Â\nܼ†€ñðÍ„ª´ÌÉ߀Â\np€ô‚„Ӏրˀ÷€Ï€ã€Ï‚£‚¤Ò„±ðä€À\nƒËÂÌÁãɹðÑ€€Ú€Ï€Ö€Ì‚„€Â\n", + /* 71*/ "ºÎÉ€‚˜†äÒ‚©†«¸ÅµøâÒÑ€À\n", + /* 72*/ "‚Û‚ÜÏÓ†Òàåλ׼怎\n", + /* 73*/ "€Ð€â€â€â€â€â€Ž€€Ò€þ€þ€Ž\n", + /* 74*/ "ƒÆ„Ó„Ô€À\n", + /* 75*/ "†È怎€†áãȼð€Â\n€Û€Ë€ùÏιλ߀ƒ…Á€Â\n", + /* 76*/ "†ŽÂâ€À€‚‰ƒŽƒæƒâƒÏ\nƒ‰éÎÀµÎàλå€Â\n", + /* 77*/ "„܃˜ƒÆ„Ó„ÔĀ€ô‚„Ò…¼ƒÓ€À\n", + /* 78*/ "ƒ”Ó€Ó‚„‚€È€Ï€ã€…†‚„€×€Â\nóÜ€‚€Í€Ð€Ï€äó»»å€Â\n", + /* 79*/ "€¨€¤€‚€Í€Ð€Ï€ä€Â€ï‚„Ó’€ú€â€×€ß‚„€‘€Â\nó܀ހ‡€Ó€øŒ€Ü€ˆ´Ì„Õ¹óÁã€Â\n", + /* 80*/ "€Ù€Ï€Þ‚„€øÓ„þ‚ÄÅÌ»ØÇ¹\n", + /* 81*/ "‚ƒ‚‹‚ªÒ€î€çð€À€ÃÃÓ\n†¬†›…µ€Ó€÷€Ðιð€´\np„‚°Ò‚Ý‚¾À¸„Åàλҿ€´\n", + /* 82*/ "€Ñ‚„€Ü€ã€Ï„ „¡Ï‹€ùÉà\n€ß†óÓ…±ØÎ»ï€´\n", + /* 83*/ "€Ô€Ñ€´€ƒ¶ƒ·ÒƒÔƒƒƒÂ…¶Î¹ð\n‚ªÌÃÍð€Â€ü€î€ÏÎàλ€Ž\n", + /* 84*/ "ƒ”€€‡‚Ý‚¾À€ˆ´Ì€Ö€ö€ÑÎÒ€´\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/traP.c b/src/files/lang/jap-final/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/jap-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_f.c b/src/files/lang/jap-final/tra_str_f.c new file mode 100644 index 000000000..91bd5746d --- /dev/null +++ b/src/files/lang/jap-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux maians sont équipés d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de réanimer votre compagnon. Ces appareils sont réglés sur la physiologie maian. Vous trouverez ce dispositif dans l'épave ou dans les restes du vaisseau transférés aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 3: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 4: - Réanimer le garde du corps maian\n\nRéanimez le Maian avant de vous enfuir: une civière anti-grav pourrait se révéler assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 5: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 1*/ "SECTEUR 51 - FUITE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Réanimer le garde du corps maian\n\nRéanimez le Maian avant de vous enfuir: une civière anti-grav pourrait se révéler assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 4: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "Réanimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le Secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous êtes en grave danger.\n", + /* 15*/ "Ils ont inondé cette zone avec du gaz empoisonné.\n", + /* 16*/ "Allez dans le labo où se trouve notre ami. \nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent méfiants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. Dépêchez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derrière.\n", + /* 29*/ "Jonathan a été tué.\n", + /* 30*/ "Elvis a été tué.\n", + /* 31*/ "Le hangar secret a été découvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activé.\n", + /* 34*/ "Opération Medkit annulée.\n", + /* 35*/ "Medkit administré.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Ouverture porte extérieure hangar.\n", + /* 38*/ "Fermeture porte extérieure hangar.\n", + /* 39*/ "Ouverture porte intérieure hangar.\n", + /* 40*/ "fermeture porte intérieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul à pouvoir piloter, Elvis. Alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derrière.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arrière pour \nouvrir le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi \nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc médical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-là.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne \nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai sentie dans \nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir \navant la fermeture des portes.\n", + /* 59*/ "Gros problème: c'est un monoplace!\n", + /* 60*/ "Deux peuvent y entrer, pas plus.\n", + /* 61*/ "Aucun style en plus, c'est déprimant.\n", + /* 62*/ "Ce spécimen est la propriété du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera à deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas ça qui était prévu!\n", + /* 66*/ "Non, arrêter! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais être mort comme les autres. Vous êtes de l'Institut? Je vous reconnais. Vous m'avez aidé. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante déduction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au crâne. Chez nous c'est assez douloureux, nous avons une grosse tête.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Très bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est débranchée.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pièce est censée être scellée! \nVous ne connaissez pas les procédures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre ça! Ca appartient au \nGouvernement! C'est intolérable! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les procédures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_g.c b/src/files/lang/jap-final/tra_str_g.c new file mode 100644 index 000000000..bc24e0e0f --- /dev/null +++ b/src/files/lang/jap-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Gerät ausgestattet, das man als automatischen Chirurgen bezeichnen könnte. Da dieses Gerät auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Gerät befindet sich entweder unter den Trümmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das Medipack!\n", + /* 10*/ "Treffen Sie sich mit Jonathan!\n", + /* 11*/ "Wiederbeleben Sie den Maianer!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flüchten Sie aus der Area 51!\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor. \nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glück!\n", + /* 18*/ "Gute Arbeit, Jo. Wir müssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors geföffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen\n", + /* 25*/ "Joanna! Hier drüben.\n", + /* 26*/ "Wir müssen zu unserem Freund zurück.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurück!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert\n", + /* 34*/ "Medipack-Atkivität unterbrochen\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Äußeres Hangartor wird geöffnet.\n", + /* 38*/ "Äußeres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geöffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir können dich nicht zurücklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu öffnen.\n", + /* 46*/ "Ich flüchte mit dem Hoverbike. Gebt mir Deckung, \nwährend ich die Tore öffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kümmere mich um die Konsolen.\n", + /* 48*/ "Es ist gefährlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kümmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Türen zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten gerät.\n", + /* 57*/ "Dieser Geruch... Öl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausgänge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur für EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das war´s dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du weißt, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie diese selbstgefällige Diebin mit Nervengas klarkommt. Sie wird es sich in Zukunft überlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das für ein Geräusch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhören! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir müssen raus hier.\n", + /* 68*/ "Keuchen, röcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich würde so wie die anderen auseinander genommen. Sie müssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Größe will das was heißen.\n", + /* 76*/ "Können Sie gehen? Wir müssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie heißen Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hölle machen Sie hier? \nDieser Raum ist nur für autorisiertes Personal! \nWissen Sie den gar nichts über die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darüber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie dürfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe für Vorschriften nicht viel übrig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_i.c b/src/files/lang/jap-final/tra_str_i.c new file mode 100644 index 000000000..3c30a308a --- /dev/null +++ b/src/files/lang/jap-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso è il modo più veloce e sicuro per svegliare un Maian, dal momento che è progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, qui è Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. Lì c'è un nascondiglio.\n", + /* 17*/ "Mi metterò di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan è stato ucciso!\n", + /* 30*/ "Elvis è stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Somministrato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "È l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimanere indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andrò io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "È pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho già sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. È una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di più!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare è proprietà governativa e non può assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penserà due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos'è quel rumore? Non può... È gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota... Dobbiamo uscire di qua! Subito!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Però... è sveglia!!!", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c'è niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "Sì, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /* 83*/ "Non può prendere quello! È proprietà governativa! \nÈ intollerabile! È... è... \nè inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/jap-final/tra_str_s.c b/src/files/lang/jap-final/tra_str_s.c new file mode 100644 index 000000000..9d77f5302 --- /dev/null +++ b/src/files/lang/jap-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Alienígena de AutoCirugía\n\nTodas las naves Maian llevan un dispositivo de AutoCirugía. Utilizarlo es el método más rápido y seguro de despertarle, ya que ha sido diseñado para la fisiología Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cinco: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "ÁREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cuatro: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete médico alienígena\n", + /* 10*/ "Encontrar al espía del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del Área 51\n", + /* 14*/ "¿Joanna? Jonathan al habla. Estás en peligro de muerte.\n", + /* 15*/ "Han inundado el área con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contención. \nAllí hay un lugar secreto.\n", + /* 17*/ "Contactaré contigo cuando estés allí. ¡Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Están \nsospechando de mí.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contención. Deprisa.\n", + /* 20*/ "Obtén el paquete médico alienígena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paq. médico\n", + /* 23*/ "", + /* 24*/ "Paquete médico alienígena obtenido.\n", + /* 25*/ "Joanna. Aquí.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cúbreme, Joanna...\n", + /* 28*/ "Vale. Apártate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete médico alienígena activado.\n", + /* 34*/ "Operación del paquete médico abortada.\n", + /* 35*/ "El paquete médico alienígena ha sido administrado.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el único camino para salir de aquí.\n", + /* 42*/ "Eres el único que puede pilotarlo, Elvis, así que entra.\n", + /* 43*/ "Pero no podemos dejarte atrás.\n", + /* 44*/ "Tiene que haber un camino para salir de aquí.\n", + /* 45*/ "Uno de nosotros debe quedarse atrás para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldré en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocuparé de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Créeme.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldición, Joanna... ¡cúbreme!\n", + /* 52*/ "Cubriré las escaleras. Tú toma la rampa.\n", + /* 53*/ "Las puertas del hangar están abiertas.\n", + /* 54*/ "Puertas de contención médica abiertas.\n", + /* 55*/ "El paquete médico debería estar por aquí.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en más problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los \notros hangares.\n", + /* 58*/ "La aeromoto me sacará de aquí antes de que \ncierren la base.\n", + /* 59*/ "¡Oh, no! Tenemos un problema. ¡Es monoplaza!\n", + /* 60*/ "Cabrían dos, pero ninguno más.\n", + /* 61*/ "Además, no tiene estilo. ¿Sabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese espécimen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qué tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. ¡Se lo pensará dos veces antes de jorobarme otra vez!\n", + /* 64*/ "¿Qué es ese ruido? No puede ser... ¡Gas!\n", + /* 65*/ "¡Noooo, esto no debía ocurrir!\n", + /* 66*/ "¡Por favor, para! Se supone que no debo morir. Ella... ¡Arggghhh!\n", + /* 67*/ "¡Idiota! Será mejor que salgamos de aquí.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***¡Aahh...! ¡Aahaa...! ¡Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que había caído como los otros. Eres del Instituto, ¿no es así? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "Tú... ¿Tú hablas nuestro idioma?\n", + /* 72*/ "Mírala... qué lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "¿Qué pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como ésta, no es cuestión de broma.\n", + /* 76*/ "¿Puedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que sí. ¿Cómo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero tú puedes llamarme... ¡Elvis!\n", + /* 80*/ "La consola no está activa.\n", + /* 81*/ "¿Qué demonios se supone que haces? \n¡Se supone que esto es una habitación sellada! \n¿No sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "¡No puedes coger eso! ¡Es propiedad del gobierno! \n¡Esto es intolerable! ¡No es... ¡No es... \n...profesional!!\n", + /* 84*/ "¡No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/uffE.c b/src/files/lang/jap-final/uffE.c similarity index 100% rename from src/files/lang/uffE.c rename to src/files/lang/jap-final/uffE.c diff --git a/src/files/lang/uffJ.c b/src/files/lang/jap-final/uffJ.c similarity index 100% rename from src/files/lang/uffJ.c rename to src/files/lang/jap-final/uffJ.c diff --git a/src/files/lang/uffP.c b/src/files/lang/jap-final/uffP.c similarity index 100% rename from src/files/lang/uffP.c rename to src/files/lang/jap-final/uffP.c diff --git a/src/files/lang/uff_str_f.c b/src/files/lang/jap-final/uff_str_f.c similarity index 100% rename from src/files/lang/uff_str_f.c rename to src/files/lang/jap-final/uff_str_f.c diff --git a/src/files/lang/uff_str_g.c b/src/files/lang/jap-final/uff_str_g.c similarity index 100% rename from src/files/lang/uff_str_g.c rename to src/files/lang/jap-final/uff_str_g.c diff --git a/src/files/lang/uff_str_i.c b/src/files/lang/jap-final/uff_str_i.c similarity index 100% rename from src/files/lang/uff_str_i.c rename to src/files/lang/jap-final/uff_str_i.c diff --git a/src/files/lang/uff_str_s.c b/src/files/lang/jap-final/uff_str_s.c similarity index 100% rename from src/files/lang/uff_str_s.c rename to src/files/lang/jap-final/uff_str_s.c diff --git a/src/files/lang/waxE.c b/src/files/lang/jap-final/waxE.c similarity index 100% rename from src/files/lang/waxE.c rename to src/files/lang/jap-final/waxE.c diff --git a/src/files/lang/jap-final/waxJ.c b/src/files/lang/jap-final/waxJ.c new file mode 100644 index 000000000..9f69387b5 --- /dev/null +++ b/src/files/lang/jap-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚˜†ä„±Ò‚¤„“€‰‚„€ß†€Ñ€Ï„“Òƒ¼‚¢Î€Õ€Ú€ÏŠ€öÓ€‚ä‚…€Ü€Ø†‚„Ïʹ̃…ÁƒûσüÉο´É€Â‰‚„€ß†€Ñ€ÏÒ„·„“τтöÅ€€Õ€Ú€ÏŠ€ö¸…ÛØ½ä€Â€Ü€Ø†‚„Ò†…††Øó„ãã…Íá€ÈÅÌ€Ž€Â\n\n|‚µ‚¶€‘€¾€Ó€ùŽ‚„€ß‚„Ï…£…¤¸€Ý€Ê€ã\n\n†œ‚¢Î‰‚„€ß†€Ñ€ÏÒ………†ƒîôÜÓ€€Ü€Ø†‚„Ò€â€×€è€ú‚‚„¸ƒ˜Â„”½âÏÕÄåÅÁλ€Â€Ó€ùŽ‚„€ß‚„Ï…£…¤¸€Ý€Ê€ãÅ€€ó€áàÒƒ…ÌÒ„ÿ…€‰‚„€ßÍ€ƒÍ„ÖÆâƒ°ƒÑ„è„é¸‚Î‚ÏÆâÒð€Â\n\n|‚µ‚¶€’€¾‰€Æ€ü‚„Š€÷‚„†‚„¸‚ÙÇ\n\n‰€Æ€ü‚„ŠÒ€÷‚„†‚„¸‚ÙÅ€€ó€áàÒ…¹†½æ€ƒ•ƒ ‚ä‚…Ï‚—‚üÆâÃÍÎô‚û‚üλ߼€ƒê…Â҅ขû´Ì¾ÁÒð€Â‚ä‚…Ò”€÷€Û‚„óܺ „±‚ý҅Ⴒ€ˆÜƒÆ„ðæ€„÷ƒ“Ï€ó€áàÒ€÷Ž€Ï‚Ò€û‚„¸‹€ÕÏÅÌÓ»Âλ€Â\n\n|‚µ‚¶€“€¾€Õ€Ú€ÏŠ€ö¸„ã‚ÚÇß\n\n€ó€áÒ†ÏÓ…©ÄãâÜÒóÓλ€´€€ó€á¸‚È‚ÉŅ߇ËÒ€ì€÷”‚„€ãØó„ã‚ÚÆâÒð€Â€Û€Ë€ã€øæ€ó€á¸‚ÒƒÕÆâÃÍÏÎâ€Âƒ‡íƒ¨ÀÉØØ„ãã̃â߼πÂ\n\nEND\n", + /* 1*/ "€ø€Ú‚„€Ï€…€ß€û‚„\n", + /* 2*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚˜†ä„±Ò‚¤„“€‰‚„€ß†€Ñ€Ï„“Òƒ¼‚¢Î€Õ€Ú€ÏŠ€öÓ€‚ä‚…€Ü€Ø†‚„Ïʹ̃…ÁƒûσüÉο´É€Â‰‚„€ß†€Ñ€ÏÒ„·„“τтöÅ€€Õ€Ú€ÏŠ€ö¸…ÛØ½ä€Â€Ü€Ø†‚„Ò†…††Øó„ãã…Íá€ÈÅÌ€Ž€Â\n\n|‚µ‚¶€‘€¾€Ó€ùŽ‚„€ß‚„Ï…£…¤¸€Ý€Ê€ã\n\n†œ‚¢Î‰‚„€ß†€Ñ€ÏÒ………†ƒîôÜÓ€€Ü€Ø†‚„Ò€â€×€è€ú‚‚„¸ƒ˜Â„”½âÏÕÄåÅÁλ€Â€Ó€ùŽ‚„€ß‚„Ï…£…¤¸€Ý€Ê€ãÅ€€ó€áàÒƒ…ÌÒ„ÿ…€‰‚„€ßÍ€ƒÍ„ÖÆâƒ°ƒÑ„è„é¸‚Î‚ÏÆâÒð€Â\n\n|‚µ‚¶€’€¾€Õ€Ú€ÏŠ€ö¸„ã‚ÚÇß\n\n€ó€áÒ†ÏÓ…©ÄãâÜÒóÓλ€´€€ó€á¸‚È‚ÉŅ߇ËÒ€ì€÷”‚„€ãØó„ã‚ÚÆâÒð€Â€Û€Ë€ã€øæ€ó€á¸‚ÒƒÕÆâÃÍÏÎâ€Âƒ‡íƒ¨ÀÉØØ„ãã̃â߼πÂ\n\nEND\n", + /* 3*/ "|€Ü€â‚„‚‚‡‚ˆ€¾\n\n‚˜†ä„±Ò‚¤„“€‰‚„€ß†€Ñ€Ï„“Òƒ¼‚¢Î€Õ€Ú€ÏŠ€öÓ€‚ä‚…€Ü€Ø†‚„Ïʹ̃…ÁƒûσüÉο´É€Â‰‚„€ß†€Ñ€ÏÒ„·„“τтöÅ€€Õ€Ú€ÏŠ€ö¸…ÛØ½ä€Â€Ü€Ø†‚„Ò†…††Øó„ãã…Íá€ÈÅÌ€Ž€Â\n\n|‚µ‚¶€‘€¾€Õ€Ú€ÏŠ€ö¸„ã‚ÚÇß\n\n€ó€áÒ†ÏÓ…©ÄãâÜÒóÓλ€´€€ó€á¸‚È‚ÉŅ߇ËÒ€ì€÷”‚„€ãØó„ã‚ÚÆâÒð€Â€Û€Ë€ã€øæ€ó€á¸‚ÒƒÕÆâÃÍÏÎâ€Âƒ‡íƒ¨ÀÉØØ„ãã̃â߼πÂ\n\nEND\n", + /* 4*/ "€Õ€Ú€ÏŠ€ö¸„ã‚ÚÇß\n", + /* 5*/ "€Ó€ùŽ‚„€ß‚„Ï…£…¤¸€Ý€Ê€ã\n", + /* 6*/ "‰€Æ€ü‚„Š€÷‚„†‚„¸‚ÙÇ\n", + /* 7*/ "ƒ”Ò€Ô€ë€Æ€Ü¿à‚ŸÌ‚ÚÀÎÄ»€´\n", + /* 8*/ "ƒéæ…ÝÅ¿´Éà€ì€÷”‚„€ãÖÆè‚ÚÁ¹ð€´\n", + /* 9*/ "ÃÒƒ”¸‚×ÌâåÂæÎ»å€Â\n", + /* 10*/ "ƒ”σ†¿´Ì‚ªÍ»¼ƒÙƒ¬ÎÒ€´\n", + /* 11*/ "ƒ•󠆕Æâ߀Ž\n", + /* 12*/ "ƒ”æºÎÉÒƒüƒŠÎà€ÆèÃøƒöâåÑ€´\n", + /* 13*/ "ÃÒƒ”¸‚×ÌâåÂæÎ»å€Â\n", + /* 14*/ "€Õ€Ú€ÏŠ€öÓ‚ÄÂÎÁδɀÂ\n", + /* 15*/ "€Õ€Ú€ÏŠ€öÓƒ¼„Ï…Û†ÊÄãÉ€Â\n", + /* 16*/ "‰€Æ€ü‚„ŠÒ€÷‚„†‚„¸‚ÙÅÉ€Â\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "€Ü€Ø†‚„…£…¤\n", + /* 20*/ "€Ü€Ø†‚„…£…¤\n", + /* 21*/ "€Ü€Ø†‚„…£…¤¸‚ÝÏ‚öãÉ€Â\n", + /* 22*/ "€Ü€Ø†‚„…£…¤æ… ÅÁ€Ý€Ê€ãÄãÉ€Â\n", + /* 23*/ "€Ü€Ø†‚„…£…¤æ…£‚ÈÅÉ€Â\n", + /* 24*/ "€Ó€ùŽ‚„€ß‚„ÒŠ€Ðæ€ú€Ê€×ÄãÌ»ØÆ\n…£…¤¸ƒ›áËÂâÃÍæóÀØÇ¹€Â\n", + /* 25*/ "€Ó€ùŽ‚„€ß‚„æ‚ ‚¢ÏÄãÉ€Â\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/waxP.c b/src/files/lang/jap-final/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/jap-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_f.c b/src/files/lang/jap-final/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/jap-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette créature pour annuler toute possibilité de représailles contre les Skedars par des éléments résiduels de cette corporation infidèle. L'idée d'humains réussissant à menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries à Héliport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef sécurité dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu'à l'héliport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me déranger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Immédiatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a été immobilisée.\n", + /* 15*/ "Cassandra a été capturée.\n", + /* 16*/ "Le chef de la Sécurité a été éliminé.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a été placée correctement.\n", + /* 23*/ "La Bombe skedar a explosé.\n", + /* 24*/ "Porte d'ascenseur verrouillée - La bombe ne peut être placée.\n", + /* 25*/ "Ascenseur désactivé.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_g.c b/src/files/lang/jap-final/wax_str_g.c new file mode 100644 index 000000000..16fb3516c --- /dev/null +++ b/src/files/lang/jap-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrünnigen Firma gegen die Skedar von vorneherein auszuschließen. So lachhaft die Vorstellung, dass die Menschen die Skedar auslöschen könnten, auch sein mag, man darf die Macht einer Vendetta nicht unterschätzen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Büro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schießen!\n", + /* 10*/ "Wie können Sie es wagen, mich zu stören?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie wäre, würde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schießen!\n", + /* 14*/ "Cassandra wurde eliminiert.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Sicherheitschef eliminiert\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstüren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Aufzug inaktiv\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_i.c b/src/files/lang/jap-final/wax_str_i.c new file mode 100644 index 000000000..4a37745b7 --- /dev/null +++ b/src/files/lang/jap-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa annientare la razza umana, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra è immobilizzata!\n", + /* 15*/ "Cassandra è stata catturata!\n", + /* 16*/ "Il capo della sicurezza è stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar è in posizione corretta.\n", + /* 23*/ "La bomba Skedar è esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore è stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/jap-final/wax_str_s.c b/src/files/lang/jap-final/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/jap-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Eliminar al Capitán de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporación. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capitán de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "¡No me dispararás!\n", + /* 10*/ "¡Cómo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusión, chica.\n", + /* 12*/ "Si yo fuera tú, me marcharía... ¡AHORA!\n", + /* 13*/ "¡No me dispararás!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con éxito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con éxito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/ameE.c b/src/files/lang/ntsc-1.0/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ameJ.c b/src/files/lang/ntsc-1.0/ameJ.c similarity index 100% rename from src/files/lang/ameJ.c rename to src/files/lang/ntsc-1.0/ameJ.c diff --git a/src/files/lang/ameP.c b/src/files/lang/ntsc-1.0/ameP.c similarity index 100% rename from src/files/lang/ameP.c rename to src/files/lang/ntsc-1.0/ameP.c diff --git a/src/files/lang/ame_str_f.c b/src/files/lang/ntsc-1.0/ame_str_f.c similarity index 100% rename from src/files/lang/ame_str_f.c rename to src/files/lang/ntsc-1.0/ame_str_f.c diff --git a/src/files/lang/ame_str_g.c b/src/files/lang/ntsc-1.0/ame_str_g.c similarity index 100% rename from src/files/lang/ame_str_g.c rename to src/files/lang/ntsc-1.0/ame_str_g.c diff --git a/src/files/lang/ame_str_i.c b/src/files/lang/ntsc-1.0/ame_str_i.c similarity index 100% rename from src/files/lang/ame_str_i.c rename to src/files/lang/ntsc-1.0/ame_str_i.c diff --git a/src/files/lang/ame_str_s.c b/src/files/lang/ntsc-1.0/ame_str_s.c similarity index 100% rename from src/files/lang/ame_str_s.c rename to src/files/lang/ntsc-1.0/ame_str_s.c diff --git a/src/files/lang/ntsc-1.0/archE.c b/src/files/lang/ntsc-1.0/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/archJ.c b/src/files/lang/ntsc-1.0/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/archP.c b/src/files/lang/ntsc-1.0/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_f.c b/src/files/lang/ntsc-1.0/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_g.c b/src/files/lang/ntsc-1.0/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_i.c b/src/files/lang/ntsc-1.0/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arch_str_s.c b/src/files/lang/ntsc-1.0/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecE.c b/src/files/lang/ntsc-1.0/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecJ.c b/src/files/lang/ntsc-1.0/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arecP.c b/src/files/lang/ntsc-1.0/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_f.c b/src/files/lang/ntsc-1.0/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_g.c b/src/files/lang/ntsc-1.0/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_i.c b/src/files/lang/ntsc-1.0/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arec_str_s.c b/src/files/lang/ntsc-1.0/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/arkE.c b/src/files/lang/ntsc-1.0/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/ntsc-1.0/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/arkJ.c b/src/files/lang/ntsc-1.0/arkJ.c similarity index 100% rename from src/files/lang/arkJ.c rename to src/files/lang/ntsc-1.0/arkJ.c diff --git a/src/files/lang/arkP.c b/src/files/lang/ntsc-1.0/arkP.c similarity index 100% rename from src/files/lang/arkP.c rename to src/files/lang/ntsc-1.0/arkP.c diff --git a/src/files/lang/ark_str_f.c b/src/files/lang/ntsc-1.0/ark_str_f.c similarity index 100% rename from src/files/lang/ark_str_f.c rename to src/files/lang/ntsc-1.0/ark_str_f.c diff --git a/src/files/lang/ark_str_g.c b/src/files/lang/ntsc-1.0/ark_str_g.c similarity index 100% rename from src/files/lang/ark_str_g.c rename to src/files/lang/ntsc-1.0/ark_str_g.c diff --git a/src/files/lang/ark_str_i.c b/src/files/lang/ntsc-1.0/ark_str_i.c similarity index 100% rename from src/files/lang/ark_str_i.c rename to src/files/lang/ntsc-1.0/ark_str_i.c diff --git a/src/files/lang/ark_str_s.c b/src/files/lang/ntsc-1.0/ark_str_s.c similarity index 100% rename from src/files/lang/ark_str_s.c rename to src/files/lang/ntsc-1.0/ark_str_s.c diff --git a/src/files/lang/ntsc-1.0/ashE.c b/src/files/lang/ntsc-1.0/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ashJ.c b/src/files/lang/ntsc-1.0/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ashP.c b/src/files/lang/ntsc-1.0/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_f.c b/src/files/lang/ntsc-1.0/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_g.c b/src/files/lang/ntsc-1.0/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_i.c b/src/files/lang/ntsc-1.0/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ash_str_s.c b/src/files/lang/ntsc-1.0/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ate_str_f.c b/src/files/lang/ntsc-1.0/ateE.c similarity index 100% rename from src/files/lang/ate_str_f.c rename to src/files/lang/ntsc-1.0/ateE.c diff --git a/src/files/lang/ateJ.c b/src/files/lang/ntsc-1.0/ateJ.c similarity index 100% rename from src/files/lang/ateJ.c rename to src/files/lang/ntsc-1.0/ateJ.c diff --git a/src/files/lang/ate_str_g.c b/src/files/lang/ntsc-1.0/ateP.c similarity index 100% rename from src/files/lang/ate_str_g.c rename to src/files/lang/ntsc-1.0/ateP.c diff --git a/src/files/lang/ate_str_i.c b/src/files/lang/ntsc-1.0/ate_str_f.c similarity index 100% rename from src/files/lang/ate_str_i.c rename to src/files/lang/ntsc-1.0/ate_str_f.c diff --git a/src/files/lang/ate_str_s.c b/src/files/lang/ntsc-1.0/ate_str_g.c similarity index 100% rename from src/files/lang/ate_str_s.c rename to src/files/lang/ntsc-1.0/ate_str_g.c diff --git a/src/files/lang/ntsc-1.0/ate_str_i.c b/src/files/lang/ntsc-1.0/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/ate_str_s.c b/src/files/lang/ntsc-1.0/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/aztE.c b/src/files/lang/ntsc-1.0/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/ntsc-1.0/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/aztJ.c b/src/files/lang/ntsc-1.0/aztJ.c similarity index 100% rename from src/files/lang/aztJ.c rename to src/files/lang/ntsc-1.0/aztJ.c diff --git a/src/files/lang/aztP.c b/src/files/lang/ntsc-1.0/aztP.c similarity index 100% rename from src/files/lang/aztP.c rename to src/files/lang/ntsc-1.0/aztP.c diff --git a/src/files/lang/azt_str_f.c b/src/files/lang/ntsc-1.0/azt_str_f.c similarity index 100% rename from src/files/lang/azt_str_f.c rename to src/files/lang/ntsc-1.0/azt_str_f.c diff --git a/src/files/lang/azt_str_g.c b/src/files/lang/ntsc-1.0/azt_str_g.c similarity index 100% rename from src/files/lang/azt_str_g.c rename to src/files/lang/ntsc-1.0/azt_str_g.c diff --git a/src/files/lang/azt_str_i.c b/src/files/lang/ntsc-1.0/azt_str_i.c similarity index 100% rename from src/files/lang/azt_str_i.c rename to src/files/lang/ntsc-1.0/azt_str_i.c diff --git a/src/files/lang/azt_str_s.c b/src/files/lang/ntsc-1.0/azt_str_s.c similarity index 100% rename from src/files/lang/azt_str_s.c rename to src/files/lang/ntsc-1.0/azt_str_s.c diff --git a/src/files/lang/ntsc-1.0/catE.c b/src/files/lang/ntsc-1.0/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/catJ.c b/src/files/lang/ntsc-1.0/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/catP.c b/src/files/lang/ntsc-1.0/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_f.c b/src/files/lang/ntsc-1.0/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_g.c b/src/files/lang/ntsc-1.0/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_i.c b/src/files/lang/ntsc-1.0/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cat_str_s.c b/src/files/lang/ntsc-1.0/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/caveE.c b/src/files/lang/ntsc-1.0/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/ntsc-1.0/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/caveJ.c b/src/files/lang/ntsc-1.0/caveJ.c similarity index 100% rename from src/files/lang/caveJ.c rename to src/files/lang/ntsc-1.0/caveJ.c diff --git a/src/files/lang/caveP.c b/src/files/lang/ntsc-1.0/caveP.c similarity index 100% rename from src/files/lang/caveP.c rename to src/files/lang/ntsc-1.0/caveP.c diff --git a/src/files/lang/cave_str_f.c b/src/files/lang/ntsc-1.0/cave_str_f.c similarity index 100% rename from src/files/lang/cave_str_f.c rename to src/files/lang/ntsc-1.0/cave_str_f.c diff --git a/src/files/lang/cave_str_g.c b/src/files/lang/ntsc-1.0/cave_str_g.c similarity index 100% rename from src/files/lang/cave_str_g.c rename to src/files/lang/ntsc-1.0/cave_str_g.c diff --git a/src/files/lang/cave_str_i.c b/src/files/lang/ntsc-1.0/cave_str_i.c similarity index 100% rename from src/files/lang/cave_str_i.c rename to src/files/lang/ntsc-1.0/cave_str_i.c diff --git a/src/files/lang/cave_str_s.c b/src/files/lang/ntsc-1.0/cave_str_s.c similarity index 100% rename from src/files/lang/cave_str_s.c rename to src/files/lang/ntsc-1.0/cave_str_s.c diff --git a/src/files/lang/ntsc-1.0/cradE.c b/src/files/lang/ntsc-1.0/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cradJ.c b/src/files/lang/ntsc-1.0/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cradP.c b/src/files/lang/ntsc-1.0/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_f.c b/src/files/lang/ntsc-1.0/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_g.c b/src/files/lang/ntsc-1.0/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_i.c b/src/files/lang/ntsc-1.0/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crad_str_s.c b/src/files/lang/ntsc-1.0/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypE.c b/src/files/lang/ntsc-1.0/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypJ.c b/src/files/lang/ntsc-1.0/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/crypP.c b/src/files/lang/ntsc-1.0/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_f.c b/src/files/lang/ntsc-1.0/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_g.c b/src/files/lang/ntsc-1.0/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_i.c b/src/files/lang/ntsc-1.0/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/cryp_str_s.c b/src/files/lang/ntsc-1.0/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/damE.c b/src/files/lang/ntsc-1.0/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/ntsc-1.0/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/damJ.c b/src/files/lang/ntsc-1.0/damJ.c similarity index 100% rename from src/files/lang/damJ.c rename to src/files/lang/ntsc-1.0/damJ.c diff --git a/src/files/lang/damP.c b/src/files/lang/ntsc-1.0/damP.c similarity index 100% rename from src/files/lang/damP.c rename to src/files/lang/ntsc-1.0/damP.c diff --git a/src/files/lang/dam_str_f.c b/src/files/lang/ntsc-1.0/dam_str_f.c similarity index 100% rename from src/files/lang/dam_str_f.c rename to src/files/lang/ntsc-1.0/dam_str_f.c diff --git a/src/files/lang/dam_str_g.c b/src/files/lang/ntsc-1.0/dam_str_g.c similarity index 100% rename from src/files/lang/dam_str_g.c rename to src/files/lang/ntsc-1.0/dam_str_g.c diff --git a/src/files/lang/dam_str_i.c b/src/files/lang/ntsc-1.0/dam_str_i.c similarity index 100% rename from src/files/lang/dam_str_i.c rename to src/files/lang/ntsc-1.0/dam_str_i.c diff --git a/src/files/lang/dam_str_s.c b/src/files/lang/ntsc-1.0/dam_str_s.c similarity index 100% rename from src/files/lang/dam_str_s.c rename to src/files/lang/ntsc-1.0/dam_str_s.c diff --git a/src/files/lang/ntsc-1.0/depoE.c b/src/files/lang/ntsc-1.0/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/ntsc-1.0/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/depoJ.c b/src/files/lang/ntsc-1.0/depoJ.c similarity index 100% rename from src/files/lang/depoJ.c rename to src/files/lang/ntsc-1.0/depoJ.c diff --git a/src/files/lang/depoP.c b/src/files/lang/ntsc-1.0/depoP.c similarity index 100% rename from src/files/lang/depoP.c rename to src/files/lang/ntsc-1.0/depoP.c diff --git a/src/files/lang/depo_str_f.c b/src/files/lang/ntsc-1.0/depo_str_f.c similarity index 100% rename from src/files/lang/depo_str_f.c rename to src/files/lang/ntsc-1.0/depo_str_f.c diff --git a/src/files/lang/depo_str_g.c b/src/files/lang/ntsc-1.0/depo_str_g.c similarity index 100% rename from src/files/lang/depo_str_g.c rename to src/files/lang/ntsc-1.0/depo_str_g.c diff --git a/src/files/lang/depo_str_i.c b/src/files/lang/ntsc-1.0/depo_str_i.c similarity index 100% rename from src/files/lang/depo_str_i.c rename to src/files/lang/ntsc-1.0/depo_str_i.c diff --git a/src/files/lang/depo_str_s.c b/src/files/lang/ntsc-1.0/depo_str_s.c similarity index 100% rename from src/files/lang/depo_str_s.c rename to src/files/lang/ntsc-1.0/depo_str_s.c diff --git a/src/files/lang/ntsc-1.0/destE.c b/src/files/lang/ntsc-1.0/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/destJ.c b/src/files/lang/ntsc-1.0/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/destP.c b/src/files/lang/ntsc-1.0/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_f.c b/src/files/lang/ntsc-1.0/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_g.c b/src/files/lang/ntsc-1.0/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_i.c b/src/files/lang/ntsc-1.0/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/dest_str_s.c b/src/files/lang/ntsc-1.0/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/dishE.c b/src/files/lang/ntsc-1.0/dishE.c similarity index 100% rename from src/files/lang/dishE.c rename to src/files/lang/ntsc-1.0/dishE.c diff --git a/src/files/lang/dishJ.c b/src/files/lang/ntsc-1.0/dishJ.c similarity index 100% rename from src/files/lang/dishJ.c rename to src/files/lang/ntsc-1.0/dishJ.c diff --git a/src/files/lang/dishP.c b/src/files/lang/ntsc-1.0/dishP.c similarity index 100% rename from src/files/lang/dishP.c rename to src/files/lang/ntsc-1.0/dishP.c diff --git a/src/files/lang/dish_str_f.c b/src/files/lang/ntsc-1.0/dish_str_f.c similarity index 100% rename from src/files/lang/dish_str_f.c rename to src/files/lang/ntsc-1.0/dish_str_f.c diff --git a/src/files/lang/dish_str_g.c b/src/files/lang/ntsc-1.0/dish_str_g.c similarity index 100% rename from src/files/lang/dish_str_g.c rename to src/files/lang/ntsc-1.0/dish_str_g.c diff --git a/src/files/lang/dish_str_i.c b/src/files/lang/ntsc-1.0/dish_str_i.c similarity index 100% rename from src/files/lang/dish_str_i.c rename to src/files/lang/ntsc-1.0/dish_str_i.c diff --git a/src/files/lang/dish_str_s.c b/src/files/lang/ntsc-1.0/dish_str_s.c similarity index 100% rename from src/files/lang/dish_str_s.c rename to src/files/lang/ntsc-1.0/dish_str_s.c diff --git a/src/files/lang/ntsc-1.0/earE.c b/src/files/lang/ntsc-1.0/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/ntsc-1.0/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/earJ.c b/src/files/lang/ntsc-1.0/earJ.c similarity index 100% rename from src/files/lang/earJ.c rename to src/files/lang/ntsc-1.0/earJ.c diff --git a/src/files/lang/earP.c b/src/files/lang/ntsc-1.0/earP.c similarity index 100% rename from src/files/lang/earP.c rename to src/files/lang/ntsc-1.0/earP.c diff --git a/src/files/lang/ear_str_f.c b/src/files/lang/ntsc-1.0/ear_str_f.c similarity index 100% rename from src/files/lang/ear_str_f.c rename to src/files/lang/ntsc-1.0/ear_str_f.c diff --git a/src/files/lang/ear_str_g.c b/src/files/lang/ntsc-1.0/ear_str_g.c similarity index 100% rename from src/files/lang/ear_str_g.c rename to src/files/lang/ntsc-1.0/ear_str_g.c diff --git a/src/files/lang/ear_str_i.c b/src/files/lang/ntsc-1.0/ear_str_i.c similarity index 100% rename from src/files/lang/ear_str_i.c rename to src/files/lang/ntsc-1.0/ear_str_i.c diff --git a/src/files/lang/ear_str_s.c b/src/files/lang/ntsc-1.0/ear_str_s.c similarity index 100% rename from src/files/lang/ear_str_s.c rename to src/files/lang/ntsc-1.0/ear_str_s.c diff --git a/src/files/lang/eldE.c b/src/files/lang/ntsc-1.0/eldE.c similarity index 100% rename from src/files/lang/eldE.c rename to src/files/lang/ntsc-1.0/eldE.c diff --git a/src/files/lang/eldJ.c b/src/files/lang/ntsc-1.0/eldJ.c similarity index 100% rename from src/files/lang/eldJ.c rename to src/files/lang/ntsc-1.0/eldJ.c diff --git a/src/files/lang/eldP.c b/src/files/lang/ntsc-1.0/eldP.c similarity index 100% rename from src/files/lang/eldP.c rename to src/files/lang/ntsc-1.0/eldP.c diff --git a/src/files/lang/eld_str_f.c b/src/files/lang/ntsc-1.0/eld_str_f.c similarity index 100% rename from src/files/lang/eld_str_f.c rename to src/files/lang/ntsc-1.0/eld_str_f.c diff --git a/src/files/lang/eld_str_g.c b/src/files/lang/ntsc-1.0/eld_str_g.c similarity index 100% rename from src/files/lang/eld_str_g.c rename to src/files/lang/ntsc-1.0/eld_str_g.c diff --git a/src/files/lang/eld_str_i.c b/src/files/lang/ntsc-1.0/eld_str_i.c similarity index 100% rename from src/files/lang/eld_str_i.c rename to src/files/lang/ntsc-1.0/eld_str_i.c diff --git a/src/files/lang/eld_str_s.c b/src/files/lang/ntsc-1.0/eld_str_s.c similarity index 100% rename from src/files/lang/eld_str_s.c rename to src/files/lang/ntsc-1.0/eld_str_s.c diff --git a/src/files/lang/gunE.c b/src/files/lang/ntsc-1.0/gunE.c similarity index 100% rename from src/files/lang/gunE.c rename to src/files/lang/ntsc-1.0/gunE.c diff --git a/src/files/lang/gunJ.c b/src/files/lang/ntsc-1.0/gunJ.c similarity index 100% rename from src/files/lang/gunJ.c rename to src/files/lang/ntsc-1.0/gunJ.c diff --git a/src/files/lang/gunP.c b/src/files/lang/ntsc-1.0/gunP.c similarity index 100% rename from src/files/lang/gunP.c rename to src/files/lang/ntsc-1.0/gunP.c diff --git a/src/files/lang/gun_str_f.c b/src/files/lang/ntsc-1.0/gun_str_f.c similarity index 100% rename from src/files/lang/gun_str_f.c rename to src/files/lang/ntsc-1.0/gun_str_f.c diff --git a/src/files/lang/gun_str_g.c b/src/files/lang/ntsc-1.0/gun_str_g.c similarity index 100% rename from src/files/lang/gun_str_g.c rename to src/files/lang/ntsc-1.0/gun_str_g.c diff --git a/src/files/lang/gun_str_i.c b/src/files/lang/ntsc-1.0/gun_str_i.c similarity index 100% rename from src/files/lang/gun_str_i.c rename to src/files/lang/ntsc-1.0/gun_str_i.c diff --git a/src/files/lang/gun_str_s.c b/src/files/lang/ntsc-1.0/gun_str_s.c similarity index 100% rename from src/files/lang/gun_str_s.c rename to src/files/lang/ntsc-1.0/gun_str_s.c diff --git a/src/files/lang/ntsc-1.0/impE.c b/src/files/lang/ntsc-1.0/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/ntsc-1.0/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/impJ.c b/src/files/lang/ntsc-1.0/impJ.c similarity index 100% rename from src/files/lang/impJ.c rename to src/files/lang/ntsc-1.0/impJ.c diff --git a/src/files/lang/impP.c b/src/files/lang/ntsc-1.0/impP.c similarity index 100% rename from src/files/lang/impP.c rename to src/files/lang/ntsc-1.0/impP.c diff --git a/src/files/lang/imp_str_f.c b/src/files/lang/ntsc-1.0/imp_str_f.c similarity index 100% rename from src/files/lang/imp_str_f.c rename to src/files/lang/ntsc-1.0/imp_str_f.c diff --git a/src/files/lang/imp_str_g.c b/src/files/lang/ntsc-1.0/imp_str_g.c similarity index 100% rename from src/files/lang/imp_str_g.c rename to src/files/lang/ntsc-1.0/imp_str_g.c diff --git a/src/files/lang/imp_str_i.c b/src/files/lang/ntsc-1.0/imp_str_i.c similarity index 100% rename from src/files/lang/imp_str_i.c rename to src/files/lang/ntsc-1.0/imp_str_i.c diff --git a/src/files/lang/imp_str_s.c b/src/files/lang/ntsc-1.0/imp_str_s.c similarity index 100% rename from src/files/lang/imp_str_s.c rename to src/files/lang/ntsc-1.0/imp_str_s.c diff --git a/src/files/lang/ntsc-1.0/junE.c b/src/files/lang/ntsc-1.0/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/junJ.c b/src/files/lang/ntsc-1.0/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/junP.c b/src/files/lang/ntsc-1.0/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_f.c b/src/files/lang/ntsc-1.0/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_g.c b/src/files/lang/ntsc-1.0/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_i.c b/src/files/lang/ntsc-1.0/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/jun_str_s.c b/src/files/lang/ntsc-1.0/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamE.c b/src/files/lang/ntsc-1.0/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamJ.c b/src/files/lang/ntsc-1.0/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lamP.c b/src/files/lang/ntsc-1.0/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_f.c b/src/files/lang/ntsc-1.0/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_g.c b/src/files/lang/ntsc-1.0/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_i.c b/src/files/lang/ntsc-1.0/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lam_str_s.c b/src/files/lang/ntsc-1.0/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/leeE.c b/src/files/lang/ntsc-1.0/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/ntsc-1.0/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/leeJ.c b/src/files/lang/ntsc-1.0/leeJ.c similarity index 100% rename from src/files/lang/leeJ.c rename to src/files/lang/ntsc-1.0/leeJ.c diff --git a/src/files/lang/leeP.c b/src/files/lang/ntsc-1.0/leeP.c similarity index 100% rename from src/files/lang/leeP.c rename to src/files/lang/ntsc-1.0/leeP.c diff --git a/src/files/lang/lee_str_f.c b/src/files/lang/ntsc-1.0/lee_str_f.c similarity index 100% rename from src/files/lang/lee_str_f.c rename to src/files/lang/ntsc-1.0/lee_str_f.c diff --git a/src/files/lang/lee_str_g.c b/src/files/lang/ntsc-1.0/lee_str_g.c similarity index 100% rename from src/files/lang/lee_str_g.c rename to src/files/lang/ntsc-1.0/lee_str_g.c diff --git a/src/files/lang/lee_str_i.c b/src/files/lang/ntsc-1.0/lee_str_i.c similarity index 100% rename from src/files/lang/lee_str_i.c rename to src/files/lang/ntsc-1.0/lee_str_i.c diff --git a/src/files/lang/lee_str_s.c b/src/files/lang/ntsc-1.0/lee_str_s.c similarity index 100% rename from src/files/lang/lee_str_s.c rename to src/files/lang/ntsc-1.0/lee_str_s.c diff --git a/src/files/lang/ntsc-1.0/lenE.c b/src/files/lang/ntsc-1.0/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lenJ.c b/src/files/lang/ntsc-1.0/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lenP.c b/src/files/lang/ntsc-1.0/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_f.c b/src/files/lang/ntsc-1.0/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_g.c b/src/files/lang/ntsc-1.0/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_i.c b/src/files/lang/ntsc-1.0/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/len_str_s.c b/src/files/lang/ntsc-1.0/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/lipE.c b/src/files/lang/ntsc-1.0/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/lipJ.c b/src/files/lang/ntsc-1.0/lipJ.c similarity index 100% rename from src/files/lang/lipJ.c rename to src/files/lang/ntsc-1.0/lipJ.c diff --git a/src/files/lang/lipP.c b/src/files/lang/ntsc-1.0/lipP.c similarity index 100% rename from src/files/lang/lipP.c rename to src/files/lang/ntsc-1.0/lipP.c diff --git a/src/files/lang/lip_str_f.c b/src/files/lang/ntsc-1.0/lip_str_f.c similarity index 100% rename from src/files/lang/lip_str_f.c rename to src/files/lang/ntsc-1.0/lip_str_f.c diff --git a/src/files/lang/lip_str_g.c b/src/files/lang/ntsc-1.0/lip_str_g.c similarity index 100% rename from src/files/lang/lip_str_g.c rename to src/files/lang/ntsc-1.0/lip_str_g.c diff --git a/src/files/lang/lip_str_i.c b/src/files/lang/ntsc-1.0/lip_str_i.c similarity index 100% rename from src/files/lang/lip_str_i.c rename to src/files/lang/ntsc-1.0/lip_str_i.c diff --git a/src/files/lang/lip_str_s.c b/src/files/lang/ntsc-1.0/lip_str_s.c similarity index 100% rename from src/files/lang/lip_str_s.c rename to src/files/lang/ntsc-1.0/lip_str_s.c diff --git a/src/files/lang/ntsc-1.0/lueE.c b/src/files/lang/ntsc-1.0/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/ntsc-1.0/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/lueJ.c b/src/files/lang/ntsc-1.0/lueJ.c similarity index 100% rename from src/files/lang/lueJ.c rename to src/files/lang/ntsc-1.0/lueJ.c diff --git a/src/files/lang/lueP.c b/src/files/lang/ntsc-1.0/lueP.c similarity index 100% rename from src/files/lang/lueP.c rename to src/files/lang/ntsc-1.0/lueP.c diff --git a/src/files/lang/lue_str_f.c b/src/files/lang/ntsc-1.0/lue_str_f.c similarity index 100% rename from src/files/lang/lue_str_f.c rename to src/files/lang/ntsc-1.0/lue_str_f.c diff --git a/src/files/lang/lue_str_g.c b/src/files/lang/ntsc-1.0/lue_str_g.c similarity index 100% rename from src/files/lang/lue_str_g.c rename to src/files/lang/ntsc-1.0/lue_str_g.c diff --git a/src/files/lang/lue_str_i.c b/src/files/lang/ntsc-1.0/lue_str_i.c similarity index 100% rename from src/files/lang/lue_str_i.c rename to src/files/lang/ntsc-1.0/lue_str_i.c diff --git a/src/files/lang/lue_str_s.c b/src/files/lang/ntsc-1.0/lue_str_s.c similarity index 100% rename from src/files/lang/lue_str_s.c rename to src/files/lang/ntsc-1.0/lue_str_s.c diff --git a/src/files/lang/miscE.c b/src/files/lang/ntsc-1.0/miscE.c similarity index 100% rename from src/files/lang/miscE.c rename to src/files/lang/ntsc-1.0/miscE.c diff --git a/src/files/lang/miscJ.c b/src/files/lang/ntsc-1.0/miscJ.c similarity index 100% rename from src/files/lang/miscJ.c rename to src/files/lang/ntsc-1.0/miscJ.c diff --git a/src/files/lang/miscP.c b/src/files/lang/ntsc-1.0/miscP.c similarity index 100% rename from src/files/lang/miscP.c rename to src/files/lang/ntsc-1.0/miscP.c diff --git a/src/files/lang/misc_str_f.c b/src/files/lang/ntsc-1.0/misc_str_f.c similarity index 100% rename from src/files/lang/misc_str_f.c rename to src/files/lang/ntsc-1.0/misc_str_f.c diff --git a/src/files/lang/misc_str_g.c b/src/files/lang/ntsc-1.0/misc_str_g.c similarity index 100% rename from src/files/lang/misc_str_g.c rename to src/files/lang/ntsc-1.0/misc_str_g.c diff --git a/src/files/lang/misc_str_i.c b/src/files/lang/ntsc-1.0/misc_str_i.c similarity index 100% rename from src/files/lang/misc_str_i.c rename to src/files/lang/ntsc-1.0/misc_str_i.c diff --git a/src/files/lang/misc_str_s.c b/src/files/lang/ntsc-1.0/misc_str_s.c similarity index 100% rename from src/files/lang/misc_str_s.c rename to src/files/lang/ntsc-1.0/misc_str_s.c diff --git a/src/files/lang/ntsc-1.0/mp10E.c b/src/files/lang/ntsc-1.0/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10J.c b/src/files/lang/ntsc-1.0/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10P.c b/src/files/lang/ntsc-1.0/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_f.c b/src/files/lang/ntsc-1.0/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_g.c b/src/files/lang/ntsc-1.0/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_i.c b/src/files/lang/ntsc-1.0/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp10_str_s.c b/src/files/lang/ntsc-1.0/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11E.c b/src/files/lang/ntsc-1.0/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11J.c b/src/files/lang/ntsc-1.0/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11P.c b/src/files/lang/ntsc-1.0/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_f.c b/src/files/lang/ntsc-1.0/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_g.c b/src/files/lang/ntsc-1.0/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_i.c b/src/files/lang/ntsc-1.0/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp11_str_s.c b/src/files/lang/ntsc-1.0/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12E.c b/src/files/lang/ntsc-1.0/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12J.c b/src/files/lang/ntsc-1.0/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12P.c b/src/files/lang/ntsc-1.0/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_f.c b/src/files/lang/ntsc-1.0/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_g.c b/src/files/lang/ntsc-1.0/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_i.c b/src/files/lang/ntsc-1.0/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp12_str_s.c b/src/files/lang/ntsc-1.0/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13E.c b/src/files/lang/ntsc-1.0/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13J.c b/src/files/lang/ntsc-1.0/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13P.c b/src/files/lang/ntsc-1.0/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_f.c b/src/files/lang/ntsc-1.0/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_g.c b/src/files/lang/ntsc-1.0/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_i.c b/src/files/lang/ntsc-1.0/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp13_str_s.c b/src/files/lang/ntsc-1.0/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14E.c b/src/files/lang/ntsc-1.0/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14J.c b/src/files/lang/ntsc-1.0/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14P.c b/src/files/lang/ntsc-1.0/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_f.c b/src/files/lang/ntsc-1.0/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_g.c b/src/files/lang/ntsc-1.0/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_i.c b/src/files/lang/ntsc-1.0/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp14_str_s.c b/src/files/lang/ntsc-1.0/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15E.c b/src/files/lang/ntsc-1.0/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15J.c b/src/files/lang/ntsc-1.0/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15P.c b/src/files/lang/ntsc-1.0/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_f.c b/src/files/lang/ntsc-1.0/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_g.c b/src/files/lang/ntsc-1.0/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_i.c b/src/files/lang/ntsc-1.0/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp15_str_s.c b/src/files/lang/ntsc-1.0/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16E.c b/src/files/lang/ntsc-1.0/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16J.c b/src/files/lang/ntsc-1.0/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16P.c b/src/files/lang/ntsc-1.0/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_f.c b/src/files/lang/ntsc-1.0/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_g.c b/src/files/lang/ntsc-1.0/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_i.c b/src/files/lang/ntsc-1.0/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp16_str_s.c b/src/files/lang/ntsc-1.0/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17E.c b/src/files/lang/ntsc-1.0/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17J.c b/src/files/lang/ntsc-1.0/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17P.c b/src/files/lang/ntsc-1.0/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_f.c b/src/files/lang/ntsc-1.0/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_g.c b/src/files/lang/ntsc-1.0/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_i.c b/src/files/lang/ntsc-1.0/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp17_str_s.c b/src/files/lang/ntsc-1.0/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18E.c b/src/files/lang/ntsc-1.0/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18J.c b/src/files/lang/ntsc-1.0/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18P.c b/src/files/lang/ntsc-1.0/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_f.c b/src/files/lang/ntsc-1.0/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_g.c b/src/files/lang/ntsc-1.0/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_i.c b/src/files/lang/ntsc-1.0/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp18_str_s.c b/src/files/lang/ntsc-1.0/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19E.c b/src/files/lang/ntsc-1.0/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19J.c b/src/files/lang/ntsc-1.0/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19P.c b/src/files/lang/ntsc-1.0/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_f.c b/src/files/lang/ntsc-1.0/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_g.c b/src/files/lang/ntsc-1.0/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_i.c b/src/files/lang/ntsc-1.0/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp19_str_s.c b/src/files/lang/ntsc-1.0/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1E.c b/src/files/lang/ntsc-1.0/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1J.c b/src/files/lang/ntsc-1.0/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1P.c b/src/files/lang/ntsc-1.0/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_f.c b/src/files/lang/ntsc-1.0/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_g.c b/src/files/lang/ntsc-1.0/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_i.c b/src/files/lang/ntsc-1.0/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp1_str_s.c b/src/files/lang/ntsc-1.0/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20E.c b/src/files/lang/ntsc-1.0/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20J.c b/src/files/lang/ntsc-1.0/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20P.c b/src/files/lang/ntsc-1.0/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_f.c b/src/files/lang/ntsc-1.0/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_g.c b/src/files/lang/ntsc-1.0/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_i.c b/src/files/lang/ntsc-1.0/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp20_str_s.c b/src/files/lang/ntsc-1.0/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2E.c b/src/files/lang/ntsc-1.0/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2J.c b/src/files/lang/ntsc-1.0/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2P.c b/src/files/lang/ntsc-1.0/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_f.c b/src/files/lang/ntsc-1.0/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_g.c b/src/files/lang/ntsc-1.0/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_i.c b/src/files/lang/ntsc-1.0/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp2_str_s.c b/src/files/lang/ntsc-1.0/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3E.c b/src/files/lang/ntsc-1.0/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3J.c b/src/files/lang/ntsc-1.0/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3P.c b/src/files/lang/ntsc-1.0/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_f.c b/src/files/lang/ntsc-1.0/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_g.c b/src/files/lang/ntsc-1.0/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_i.c b/src/files/lang/ntsc-1.0/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp3_str_s.c b/src/files/lang/ntsc-1.0/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4E.c b/src/files/lang/ntsc-1.0/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4J.c b/src/files/lang/ntsc-1.0/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4P.c b/src/files/lang/ntsc-1.0/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_f.c b/src/files/lang/ntsc-1.0/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_g.c b/src/files/lang/ntsc-1.0/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_i.c b/src/files/lang/ntsc-1.0/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp4_str_s.c b/src/files/lang/ntsc-1.0/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5E.c b/src/files/lang/ntsc-1.0/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5J.c b/src/files/lang/ntsc-1.0/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5P.c b/src/files/lang/ntsc-1.0/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_f.c b/src/files/lang/ntsc-1.0/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_g.c b/src/files/lang/ntsc-1.0/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_i.c b/src/files/lang/ntsc-1.0/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp5_str_s.c b/src/files/lang/ntsc-1.0/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6E.c b/src/files/lang/ntsc-1.0/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6J.c b/src/files/lang/ntsc-1.0/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6P.c b/src/files/lang/ntsc-1.0/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_f.c b/src/files/lang/ntsc-1.0/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_g.c b/src/files/lang/ntsc-1.0/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_i.c b/src/files/lang/ntsc-1.0/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp6_str_s.c b/src/files/lang/ntsc-1.0/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7E.c b/src/files/lang/ntsc-1.0/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7J.c b/src/files/lang/ntsc-1.0/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7P.c b/src/files/lang/ntsc-1.0/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_f.c b/src/files/lang/ntsc-1.0/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_g.c b/src/files/lang/ntsc-1.0/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_i.c b/src/files/lang/ntsc-1.0/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp7_str_s.c b/src/files/lang/ntsc-1.0/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8E.c b/src/files/lang/ntsc-1.0/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8J.c b/src/files/lang/ntsc-1.0/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8P.c b/src/files/lang/ntsc-1.0/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_f.c b/src/files/lang/ntsc-1.0/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_g.c b/src/files/lang/ntsc-1.0/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_i.c b/src/files/lang/ntsc-1.0/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp8_str_s.c b/src/files/lang/ntsc-1.0/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9E.c b/src/files/lang/ntsc-1.0/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9J.c b/src/files/lang/ntsc-1.0/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9P.c b/src/files/lang/ntsc-1.0/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_f.c b/src/files/lang/ntsc-1.0/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_g.c b/src/files/lang/ntsc-1.0/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_i.c b/src/files/lang/ntsc-1.0/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mp9_str_s.c b/src/files/lang/ntsc-1.0/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/mpmenuE.c b/src/files/lang/ntsc-1.0/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/ntsc-1.0/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/mpmenuJ.c b/src/files/lang/ntsc-1.0/mpmenuJ.c similarity index 100% rename from src/files/lang/mpmenuJ.c rename to src/files/lang/ntsc-1.0/mpmenuJ.c diff --git a/src/files/lang/mpmenuP.c b/src/files/lang/ntsc-1.0/mpmenuP.c similarity index 100% rename from src/files/lang/mpmenuP.c rename to src/files/lang/ntsc-1.0/mpmenuP.c diff --git a/src/files/lang/mpmenu_str_f.c b/src/files/lang/ntsc-1.0/mpmenu_str_f.c similarity index 100% rename from src/files/lang/mpmenu_str_f.c rename to src/files/lang/ntsc-1.0/mpmenu_str_f.c diff --git a/src/files/lang/mpmenu_str_g.c b/src/files/lang/ntsc-1.0/mpmenu_str_g.c similarity index 100% rename from src/files/lang/mpmenu_str_g.c rename to src/files/lang/ntsc-1.0/mpmenu_str_g.c diff --git a/src/files/lang/mpmenu_str_i.c b/src/files/lang/ntsc-1.0/mpmenu_str_i.c similarity index 100% rename from src/files/lang/mpmenu_str_i.c rename to src/files/lang/ntsc-1.0/mpmenu_str_i.c diff --git a/src/files/lang/mpmenu_str_s.c b/src/files/lang/ntsc-1.0/mpmenu_str_s.c similarity index 100% rename from src/files/lang/mpmenu_str_s.c rename to src/files/lang/ntsc-1.0/mpmenu_str_s.c diff --git a/src/files/lang/mpweaponsE.c b/src/files/lang/ntsc-1.0/mpweaponsE.c similarity index 100% rename from src/files/lang/mpweaponsE.c rename to src/files/lang/ntsc-1.0/mpweaponsE.c diff --git a/src/files/lang/mpweaponsJ.c b/src/files/lang/ntsc-1.0/mpweaponsJ.c similarity index 100% rename from src/files/lang/mpweaponsJ.c rename to src/files/lang/ntsc-1.0/mpweaponsJ.c diff --git a/src/files/lang/mpweaponsP.c b/src/files/lang/ntsc-1.0/mpweaponsP.c similarity index 100% rename from src/files/lang/mpweaponsP.c rename to src/files/lang/ntsc-1.0/mpweaponsP.c diff --git a/src/files/lang/mpweapons_str_f.c b/src/files/lang/ntsc-1.0/mpweapons_str_f.c similarity index 100% rename from src/files/lang/mpweapons_str_f.c rename to src/files/lang/ntsc-1.0/mpweapons_str_f.c diff --git a/src/files/lang/mpweapons_str_g.c b/src/files/lang/ntsc-1.0/mpweapons_str_g.c similarity index 100% rename from src/files/lang/mpweapons_str_g.c rename to src/files/lang/ntsc-1.0/mpweapons_str_g.c diff --git a/src/files/lang/mpweapons_str_i.c b/src/files/lang/ntsc-1.0/mpweapons_str_i.c similarity index 100% rename from src/files/lang/mpweapons_str_i.c rename to src/files/lang/ntsc-1.0/mpweapons_str_i.c diff --git a/src/files/lang/mpweapons_str_s.c b/src/files/lang/ntsc-1.0/mpweapons_str_s.c similarity index 100% rename from src/files/lang/mpweapons_str_s.c rename to src/files/lang/ntsc-1.0/mpweapons_str_s.c diff --git a/src/files/lang/ntsc-1.0/oatE.c b/src/files/lang/ntsc-1.0/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oatJ.c b/src/files/lang/ntsc-1.0/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oatP.c b/src/files/lang/ntsc-1.0/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_f.c b/src/files/lang/ntsc-1.0/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_g.c b/src/files/lang/ntsc-1.0/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_i.c b/src/files/lang/ntsc-1.0/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oat_str_s.c b/src/files/lang/ntsc-1.0/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldE.c b/src/files/lang/ntsc-1.0/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldJ.c b/src/files/lang/ntsc-1.0/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/oldP.c b/src/files/lang/ntsc-1.0/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_f.c b/src/files/lang/ntsc-1.0/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_g.c b/src/files/lang/ntsc-1.0/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_i.c b/src/files/lang/ntsc-1.0/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/old_str_s.c b/src/files/lang/ntsc-1.0/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/optionsE.c b/src/files/lang/ntsc-1.0/optionsE.c similarity index 100% rename from src/files/lang/optionsE.c rename to src/files/lang/ntsc-1.0/optionsE.c diff --git a/src/files/lang/optionsJ.c b/src/files/lang/ntsc-1.0/optionsJ.c similarity index 100% rename from src/files/lang/optionsJ.c rename to src/files/lang/ntsc-1.0/optionsJ.c diff --git a/src/files/lang/optionsP.c b/src/files/lang/ntsc-1.0/optionsP.c similarity index 100% rename from src/files/lang/optionsP.c rename to src/files/lang/ntsc-1.0/optionsP.c diff --git a/src/files/lang/options_str_f.c b/src/files/lang/ntsc-1.0/options_str_f.c similarity index 100% rename from src/files/lang/options_str_f.c rename to src/files/lang/ntsc-1.0/options_str_f.c diff --git a/src/files/lang/options_str_g.c b/src/files/lang/ntsc-1.0/options_str_g.c similarity index 100% rename from src/files/lang/options_str_g.c rename to src/files/lang/ntsc-1.0/options_str_g.c diff --git a/src/files/lang/options_str_i.c b/src/files/lang/ntsc-1.0/options_str_i.c similarity index 100% rename from src/files/lang/options_str_i.c rename to src/files/lang/ntsc-1.0/options_str_i.c diff --git a/src/files/lang/options_str_s.c b/src/files/lang/ntsc-1.0/options_str_s.c similarity index 100% rename from src/files/lang/options_str_s.c rename to src/files/lang/ntsc-1.0/options_str_s.c diff --git a/src/files/lang/ntsc-1.0/pamE.c b/src/files/lang/ntsc-1.0/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/ntsc-1.0/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pamJ.c b/src/files/lang/ntsc-1.0/pamJ.c similarity index 100% rename from src/files/lang/pamJ.c rename to src/files/lang/ntsc-1.0/pamJ.c diff --git a/src/files/lang/pamP.c b/src/files/lang/ntsc-1.0/pamP.c similarity index 100% rename from src/files/lang/pamP.c rename to src/files/lang/ntsc-1.0/pamP.c diff --git a/src/files/lang/pam_str_f.c b/src/files/lang/ntsc-1.0/pam_str_f.c similarity index 100% rename from src/files/lang/pam_str_f.c rename to src/files/lang/ntsc-1.0/pam_str_f.c diff --git a/src/files/lang/pam_str_g.c b/src/files/lang/ntsc-1.0/pam_str_g.c similarity index 100% rename from src/files/lang/pam_str_g.c rename to src/files/lang/ntsc-1.0/pam_str_g.c diff --git a/src/files/lang/pam_str_i.c b/src/files/lang/ntsc-1.0/pam_str_i.c similarity index 100% rename from src/files/lang/pam_str_i.c rename to src/files/lang/ntsc-1.0/pam_str_i.c diff --git a/src/files/lang/pam_str_s.c b/src/files/lang/ntsc-1.0/pam_str_s.c similarity index 100% rename from src/files/lang/pam_str_s.c rename to src/files/lang/ntsc-1.0/pam_str_s.c diff --git a/src/files/lang/ntsc-1.0/peteE.c b/src/files/lang/ntsc-1.0/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/ntsc-1.0/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/peteJ.c b/src/files/lang/ntsc-1.0/peteJ.c similarity index 100% rename from src/files/lang/peteJ.c rename to src/files/lang/ntsc-1.0/peteJ.c diff --git a/src/files/lang/peteP.c b/src/files/lang/ntsc-1.0/peteP.c similarity index 100% rename from src/files/lang/peteP.c rename to src/files/lang/ntsc-1.0/peteP.c diff --git a/src/files/lang/pete_str_f.c b/src/files/lang/ntsc-1.0/pete_str_f.c similarity index 100% rename from src/files/lang/pete_str_f.c rename to src/files/lang/ntsc-1.0/pete_str_f.c diff --git a/src/files/lang/pete_str_g.c b/src/files/lang/ntsc-1.0/pete_str_g.c similarity index 100% rename from src/files/lang/pete_str_g.c rename to src/files/lang/ntsc-1.0/pete_str_g.c diff --git a/src/files/lang/pete_str_i.c b/src/files/lang/ntsc-1.0/pete_str_i.c similarity index 100% rename from src/files/lang/pete_str_i.c rename to src/files/lang/ntsc-1.0/pete_str_i.c diff --git a/src/files/lang/pete_str_s.c b/src/files/lang/ntsc-1.0/pete_str_s.c similarity index 100% rename from src/files/lang/pete_str_s.c rename to src/files/lang/ntsc-1.0/pete_str_s.c diff --git a/src/files/lang/propobjE.c b/src/files/lang/ntsc-1.0/propobjE.c similarity index 100% rename from src/files/lang/propobjE.c rename to src/files/lang/ntsc-1.0/propobjE.c diff --git a/src/files/lang/propobjJ.c b/src/files/lang/ntsc-1.0/propobjJ.c similarity index 100% rename from src/files/lang/propobjJ.c rename to src/files/lang/ntsc-1.0/propobjJ.c diff --git a/src/files/lang/propobjP.c b/src/files/lang/ntsc-1.0/propobjP.c similarity index 100% rename from src/files/lang/propobjP.c rename to src/files/lang/ntsc-1.0/propobjP.c diff --git a/src/files/lang/propobj_str_f.c b/src/files/lang/ntsc-1.0/propobj_str_f.c similarity index 100% rename from src/files/lang/propobj_str_f.c rename to src/files/lang/ntsc-1.0/propobj_str_f.c diff --git a/src/files/lang/propobj_str_g.c b/src/files/lang/ntsc-1.0/propobj_str_g.c similarity index 100% rename from src/files/lang/propobj_str_g.c rename to src/files/lang/ntsc-1.0/propobj_str_g.c diff --git a/src/files/lang/propobj_str_i.c b/src/files/lang/ntsc-1.0/propobj_str_i.c similarity index 100% rename from src/files/lang/propobj_str_i.c rename to src/files/lang/ntsc-1.0/propobj_str_i.c diff --git a/src/files/lang/propobj_str_s.c b/src/files/lang/ntsc-1.0/propobj_str_s.c similarity index 100% rename from src/files/lang/propobj_str_s.c rename to src/files/lang/ntsc-1.0/propobj_str_s.c diff --git a/src/files/lang/ntsc-1.0/refE.c b/src/files/lang/ntsc-1.0/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/refJ.c b/src/files/lang/ntsc-1.0/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/refP.c b/src/files/lang/ntsc-1.0/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_f.c b/src/files/lang/ntsc-1.0/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_g.c b/src/files/lang/ntsc-1.0/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_i.c b/src/files/lang/ntsc-1.0/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ref_str_s.c b/src/files/lang/ntsc-1.0/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/ritE.c b/src/files/lang/ntsc-1.0/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/ntsc-1.0/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ritJ.c b/src/files/lang/ntsc-1.0/ritJ.c similarity index 100% rename from src/files/lang/ritJ.c rename to src/files/lang/ntsc-1.0/ritJ.c diff --git a/src/files/lang/ritP.c b/src/files/lang/ntsc-1.0/ritP.c similarity index 100% rename from src/files/lang/ritP.c rename to src/files/lang/ntsc-1.0/ritP.c diff --git a/src/files/lang/rit_str_f.c b/src/files/lang/ntsc-1.0/rit_str_f.c similarity index 100% rename from src/files/lang/rit_str_f.c rename to src/files/lang/ntsc-1.0/rit_str_f.c diff --git a/src/files/lang/rit_str_g.c b/src/files/lang/ntsc-1.0/rit_str_g.c similarity index 100% rename from src/files/lang/rit_str_g.c rename to src/files/lang/ntsc-1.0/rit_str_g.c diff --git a/src/files/lang/rit_str_i.c b/src/files/lang/ntsc-1.0/rit_str_i.c similarity index 100% rename from src/files/lang/rit_str_i.c rename to src/files/lang/ntsc-1.0/rit_str_i.c diff --git a/src/files/lang/rit_str_s.c b/src/files/lang/ntsc-1.0/rit_str_s.c similarity index 100% rename from src/files/lang/rit_str_s.c rename to src/files/lang/ntsc-1.0/rit_str_s.c diff --git a/src/files/lang/ntsc-1.0/runE.c b/src/files/lang/ntsc-1.0/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/runJ.c b/src/files/lang/ntsc-1.0/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/runP.c b/src/files/lang/ntsc-1.0/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_f.c b/src/files/lang/ntsc-1.0/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_g.c b/src/files/lang/ntsc-1.0/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_i.c b/src/files/lang/ntsc-1.0/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/run_str_s.c b/src/files/lang/ntsc-1.0/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevE.c b/src/files/lang/ntsc-1.0/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/sevJ.c b/src/files/lang/ntsc-1.0/sevJ.c similarity index 100% rename from src/files/lang/sevJ.c rename to src/files/lang/ntsc-1.0/sevJ.c diff --git a/src/files/lang/sevP.c b/src/files/lang/ntsc-1.0/sevP.c similarity index 100% rename from src/files/lang/sevP.c rename to src/files/lang/ntsc-1.0/sevP.c diff --git a/src/files/lang/sev_str_f.c b/src/files/lang/ntsc-1.0/sev_str_f.c similarity index 100% rename from src/files/lang/sev_str_f.c rename to src/files/lang/ntsc-1.0/sev_str_f.c diff --git a/src/files/lang/sev_str_g.c b/src/files/lang/ntsc-1.0/sev_str_g.c similarity index 100% rename from src/files/lang/sev_str_g.c rename to src/files/lang/ntsc-1.0/sev_str_g.c diff --git a/src/files/lang/sev_str_i.c b/src/files/lang/ntsc-1.0/sev_str_i.c similarity index 100% rename from src/files/lang/sev_str_i.c rename to src/files/lang/ntsc-1.0/sev_str_i.c diff --git a/src/files/lang/sev_str_s.c b/src/files/lang/ntsc-1.0/sev_str_s.c similarity index 100% rename from src/files/lang/sev_str_s.c rename to src/files/lang/ntsc-1.0/sev_str_s.c diff --git a/src/files/lang/ntsc-1.0/sevbE.c b/src/files/lang/ntsc-1.0/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevbJ.c b/src/files/lang/ntsc-1.0/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevbP.c b/src/files/lang/ntsc-1.0/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_f.c b/src/files/lang/ntsc-1.0/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_g.c b/src/files/lang/ntsc-1.0/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_i.c b/src/files/lang/ntsc-1.0/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevb_str_s.c b/src/files/lang/ntsc-1.0/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/sevxE.c b/src/files/lang/ntsc-1.0/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxJ.c b/src/files/lang/ntsc-1.0/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxP.c b/src/files/lang/ntsc-1.0/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_f.c b/src/files/lang/ntsc-1.0/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_g.c b/src/files/lang/ntsc-1.0/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_i.c b/src/files/lang/ntsc-1.0/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevx_str_s.c b/src/files/lang/ntsc-1.0/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbE.c b/src/files/lang/ntsc-1.0/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbJ.c b/src/files/lang/ntsc-1.0/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxbP.c b/src/files/lang/ntsc-1.0/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_f.c b/src/files/lang/ntsc-1.0/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_g.c b/src/files/lang/ntsc-1.0/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_i.c b/src/files/lang/ntsc-1.0/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/sevxb_str_s.c b/src/files/lang/ntsc-1.0/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/shoE.c b/src/files/lang/ntsc-1.0/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/ntsc-1.0/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/shoJ.c b/src/files/lang/ntsc-1.0/shoJ.c similarity index 100% rename from src/files/lang/shoJ.c rename to src/files/lang/ntsc-1.0/shoJ.c diff --git a/src/files/lang/shoP.c b/src/files/lang/ntsc-1.0/shoP.c similarity index 100% rename from src/files/lang/shoP.c rename to src/files/lang/ntsc-1.0/shoP.c diff --git a/src/files/lang/sho_str_f.c b/src/files/lang/ntsc-1.0/sho_str_f.c similarity index 100% rename from src/files/lang/sho_str_f.c rename to src/files/lang/ntsc-1.0/sho_str_f.c diff --git a/src/files/lang/sho_str_g.c b/src/files/lang/ntsc-1.0/sho_str_g.c similarity index 100% rename from src/files/lang/sho_str_g.c rename to src/files/lang/ntsc-1.0/sho_str_g.c diff --git a/src/files/lang/sho_str_i.c b/src/files/lang/ntsc-1.0/sho_str_i.c similarity index 100% rename from src/files/lang/sho_str_i.c rename to src/files/lang/ntsc-1.0/sho_str_i.c diff --git a/src/files/lang/sho_str_s.c b/src/files/lang/ntsc-1.0/sho_str_s.c similarity index 100% rename from src/files/lang/sho_str_s.c rename to src/files/lang/ntsc-1.0/sho_str_s.c diff --git a/src/files/lang/ntsc-1.0/siloE.c b/src/files/lang/ntsc-1.0/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/siloJ.c b/src/files/lang/ntsc-1.0/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/siloP.c b/src/files/lang/ntsc-1.0/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_f.c b/src/files/lang/ntsc-1.0/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_g.c b/src/files/lang/ntsc-1.0/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_i.c b/src/files/lang/ntsc-1.0/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/silo_str_s.c b/src/files/lang/ntsc-1.0/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/stat_str_f.c b/src/files/lang/ntsc-1.0/statE.c similarity index 100% rename from src/files/lang/stat_str_f.c rename to src/files/lang/ntsc-1.0/statE.c diff --git a/src/files/lang/statJ.c b/src/files/lang/ntsc-1.0/statJ.c similarity index 100% rename from src/files/lang/statJ.c rename to src/files/lang/ntsc-1.0/statJ.c diff --git a/src/files/lang/stat_str_g.c b/src/files/lang/ntsc-1.0/statP.c similarity index 100% rename from src/files/lang/stat_str_g.c rename to src/files/lang/ntsc-1.0/statP.c diff --git a/src/files/lang/stat_str_i.c b/src/files/lang/ntsc-1.0/stat_str_f.c similarity index 100% rename from src/files/lang/stat_str_i.c rename to src/files/lang/ntsc-1.0/stat_str_f.c diff --git a/src/files/lang/stat_str_s.c b/src/files/lang/ntsc-1.0/stat_str_g.c similarity index 100% rename from src/files/lang/stat_str_s.c rename to src/files/lang/ntsc-1.0/stat_str_g.c diff --git a/src/files/lang/ntsc-1.0/stat_str_i.c b/src/files/lang/ntsc-1.0/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-1.0/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-1.0/stat_str_s.c b/src/files/lang/ntsc-1.0/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-1.0/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/titleE.c b/src/files/lang/ntsc-1.0/titleE.c similarity index 100% rename from src/files/lang/titleE.c rename to src/files/lang/ntsc-1.0/titleE.c diff --git a/src/files/lang/titleJ.c b/src/files/lang/ntsc-1.0/titleJ.c similarity index 100% rename from src/files/lang/titleJ.c rename to src/files/lang/ntsc-1.0/titleJ.c diff --git a/src/files/lang/titleP.c b/src/files/lang/ntsc-1.0/titleP.c similarity index 100% rename from src/files/lang/titleP.c rename to src/files/lang/ntsc-1.0/titleP.c diff --git a/src/files/lang/title_str_f.c b/src/files/lang/ntsc-1.0/title_str_f.c similarity index 100% rename from src/files/lang/title_str_f.c rename to src/files/lang/ntsc-1.0/title_str_f.c diff --git a/src/files/lang/title_str_g.c b/src/files/lang/ntsc-1.0/title_str_g.c similarity index 100% rename from src/files/lang/title_str_g.c rename to src/files/lang/ntsc-1.0/title_str_g.c diff --git a/src/files/lang/title_str_i.c b/src/files/lang/ntsc-1.0/title_str_i.c similarity index 100% rename from src/files/lang/title_str_i.c rename to src/files/lang/ntsc-1.0/title_str_i.c diff --git a/src/files/lang/title_str_s.c b/src/files/lang/ntsc-1.0/title_str_s.c similarity index 100% rename from src/files/lang/title_str_s.c rename to src/files/lang/ntsc-1.0/title_str_s.c diff --git a/src/files/lang/ntsc-1.0/traE.c b/src/files/lang/ntsc-1.0/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/ntsc-1.0/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/traJ.c b/src/files/lang/ntsc-1.0/traJ.c similarity index 100% rename from src/files/lang/traJ.c rename to src/files/lang/ntsc-1.0/traJ.c diff --git a/src/files/lang/traP.c b/src/files/lang/ntsc-1.0/traP.c similarity index 100% rename from src/files/lang/traP.c rename to src/files/lang/ntsc-1.0/traP.c diff --git a/src/files/lang/tra_str_f.c b/src/files/lang/ntsc-1.0/tra_str_f.c similarity index 100% rename from src/files/lang/tra_str_f.c rename to src/files/lang/ntsc-1.0/tra_str_f.c diff --git a/src/files/lang/tra_str_g.c b/src/files/lang/ntsc-1.0/tra_str_g.c similarity index 100% rename from src/files/lang/tra_str_g.c rename to src/files/lang/ntsc-1.0/tra_str_g.c diff --git a/src/files/lang/tra_str_i.c b/src/files/lang/ntsc-1.0/tra_str_i.c similarity index 100% rename from src/files/lang/tra_str_i.c rename to src/files/lang/ntsc-1.0/tra_str_i.c diff --git a/src/files/lang/tra_str_s.c b/src/files/lang/ntsc-1.0/tra_str_s.c similarity index 100% rename from src/files/lang/tra_str_s.c rename to src/files/lang/ntsc-1.0/tra_str_s.c diff --git a/src/files/lang/ntsc-1.0/uffE.c b/src/files/lang/ntsc-1.0/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uffJ.c b/src/files/lang/ntsc-1.0/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uffP.c b/src/files/lang/ntsc-1.0/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_f.c b/src/files/lang/ntsc-1.0/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_g.c b/src/files/lang/ntsc-1.0/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_i.c b/src/files/lang/ntsc-1.0/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/uff_str_s.c b/src/files/lang/ntsc-1.0/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-1.0/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-1.0/waxE.c b/src/files/lang/ntsc-1.0/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/ntsc-1.0/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/waxJ.c b/src/files/lang/ntsc-1.0/waxJ.c similarity index 100% rename from src/files/lang/waxJ.c rename to src/files/lang/ntsc-1.0/waxJ.c diff --git a/src/files/lang/waxP.c b/src/files/lang/ntsc-1.0/waxP.c similarity index 100% rename from src/files/lang/waxP.c rename to src/files/lang/ntsc-1.0/waxP.c diff --git a/src/files/lang/wax_str_f.c b/src/files/lang/ntsc-1.0/wax_str_f.c similarity index 100% rename from src/files/lang/wax_str_f.c rename to src/files/lang/ntsc-1.0/wax_str_f.c diff --git a/src/files/lang/wax_str_g.c b/src/files/lang/ntsc-1.0/wax_str_g.c similarity index 100% rename from src/files/lang/wax_str_g.c rename to src/files/lang/ntsc-1.0/wax_str_g.c diff --git a/src/files/lang/wax_str_i.c b/src/files/lang/ntsc-1.0/wax_str_i.c similarity index 100% rename from src/files/lang/wax_str_i.c rename to src/files/lang/ntsc-1.0/wax_str_i.c diff --git a/src/files/lang/wax_str_s.c b/src/files/lang/ntsc-1.0/wax_str_s.c similarity index 100% rename from src/files/lang/wax_str_s.c rename to src/files/lang/ntsc-1.0/wax_str_s.c diff --git a/src/files/lang/ntsc-beta/ameE.c b/src/files/lang/ntsc-beta/ameE.c new file mode 100644 index 000000000..5324ce35f --- /dev/null +++ b/src/files/lang/ntsc-beta/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ameJ.c b/src/files/lang/ntsc-beta/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/ntsc-beta/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ameP.c b/src/files/lang/ntsc-beta/ameP.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_f.c b/src/files/lang/ntsc-beta/ame_str_f.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_g.c b/src/files/lang/ntsc-beta/ame_str_g.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_i.c b/src/files/lang/ntsc-beta/ame_str_i.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ame_str_s.c b/src/files/lang/ntsc-beta/ame_str_s.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-beta/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/archE.c b/src/files/lang/ntsc-beta/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/archJ.c b/src/files/lang/ntsc-beta/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/archP.c b/src/files/lang/ntsc-beta/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_f.c b/src/files/lang/ntsc-beta/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_g.c b/src/files/lang/ntsc-beta/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_i.c b/src/files/lang/ntsc-beta/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arch_str_s.c b/src/files/lang/ntsc-beta/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecE.c b/src/files/lang/ntsc-beta/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecJ.c b/src/files/lang/ntsc-beta/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arecP.c b/src/files/lang/ntsc-beta/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_f.c b/src/files/lang/ntsc-beta/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_g.c b/src/files/lang/ntsc-beta/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_i.c b/src/files/lang/ntsc-beta/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arec_str_s.c b/src/files/lang/ntsc-beta/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/arkE.c b/src/files/lang/ntsc-beta/arkE.c new file mode 100644 index 000000000..af3c128d4 --- /dev/null +++ b/src/files/lang/ntsc-beta/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/arkJ.c b/src/files/lang/ntsc-beta/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/ntsc-beta/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/arkP.c b/src/files/lang/ntsc-beta/arkP.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_f.c b/src/files/lang/ntsc-beta/ark_str_f.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_g.c b/src/files/lang/ntsc-beta/ark_str_g.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_i.c b/src/files/lang/ntsc-beta/ark_str_i.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ark_str_s.c b/src/files/lang/ntsc-beta/ark_str_s.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-beta/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ashE.c b/src/files/lang/ntsc-beta/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ashJ.c b/src/files/lang/ntsc-beta/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ashP.c b/src/files/lang/ntsc-beta/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_f.c b/src/files/lang/ntsc-beta/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_g.c b/src/files/lang/ntsc-beta/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_i.c b/src/files/lang/ntsc-beta/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ash_str_s.c b/src/files/lang/ntsc-beta/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ateE.c b/src/files/lang/ntsc-beta/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ateJ.c b/src/files/lang/ntsc-beta/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ateP.c b/src/files/lang/ntsc-beta/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_f.c b/src/files/lang/ntsc-beta/ate_str_f.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_g.c b/src/files/lang/ntsc-beta/ate_str_g.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_i.c b/src/files/lang/ntsc-beta/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ate_str_s.c b/src/files/lang/ntsc-beta/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-beta/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/aztE.c b/src/files/lang/ntsc-beta/aztE.c new file mode 100644 index 000000000..fc4806f99 --- /dev/null +++ b/src/files/lang/ntsc-beta/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... ...It's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/aztJ.c b/src/files/lang/ntsc-beta/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/ntsc-beta/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/ntsc-beta/aztP.c b/src/files/lang/ntsc-beta/aztP.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_f.c b/src/files/lang/ntsc-beta/azt_str_f.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_g.c b/src/files/lang/ntsc-beta/azt_str_g.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_i.c b/src/files/lang/ntsc-beta/azt_str_i.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/azt_str_s.c b/src/files/lang/ntsc-beta/azt_str_s.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-beta/catE.c b/src/files/lang/ntsc-beta/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/catJ.c b/src/files/lang/ntsc-beta/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/catP.c b/src/files/lang/ntsc-beta/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_f.c b/src/files/lang/ntsc-beta/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_g.c b/src/files/lang/ntsc-beta/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_i.c b/src/files/lang/ntsc-beta/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cat_str_s.c b/src/files/lang/ntsc-beta/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/caveE.c b/src/files/lang/ntsc-beta/caveE.c new file mode 100644 index 000000000..127133ec3 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/caveJ.c b/src/files/lang/ntsc-beta/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/caveP.c b/src/files/lang/ntsc-beta/caveP.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_f.c b/src/files/lang/ntsc-beta/cave_str_f.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_g.c b/src/files/lang/ntsc-beta/cave_str_g.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_i.c b/src/files/lang/ntsc-beta/cave_str_i.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cave_str_s.c b/src/files/lang/ntsc-beta/cave_str_s.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-beta/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-beta/cradE.c b/src/files/lang/ntsc-beta/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cradJ.c b/src/files/lang/ntsc-beta/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cradP.c b/src/files/lang/ntsc-beta/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_f.c b/src/files/lang/ntsc-beta/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_g.c b/src/files/lang/ntsc-beta/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_i.c b/src/files/lang/ntsc-beta/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crad_str_s.c b/src/files/lang/ntsc-beta/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypE.c b/src/files/lang/ntsc-beta/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypJ.c b/src/files/lang/ntsc-beta/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/crypP.c b/src/files/lang/ntsc-beta/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_f.c b/src/files/lang/ntsc-beta/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_g.c b/src/files/lang/ntsc-beta/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_i.c b/src/files/lang/ntsc-beta/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/cryp_str_s.c b/src/files/lang/ntsc-beta/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/damE.c b/src/files/lang/ntsc-beta/damE.c new file mode 100644 index 000000000..304498027 --- /dev/null +++ b/src/files/lang/ntsc-beta/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/damJ.c b/src/files/lang/ntsc-beta/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/ntsc-beta/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/damP.c b/src/files/lang/ntsc-beta/damP.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_f.c b/src/files/lang/ntsc-beta/dam_str_f.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_g.c b/src/files/lang/ntsc-beta/dam_str_g.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_i.c b/src/files/lang/ntsc-beta/dam_str_i.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/dam_str_s.c b/src/files/lang/ntsc-beta/dam_str_s.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-beta/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-beta/depoE.c b/src/files/lang/ntsc-beta/depoE.c new file mode 100644 index 000000000..3f836b1d3 --- /dev/null +++ b/src/files/lang/ntsc-beta/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depoJ.c b/src/files/lang/ntsc-beta/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/ntsc-beta/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/ntsc-beta/depoP.c b/src/files/lang/ntsc-beta/depoP.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_f.c b/src/files/lang/ntsc-beta/depo_str_f.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_g.c b/src/files/lang/ntsc-beta/depo_str_g.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_i.c b/src/files/lang/ntsc-beta/depo_str_i.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/depo_str_s.c b/src/files/lang/ntsc-beta/depo_str_s.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-beta/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-beta/destE.c b/src/files/lang/ntsc-beta/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/destJ.c b/src/files/lang/ntsc-beta/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/destP.c b/src/files/lang/ntsc-beta/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_f.c b/src/files/lang/ntsc-beta/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_g.c b/src/files/lang/ntsc-beta/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_i.c b/src/files/lang/ntsc-beta/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dest_str_s.c b/src/files/lang/ntsc-beta/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/dishE.c b/src/files/lang/ntsc-beta/dishE.c new file mode 100644 index 000000000..1fa0f3e6e --- /dev/null +++ b/src/files/lang/ntsc-beta/dishE.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay Jo, I'll leave you to prepare for the mission.\n", + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dishJ.c b/src/files/lang/ntsc-beta/dishJ.c new file mode 100644 index 000000000..9ac44c2cf --- /dev/null +++ b/src/files/lang/ntsc-beta/dishJ.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight From Table To Begin\n", + /* 9*/ "Activate The Night Sight\nLocate The Light Switch\nTurn The Lights Back On\n", + /* 10*/ "Collect Data Uplink From Table To Begin\n", + /* 11*/ "Stand next to the terminal and use the uplink\n", + /* 12*/ "You Need To Be Holding The Data Uplink\n", + /* 13*/ "Connection Established...\n", + /* 14*/ "Terminal Has Been Successfully Hacked\n", + /* 15*/ "Connection Broken - Too Far From PC\n", + /* 16*/ "Collect ECM Mine From Table To Begin\n", + /* 17*/ "Locate Hub And Throw ECM Mine Onto Hub\n", + /* 18*/ "ECM Mine Has Been Placed Incorrectly\n", + /* 19*/ "ECM Mine Has Been Placed Correctly\n", + /* 20*/ "Collect Eye-Spy From Table To Begin\n", + /* 21*/ "Locate Info Room PC and Holograph It\n", + /* 22*/ "Info Room PC Successfully Holographed\n", + /* 23*/ "Lights Have Been Re-activated\n", + /* 24*/ "Collect Door Decoder From Table To Begin\n", + /* 25*/ "Use Decoder On Door Pad To Unlock It\n", + /* 26*/ "You Need To Be Holding The Door Decoder\n", + /* 27*/ "Decoder Attached. Initiating Cracking Routines..\n", + /* 28*/ "Decoding Complete. Door Has Been Unlocked.\n", + /* 29*/ "Collect Tracker From Table To Begin\n", + /* 30*/ "Locate IR Scanner Using Tracker\n", + /* 31*/ "IR Scanner Has Been Successfully Located\n", + /* 32*/ "Collect IR Scanner From Table To Begin\n", + /* 33*/ "Locate Secret Door Using IR Scanner\n", + /* 34*/ "Secret Door Has Been Successfully Located\n", + /* 35*/ "Collect XRay Scanner From Table To Begin\n", + /* 36*/ "Find Hidden Switches To Shutdown Laser Grid\n", + /* 37*/ "All Laser Grids Have Been Deactivated\n", + /* 38*/ "Collect Disguise From Table To Begin\n", + /* 39*/ "Fool Someone Into Giving You Cloaking Device\n", + /* 40*/ "Cloaking Device Successfully Retrieved\n", + /* 41*/ "Laser Grid 1 Has Been Deactivated\n", + /* 42*/ "Laser Grid 2 Has Been Deactivated\n", + /* 43*/ "I'm Here To Pick The Equipment\n", + /* 44*/ "Go away Joanna, you don't fool me!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device Has Been Secured Successfully\n", + /* 47*/ "You're Meant To Use The Disguise, remember?\n", + /* 48*/ "You'll Have To Try Harder Than That Joanna\n", + /* 49*/ "Joanna - Where Did You Spring From?\n", + /* 50*/ "You Have Been Detected By The Camera\n", + /* 51*/ "Collect Cloaking Device From Table To Begin\n", + /* 52*/ "Use Cloaking Device And Locate Carrington\n", + /* 53*/ "I think we can safely say you're training\nis now complete!\n", + /* 54*/ "Mission Accomplished - Device Training Complete!\n", + /* 55*/ "Mission Failed - You Have Been Detected\n", + /* 56*/ "Select The Uplink\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Data Uplink And Release A\n", + /* 57*/ "Select The EyeSpy\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Eye-Spy And Release A\n", + /* 58*/ "Select The Night Vision\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Night Vision And Release A\n", + /* 59*/ "Select The Door Decoder\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight DoorDecoder And Release A\n", + /* 60*/ "Select The X-Ray Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight X-Ray Scanner And Release A\n", + /* 61*/ "Select The Disguise\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Disguise And Release A\n", + /* 62*/ "Select The IR Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight IR Scanner And Release A\n", + /* 63*/ "Select The Tracker\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Tracker And Release A\n", + /* 64*/ "Select The Cloaking Device\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Device And Release A\n", + /* 65*/ "Select The ECM Mine\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight ECM Mine And Release A\n", + /* 66*/ "Joanna, It's good to see you.\n", + /* 67*/ "Come with me Joanna.\nI'll walk you to the training room.\n", + /* 68*/ "The information centre is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B next to Hovcrate to grab it...\n", + /* 74*/ "Press B when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble Tap B next to Hovbike to ride it...\n", + /* 76*/ "Double Tap B when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B next to door to open it.\n", + /* 78*/ "B will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B next to door to call elevator.\n", + /* 80*/ "Cannot Exit While Training Is In Progress\n", + /* 81*/ "Switch Code 1 Has Been Obtained.\n", + /* 82*/ "Switch Code 2 Has Been Obtained.\n", + /* 83*/ "Switch Code 3 Has Been Obtained.\n", + /* 84*/ "Switch Code 4 Has Been Obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C To Look Up At The Target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C To Look Down At The Target.\n", + /* 87*/ "Holoprogram 2 Has Been Completed Successfully.\n", + /* 88*/ "Holoprogram 4 Has Been Completed Successfully.\n", + /* 89*/ "Holoprogram 5 Has Been Completed Successfully.\n", + /* 90*/ "Guard Has Been Successfully Disarmed.\n", + /* 91*/ "Guard Has Been Successfully Knocked Out.\n", + /* 92*/ "Disarm This Live Target If You Can.\n", + /* 93*/ "Knock Out This Target - Stealth Is The Key.\n", + /* 94*/ "and the final guard....\n", + /* 95*/ "DUCK\n- Hold R Then Press Down C To Duck.\n", + /* 96*/ "CROUCH\n- When Ducking, Hold R Then Press Down C To Duck.\n", + /* 97*/ "Holoprogram 3 Has Been Completed Successfully.\n", + /* 98*/ "Activate All The Switches.\n", + /* 99*/ "Activate All Of The Wall Switches.\n- Be Quick, As They Will Quickly Reset.\n", + /*100*/ "Get The Access Codes By Examining Terminals.\n- Use The Codes On The Wall Terminals.\n", + /*101*/ "Code 1 Has Been Obtained.\n", + /*102*/ "Code 2 Has Been Obtained.\n", + /*103*/ "Code 3 Has Been Obtained.\n", + /*104*/ "Code 4 Has Been Obtained.\n", + /*105*/ "Training Failed - You Must Face Forward.\n", + /*106*/ "Holoprogram 1 Has Been Completed Successfully.\n", + /*107*/ "Unarmed Combat - Knock Out The Target.\n- Press Z repeatedly to punch.\n", + /*108*/ "Now Try Against A Moving Target...\n", + /*109*/ "And Finally Against A Target That Fights Back.\n", + /*110*/ "Defeat All Enemies Without Getting Hit.\n", + /*111*/ "Training Failed - You Have Been Hit.\n", + /*112*/ "Holoprogram 6 Has Been Completed Successfully.\n", + /*113*/ "Holoprogram 7 Has Been Completed Successfully.\n", + /*114*/ "TERMINALS\n- Press B next to terminal to use it.\n", + /*115*/ "Now Activate The Red Terminals On The Wall.\n", + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dishP.c b/src/files/lang/ntsc-beta/dishP.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dishP.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_f.c b/src/files/lang/ntsc-beta/dish_str_f.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_f.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_g.c b/src/files/lang/ntsc-beta/dish_str_g.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_g.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_i.c b/src/files/lang/ntsc-beta/dish_str_i.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_i.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/dish_str_s.c b/src/files/lang/ntsc-beta/dish_str_s.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-beta/dish_str_s.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earE.c b/src/files/lang/ntsc-beta/earE.c new file mode 100644 index 000000000..71530e2d3 --- /dev/null +++ b/src/files/lang/ntsc-beta/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earJ.c b/src/files/lang/ntsc-beta/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/ntsc-beta/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/earP.c b/src/files/lang/ntsc-beta/earP.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_f.c b/src/files/lang/ntsc-beta/ear_str_f.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_g.c b/src/files/lang/ntsc-beta/ear_str_g.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_i.c b/src/files/lang/ntsc-beta/ear_str_i.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ear_str_s.c b/src/files/lang/ntsc-beta/ear_str_s.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-beta/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldE.c b/src/files/lang/ntsc-beta/eldE.c new file mode 100644 index 000000000..85139347d --- /dev/null +++ b/src/files/lang/ntsc-beta/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldJ.c b/src/files/lang/ntsc-beta/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/ntsc-beta/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eldP.c b/src/files/lang/ntsc-beta/eldP.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_f.c b/src/files/lang/ntsc-beta/eld_str_f.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_g.c b/src/files/lang/ntsc-beta/eld_str_g.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_i.c b/src/files/lang/ntsc-beta/eld_str_i.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/eld_str_s.c b/src/files/lang/ntsc-beta/eld_str_s.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-beta/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gunE.c b/src/files/lang/ntsc-beta/gunE.c new file mode 100644 index 000000000..6ca0ff45c --- /dev/null +++ b/src/files/lang/ntsc-beta/gunE.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy Uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. fitted with a proximity key tag to allow access to restricted areas. mk3 model only functions while owner is alive. security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: CDV780322 Password: I8MOZYM8NDI85\n", +}; diff --git a/src/files/lang/ntsc-beta/gunJ.c b/src/files/lang/ntsc-beta/gunJ.c new file mode 100644 index 000000000..40a521c8b --- /dev/null +++ b/src/files/lang/ntsc-beta/gunJ.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gunP.c b/src/files/lang/ntsc-beta/gunP.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gunP.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_f.c b/src/files/lang/ntsc-beta/gun_str_f.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_f.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_g.c b/src/files/lang/ntsc-beta/gun_str_g.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_g.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_i.c b/src/files/lang/ntsc-beta/gun_str_i.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_i.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/gun_str_s.c b/src/files/lang/ntsc-beta/gun_str_s.c new file mode 100644 index 000000000..feb6d09b1 --- /dev/null +++ b/src/files/lang/ntsc-beta/gun_str_s.c @@ -0,0 +1,244 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impE.c b/src/files/lang/ntsc-beta/impE.c new file mode 100644 index 000000000..a4e8e8d23 --- /dev/null +++ b/src/files/lang/ntsc-beta/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release Hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impJ.c b/src/files/lang/ntsc-beta/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/ntsc-beta/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/impP.c b/src/files/lang/ntsc-beta/impP.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_f.c b/src/files/lang/ntsc-beta/imp_str_f.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_g.c b/src/files/lang/ntsc-beta/imp_str_g.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_i.c b/src/files/lang/ntsc-beta/imp_str_i.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/imp_str_s.c b/src/files/lang/ntsc-beta/imp_str_s.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-beta/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/junE.c b/src/files/lang/ntsc-beta/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/junJ.c b/src/files/lang/ntsc-beta/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/junP.c b/src/files/lang/ntsc-beta/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_f.c b/src/files/lang/ntsc-beta/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_g.c b/src/files/lang/ntsc-beta/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_i.c b/src/files/lang/ntsc-beta/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/jun_str_s.c b/src/files/lang/ntsc-beta/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamE.c b/src/files/lang/ntsc-beta/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamJ.c b/src/files/lang/ntsc-beta/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lamP.c b/src/files/lang/ntsc-beta/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_f.c b/src/files/lang/ntsc-beta/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_g.c b/src/files/lang/ntsc-beta/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_i.c b/src/files/lang/ntsc-beta/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lam_str_s.c b/src/files/lang/ntsc-beta/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/leeE.c b/src/files/lang/ntsc-beta/leeE.c new file mode 100644 index 000000000..c4ac09601 --- /dev/null +++ b/src/files/lang/ntsc-beta/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/leeJ.c b/src/files/lang/ntsc-beta/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/ntsc-beta/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/leeP.c b/src/files/lang/ntsc-beta/leeP.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_f.c b/src/files/lang/ntsc-beta/lee_str_f.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_g.c b/src/files/lang/ntsc-beta/lee_str_g.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_i.c b/src/files/lang/ntsc-beta/lee_str_i.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lee_str_s.c b/src/files/lang/ntsc-beta/lee_str_s.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-beta/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lenE.c b/src/files/lang/ntsc-beta/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lenJ.c b/src/files/lang/ntsc-beta/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lenP.c b/src/files/lang/ntsc-beta/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_f.c b/src/files/lang/ntsc-beta/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_g.c b/src/files/lang/ntsc-beta/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_i.c b/src/files/lang/ntsc-beta/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/len_str_s.c b/src/files/lang/ntsc-beta/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/lipE.c b/src/files/lang/ntsc-beta/lipE.c new file mode 100644 index 000000000..60bff8eca --- /dev/null +++ b/src/files/lang/ntsc-beta/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defences Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lipJ.c b/src/files/lang/ntsc-beta/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/ntsc-beta/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lipP.c b/src/files/lang/ntsc-beta/lipP.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_f.c b/src/files/lang/ntsc-beta/lip_str_f.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_g.c b/src/files/lang/ntsc-beta/lip_str_g.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_i.c b/src/files/lang/ntsc-beta/lip_str_i.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lip_str_s.c b/src/files/lang/ntsc-beta/lip_str_s.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-beta/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lueE.c b/src/files/lang/ntsc-beta/lueE.c new file mode 100644 index 000000000..8781e489f --- /dev/null +++ b/src/files/lang/ntsc-beta/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lueJ.c b/src/files/lang/ntsc-beta/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/ntsc-beta/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/lueP.c b/src/files/lang/ntsc-beta/lueP.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_f.c b/src/files/lang/ntsc-beta/lue_str_f.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_g.c b/src/files/lang/ntsc-beta/lue_str_g.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_i.c b/src/files/lang/ntsc-beta/lue_str_i.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/lue_str_s.c b/src/files/lang/ntsc-beta/lue_str_s.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-beta/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-beta/miscE.c b/src/files/lang/ntsc-beta/miscE.c new file mode 100644 index 000000000..23e8c7a08 --- /dev/null +++ b/src/files/lang/ntsc-beta/miscE.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "YKK: 95935", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations'. They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battlecruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamoured were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies'.\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battlecruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/miscJ.c b/src/files/lang/ntsc-beta/miscJ.c new file mode 100644 index 000000000..5b110ec01 --- /dev/null +++ b/src/files/lang/ntsc-beta/miscJ.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Bond Invisible", + /* 5*/ "Bond Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny Bond", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Golden Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "invincibility on\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Bond Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny Bond On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy Now Karl?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Bond Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Bond Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - Abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun\n", + /* 72*/ "Don't point that gun at me\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "EYESPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is therefore the best choice for the beginner. It is not very intelligent and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills & intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists which protest the use of weapons. They will go around the level hunting for guns that are lying around and horde them so that players cannot use them. Of course, if you were to shoot them they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamiKazeSim: This simulant will stop at nothing to destroy it's target. It is very aggressive and never keeps it's distance (even if it's holding a grenade!). Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However it has no such reservations when it comes to unarmed combat. It will always try to use it's fists to attack or disarm it's opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try and survive by running away. It may sometimes attack but only if the opponent has an inferior weapon. Draw out a better gun or shoot it and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and dispises the tactics of the PredatorSim. It will always try and kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily out-run a human player so it's no use running away from a CheetahSim unless you know some good short-cuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately this restricts the hosts movement so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomise\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Flag", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Flag", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the callsign 'Perfect Dark'.\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark he held the honour of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents, runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power, dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she hates. \n\n[source: WALL STREET JOURNAL]\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne corp with an emphasis on language skills and code-breaking. Fortunately he has morals, and due to his formidable level of intelligence has guessed some of dataDyne's future plans. The voice is highly precise and educated, and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde young human male whose the voice is dull, annoying, and cringeworthy. Very tall. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar Warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The US President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys'. They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington, a formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. Tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion, and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battlecruiser of immense power was scuttled in the Pacific ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of Humans alone to develop.\n\nThe Maians meet the Skedar and they have a fight that turns into a protracted war. After hundreds of years of fighting an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations'. They fear that announcing their presence may well precipitate further wars on the planet, and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battlecruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battlecruiser is. Their tests direct them to the pacific ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne have to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the president. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the US government so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne have made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battlecruiser. When it expresses concern about the mission it is being created for the response of Cassandra De Vries is to order its personality removed. Clearly it is thinking too much. In desperation it contacts the Carrington organisation with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation, but continues with the mission to get him/it to a place of safety. With the alarm raised Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll but her boss has heard enough from the AI to prompt him into summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 building, a front for the dataDyne corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent job for her to complete first.\n\nThe specialists' have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the president's entourage to gain access to the airbase where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for the President, Elvis, herself and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible they head down to the ocean floor, where they get their first sight of the sunken Cetan battlecruiser. Entering the ship through the portal the Skedar have made they come across a dead skedar warrior... clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship where they find the AI that was once Dr. Caroll. Once his personality is restored he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. Joanna holds them off while the majority of the employees escape, before getting knocked unconscious and captured by the Skedar.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar battle shrine, which gives Elvis a shock since the Maians could never find this Skedar holiest of holy places. If the Shrine is destroyed the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the battle shrine, while Elvis returns to the Assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "dataDyne are nasty\n", + /*269*/ "Carrington Institute\n", + /*270*/ "The Carrington Institute is lovely\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human sized pulse of heat.\n\nTraining Instructions\n- Holograph the Hackers terminal next door in the Info room.\n\nOperation\n- Press Z to take a holograph. Pressing B will open any doors in the way.Hold down R to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights lifeforms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch and activate it to turn the lights back on.\n\nOperation\n- Select the Nightvision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Standalone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the door decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press B while holding the door decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the night vision and IR goggles can not.\n\nTraining Instructions\n- With the Xray Scanner on, search for the 2 hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the Xray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick witted enemy.\n\nTraining Instructions\n- Grimshaw has a cloaking device waiting to be serviced. Head next door and 'aquire' it from him.\n\nOperation\n- To wear the disguise simply select it from your inventory.\n", + /*276*/ "Drscription\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Distrupts the radiation field around the wearer, creating a chameleon type effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the cloaking device and head to Carringtons office to suprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM mine onto the lighting hub located through the secret door.\n\nOperation\n- Press Z to throw the mine. Hold down R and move the stick to fine tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Comms Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press B when holding Comms Uplink.\n", + /*281*/ "FIRING\n Press Z to fire gun\n", + /*282*/ "AUTO RELOAD\n Release Z to reload when magazine empty\n", + /*283*/ "MANUAL RELOAD\n Press B to reload early if magazine not full\n", + /*284*/ "Aiming: hold down R to enter aim mode\n", + /*285*/ "Use analog stick to move aiming sight\n", + /*286*/ "AUTO FIRE\n Hold Z to repeatedly fire automatically\n", + /*287*/ "ALTER AIM\n Press up C or down C to move sight up/down\n", + /*288*/ "ZOOM\n Hold R to enter Zoom mode\n", + /*289*/ "FAST FIRE\n Press Z quickly to fire faster\n", + /*290*/ "ELVIS IS DEAD OR FALLEN OUT OF THE BACKGROUND\n", + /*291*/ "Carrington Institute\0|Main building and base of operations\n", + /*292*/ "Lucerne Tower\0|Global Headquarters\n", + /*293*/ "Laboratory Basement\0|Underground research labs\n", + /*294*/ "Carrington Villa\0|Private coastal retreat\n", + /*295*/ "Chicago\0|Backstreets of the city\n", + /*296*/ "G5 Building\0|dataDyne front corporation\n", + /*297*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*298*/ "Alaskan Airbase\0|Brooks Range, Alaska\n", + /*299*/ "Air Force One\0|The President's Airplane\n", + /*300*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*301*/ "Pelagic 2\0|Specialised Deep Sea Research Ship\n", + /*302*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*303*/ "Skedar Assault Ship\0|Troop Carrying spacecraft\n", + /*304*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*305*/ "Dropship\0|Insert subtitle here\n", + /*306*/ "HoverCrate\0|Insert subtitle here\n", + /*307*/ "HoverBike\0|subtitle here\n", + /*308*/ "Cleaning Hovbot\0|Insert subtitle here\n", + /*309*/ "Hovercopter\0|Insert subtitle here\n", + /*310*/ "G5 Robot\0|Insert subtitle here\n", + /*311*/ "A51 Interceptor\0|Insert subtitle here\n", + /*312*/ "Maian Vessel\0|Insert subtitle here\n", + /*313*/ "Skedar Shuttle\0|Insert subtitle here\n", + /*314*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*315*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*316*/ "These heavily guarded, well hidden labs hold the key to dataDyne's future. Within them, techs work on top secret projects aimed at putting dataDyne on the top of the heap.\n", + /*317*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*318*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 corporation has their headquarters.\n", + /*319*/ "Inside the G5 building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*320*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*321*/ "One of a series of reinforced airbases available as staging posts for Air Force One. Typically, the airbase is remote, in an inhospitable region, far away from prying eyes.\n", + /*322*/ "This particular Air Force One is optimised for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*323*/ "In the rocky snow-covered landscape of the Arctic Circle the wreckage of the stricken plane has come to rest.\n", + /*324*/ "Owned by the US government, the Pelagic 2 is capable of staging deep sea diving operations in all weathers. It is the only fully integrated ocean floor research vessel in the world.\n", + /*325*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*326*/ "An interplanetary assault ship that carries Skedar Warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*327*/ "A highly arid planet, wracked by earthquakes, sandstorms and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*328*/ "that thing in the first cutscene\n", + /*329*/ "a floating crate\n", + /*330*/ "a floating bike\n", + /*331*/ "a floating hoover\n", + /*332*/ "a cool ship with startling AI and realistic dynamic movement\n", + /*333*/ "a superb attack drone with lovely rotating guns and brilliant AI\n", + /*334*/ "just as cool as the hovercopter, especially when it crashes\n", + /*335*/ "ooh! shiny\n", + /*336*/ "skedar shuttle thing\n", + /*337*/ "Description\n- A good agent notices everything around them.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press Down C\n-Look down- Press Up C\n-Free Look- Hold down R to enter aim mode and use the stick to look.\n", + /*338*/ "Description\n- Proverb type saying about movement 1 here.\n\nTraining Instructions\n- Activate All Of The Switches In Front. Be Quick Though, As Each Switch Will Reset On A Time Limit.\n\nOperation\n- Sidestep left- Left C\n- Sidestep right- Right C\n\n", + /*339*/ "Description\n- Proverb type saying about movement 2 here.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate The Switches.\n\nOperation\n- Duck- Hold R then press down C.\n- Crouch- When ducking, Hold R then press down C.\n- Get Up- Tap R.\n\n", + /*340*/ "Description\n- Proverb type saying about unarmed combat 1 here.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press Z repeatedly when unarmed to launch a flurry of punches.\n\n", + /*341*/ "Description\n- Proverb type saying about unarmed combat 2 here.\n\nTraining Instructions\n- Knockout/Disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold B then press Z to disarm an enemy.\n- Knockout Punch - punch an unaware enemy from behind.\n", + /*342*/ "Description\n- Proverb type saying about combat test 1 here.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*343*/ "Description\n- Proverb type saying about combat test 2 here.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*344*/ "holo_tips1\n", + /*345*/ "holo_tips2\n", + /*346*/ "holo_tips3\n", + /*347*/ "holo_tips4\n", + /*348*/ "holo_tips5\n", + /*349*/ "holo_tips6\n", + /*350*/ "holo_tips7\n", + /*351*/ "holo_advice1\n", + /*352*/ "holo_advice2\n", + /*353*/ "holo_advice3\n", + /*354*/ "holo_advice4\n", + /*355*/ "holo_advice5\n", + /*356*/ "holo_advice6\n", + /*357*/ "holo_advice7\n", + /*358*/ "device_tips1\n", + /*359*/ "device_tips2\n", + /*360*/ "device_tips3\n", + /*361*/ "device_tips4\n", + /*362*/ "device_tips5\n", + /*363*/ "device_tips6\n", + /*364*/ "device_tips7\n", + /*365*/ "device_tips8\n", + /*366*/ "device_tips9\n", + /*367*/ "device_tips10\n", + /*368*/ "device_advice1\n", + /*369*/ "device_advice2\n", + /*370*/ "device_advice3\n", + /*371*/ "device_advice4\n", + /*372*/ "device_advice5\n", + /*373*/ "device_advice6\n", + /*374*/ "device_advice7\n", + /*375*/ "device_advice8\n", + /*376*/ "device_advice9\n", + /*377*/ "device_advice10\n", + /*378*/ "Instructions for falcon2\n", + /*379*/ "Instructions for falcon2scope\n", + /*380*/ "Instructions for falcon2silenced\n", + /*381*/ "Instructions for leegun1\n", + /*382*/ "Instructions for skedarpistol\n", + /*383*/ "Instructions for maianpistol\n", + /*384*/ "Instructions for dy357\n", + /*385*/ "Instructions for dy357_trent\n", + /*386*/ "Instructions for cmp150\n", + /*387*/ "Instructions for cyclone\n", + /*388*/ "Instructions for maiansmg\n", + /*389*/ "Instructions for anothersmg\n", + /*390*/ "Instructions for pcgun\n", + /*391*/ "Instructions for dydragon\n", + /*392*/ "Instructions for k7avenger\n", + /*393*/ "Instructions for ar34\n", + /*394*/ "Instructions for dysuperdragon\n", + /*395*/ "Instructions for shotgun\n", + /*396*/ "Instructions for sniperrifle\n", + /*397*/ "Instructions for z2020\n", + /*398*/ "Instructions for crossbow\n", + /*399*/ "Instructions for druggun\n", + /*400*/ "Instructions for skedarminigun\n", + /*401*/ "Instructions for dydevastator\n", + /*402*/ "Instructions for dyrocket\n", + /*403*/ "Instructions for skedarrocket\n", + /*404*/ "Instructions for knife\n", + /*405*/ "Instructions for laser\n", + /*406*/ "Instructions for grenade\n", + /*407*/ "Instructions for nbomb\n", + /*408*/ "Instructions for timedmine\n", + /*409*/ "Instructions for proximitymine\n", + /*410*/ "Instructions for remotemine\n", + /*411*/ "Style 1", + /*412*/ "Style 2", + /*413*/ "Style 3", + /*414*/ "Style 4", + /*415*/ "Blond", + /*416*/ "Black", + /*417*/ "Auburn", + /*418*/ "Blue Rinse", + /*419*/ "Player", + /*420*/ "", + /*421*/ "Identify\n", + /*422*/ "Sim", + /*423*/ "Challenges\n", + /*424*/ "Load/Preset Games\n", + /*425*/ "Quick Start\n", + /*426*/ "Advanced Setup\n", + /*427*/ "Combat Simulator\n", + /*428*/ "Carrington Institute\n", + /*429*/ "Team Score\n", + /*430*/ "Finished Setup\n", + /*431*/ "Player 1 Team\n", + /*432*/ "Player 2 Team\n", + /*433*/ "Player 3 Team\n", + /*434*/ "Player 4 Team\n", + /*435*/ "Number Of Sims\n", + /*436*/ "Sims Per Team\n", + /*437*/ "Sim Difficulty\n", + /*438*/ "Start Game\n", + /*439*/ "Drop Out\n", + /*440*/ "Player Settings\n", + /*441*/ "Game Settings\n", + /*442*/ "Quick Go\n", + /*443*/ "Ready!\n", + /*444*/ "Quick Team\n", + /*445*/ "Players Only\n", + /*446*/ "Players and Simulants\n", + /*447*/ "Player Teams\n", + /*448*/ "Players versus Simulants\n", + /*449*/ "Player-Simulant Teams\n", + /*450*/ NULL, + /*451*/ NULL, + /*452*/ NULL, + /*453*/ NULL, + /*454*/ NULL, + /*455*/ NULL, + /*456*/ NULL, + /*457*/ NULL, + /*458*/ NULL, + /*459*/ NULL, + /*460*/ NULL, + /*461*/ NULL, + /*462*/ NULL, + /*463*/ NULL, + /*464*/ NULL, + /*465*/ NULL, + /*466*/ NULL, + /*467*/ NULL, + /*468*/ NULL, + /*469*/ NULL, + /*470*/ NULL, + /*471*/ NULL, + /*472*/ NULL, + /*473*/ NULL, + /*474*/ NULL, + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/miscP.c b/src/files/lang/ntsc-beta/miscP.c new file mode 100644 index 000000000..fd5f4834a --- /dev/null +++ b/src/files/lang/ntsc-beta/miscP.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_f.c b/src/files/lang/ntsc-beta/misc_str_f.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_f.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_g.c b/src/files/lang/ntsc-beta/misc_str_g.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_g.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_i.c b/src/files/lang/ntsc-beta/misc_str_i.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_i.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/misc_str_s.c b/src/files/lang/ntsc-beta/misc_str_s.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-beta/misc_str_s.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mp10E.c b/src/files/lang/ntsc-beta/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10J.c b/src/files/lang/ntsc-beta/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10P.c b/src/files/lang/ntsc-beta/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_f.c b/src/files/lang/ntsc-beta/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_g.c b/src/files/lang/ntsc-beta/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_i.c b/src/files/lang/ntsc-beta/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp10_str_s.c b/src/files/lang/ntsc-beta/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11E.c b/src/files/lang/ntsc-beta/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11J.c b/src/files/lang/ntsc-beta/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11P.c b/src/files/lang/ntsc-beta/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_f.c b/src/files/lang/ntsc-beta/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_g.c b/src/files/lang/ntsc-beta/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_i.c b/src/files/lang/ntsc-beta/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp11_str_s.c b/src/files/lang/ntsc-beta/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12E.c b/src/files/lang/ntsc-beta/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12J.c b/src/files/lang/ntsc-beta/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12P.c b/src/files/lang/ntsc-beta/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_f.c b/src/files/lang/ntsc-beta/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_g.c b/src/files/lang/ntsc-beta/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_i.c b/src/files/lang/ntsc-beta/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp12_str_s.c b/src/files/lang/ntsc-beta/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13E.c b/src/files/lang/ntsc-beta/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13J.c b/src/files/lang/ntsc-beta/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13P.c b/src/files/lang/ntsc-beta/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_f.c b/src/files/lang/ntsc-beta/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_g.c b/src/files/lang/ntsc-beta/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_i.c b/src/files/lang/ntsc-beta/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp13_str_s.c b/src/files/lang/ntsc-beta/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14E.c b/src/files/lang/ntsc-beta/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14J.c b/src/files/lang/ntsc-beta/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14P.c b/src/files/lang/ntsc-beta/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_f.c b/src/files/lang/ntsc-beta/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_g.c b/src/files/lang/ntsc-beta/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_i.c b/src/files/lang/ntsc-beta/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp14_str_s.c b/src/files/lang/ntsc-beta/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15E.c b/src/files/lang/ntsc-beta/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15J.c b/src/files/lang/ntsc-beta/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15P.c b/src/files/lang/ntsc-beta/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_f.c b/src/files/lang/ntsc-beta/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_g.c b/src/files/lang/ntsc-beta/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_i.c b/src/files/lang/ntsc-beta/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp15_str_s.c b/src/files/lang/ntsc-beta/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16E.c b/src/files/lang/ntsc-beta/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16J.c b/src/files/lang/ntsc-beta/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16P.c b/src/files/lang/ntsc-beta/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_f.c b/src/files/lang/ntsc-beta/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_g.c b/src/files/lang/ntsc-beta/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_i.c b/src/files/lang/ntsc-beta/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp16_str_s.c b/src/files/lang/ntsc-beta/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17E.c b/src/files/lang/ntsc-beta/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17J.c b/src/files/lang/ntsc-beta/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17P.c b/src/files/lang/ntsc-beta/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_f.c b/src/files/lang/ntsc-beta/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_g.c b/src/files/lang/ntsc-beta/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_i.c b/src/files/lang/ntsc-beta/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp17_str_s.c b/src/files/lang/ntsc-beta/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18E.c b/src/files/lang/ntsc-beta/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18J.c b/src/files/lang/ntsc-beta/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18P.c b/src/files/lang/ntsc-beta/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_f.c b/src/files/lang/ntsc-beta/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_g.c b/src/files/lang/ntsc-beta/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_i.c b/src/files/lang/ntsc-beta/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp18_str_s.c b/src/files/lang/ntsc-beta/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19E.c b/src/files/lang/ntsc-beta/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19J.c b/src/files/lang/ntsc-beta/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19P.c b/src/files/lang/ntsc-beta/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_f.c b/src/files/lang/ntsc-beta/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_g.c b/src/files/lang/ntsc-beta/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_i.c b/src/files/lang/ntsc-beta/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp19_str_s.c b/src/files/lang/ntsc-beta/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1E.c b/src/files/lang/ntsc-beta/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1J.c b/src/files/lang/ntsc-beta/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1P.c b/src/files/lang/ntsc-beta/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_f.c b/src/files/lang/ntsc-beta/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_g.c b/src/files/lang/ntsc-beta/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_i.c b/src/files/lang/ntsc-beta/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp1_str_s.c b/src/files/lang/ntsc-beta/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20E.c b/src/files/lang/ntsc-beta/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20J.c b/src/files/lang/ntsc-beta/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20P.c b/src/files/lang/ntsc-beta/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_f.c b/src/files/lang/ntsc-beta/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_g.c b/src/files/lang/ntsc-beta/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_i.c b/src/files/lang/ntsc-beta/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp20_str_s.c b/src/files/lang/ntsc-beta/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2E.c b/src/files/lang/ntsc-beta/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2J.c b/src/files/lang/ntsc-beta/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2P.c b/src/files/lang/ntsc-beta/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_f.c b/src/files/lang/ntsc-beta/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_g.c b/src/files/lang/ntsc-beta/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_i.c b/src/files/lang/ntsc-beta/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp2_str_s.c b/src/files/lang/ntsc-beta/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3E.c b/src/files/lang/ntsc-beta/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3J.c b/src/files/lang/ntsc-beta/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3P.c b/src/files/lang/ntsc-beta/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_f.c b/src/files/lang/ntsc-beta/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_g.c b/src/files/lang/ntsc-beta/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_i.c b/src/files/lang/ntsc-beta/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp3_str_s.c b/src/files/lang/ntsc-beta/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4E.c b/src/files/lang/ntsc-beta/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4J.c b/src/files/lang/ntsc-beta/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4P.c b/src/files/lang/ntsc-beta/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_f.c b/src/files/lang/ntsc-beta/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_g.c b/src/files/lang/ntsc-beta/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_i.c b/src/files/lang/ntsc-beta/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp4_str_s.c b/src/files/lang/ntsc-beta/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5E.c b/src/files/lang/ntsc-beta/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5J.c b/src/files/lang/ntsc-beta/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5P.c b/src/files/lang/ntsc-beta/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_f.c b/src/files/lang/ntsc-beta/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_g.c b/src/files/lang/ntsc-beta/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_i.c b/src/files/lang/ntsc-beta/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp5_str_s.c b/src/files/lang/ntsc-beta/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6E.c b/src/files/lang/ntsc-beta/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6J.c b/src/files/lang/ntsc-beta/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6P.c b/src/files/lang/ntsc-beta/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_f.c b/src/files/lang/ntsc-beta/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_g.c b/src/files/lang/ntsc-beta/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_i.c b/src/files/lang/ntsc-beta/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp6_str_s.c b/src/files/lang/ntsc-beta/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7E.c b/src/files/lang/ntsc-beta/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7J.c b/src/files/lang/ntsc-beta/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7P.c b/src/files/lang/ntsc-beta/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_f.c b/src/files/lang/ntsc-beta/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_g.c b/src/files/lang/ntsc-beta/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_i.c b/src/files/lang/ntsc-beta/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp7_str_s.c b/src/files/lang/ntsc-beta/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8E.c b/src/files/lang/ntsc-beta/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8J.c b/src/files/lang/ntsc-beta/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8P.c b/src/files/lang/ntsc-beta/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_f.c b/src/files/lang/ntsc-beta/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_g.c b/src/files/lang/ntsc-beta/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_i.c b/src/files/lang/ntsc-beta/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp8_str_s.c b/src/files/lang/ntsc-beta/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9E.c b/src/files/lang/ntsc-beta/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9J.c b/src/files/lang/ntsc-beta/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9P.c b/src/files/lang/ntsc-beta/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_f.c b/src/files/lang/ntsc-beta/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_g.c b/src/files/lang/ntsc-beta/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_i.c b/src/files/lang/ntsc-beta/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mp9_str_s.c b/src/files/lang/ntsc-beta/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/mpmenuE.c b/src/files/lang/ntsc-beta/mpmenuE.c new file mode 100644 index 000000000..2b9635b7b --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuE.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ "ENTROPICDECAY\n", + /*497*/ "ZERO-TAU\n", + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenuJ.c b/src/files/lang/ntsc-beta/mpmenuJ.c new file mode 100644 index 000000000..a7c41861e --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuJ.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenuP.c b/src/files/lang/ntsc-beta/mpmenuP.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenuP.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_f.c b/src/files/lang/ntsc-beta/mpmenu_str_f.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_f.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_g.c b/src/files/lang/ntsc-beta/mpmenu_str_g.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_g.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_i.c b/src/files/lang/ntsc-beta/mpmenu_str_i.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_i.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpmenu_str_s.c b/src/files/lang/ntsc-beta/mpmenu_str_s.c new file mode 100644 index 000000000..84f0c99f9 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpmenu_str_s.c @@ -0,0 +1,504 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", + /*496*/ NULL, + /*497*/ NULL, + /*498*/ NULL, + /*499*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsE.c b/src/files/lang/ntsc-beta/mpweaponsE.c new file mode 100644 index 000000000..d8899425b --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsE.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe controller pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak can\nnot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Left Hand:", + /*212*/ "Right Hand:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsJ.c b/src/files/lang/ntsc-beta/mpweaponsJ.c new file mode 100644 index 000000000..fd4e7f881 --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsJ.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Capture the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Flag\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweaponsP.c b/src/files/lang/ntsc-beta/mpweaponsP.c new file mode 100644 index 000000000..fa94f699a --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweaponsP.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_f.c b/src/files/lang/ntsc-beta/mpweapons_str_f.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_f.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_g.c b/src/files/lang/ntsc-beta/mpweapons_str_g.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_g.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_i.c b/src/files/lang/ntsc-beta/mpweapons_str_i.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_i.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/mpweapons_str_s.c b/src/files/lang/ntsc-beta/mpweapons_str_s.c new file mode 100644 index 000000000..72ba3b8bb --- /dev/null +++ b/src/files/lang/ntsc-beta/mpweapons_str_s.c @@ -0,0 +1,236 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Perfect Dark Game Boy", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/oatE.c b/src/files/lang/ntsc-beta/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oatJ.c b/src/files/lang/ntsc-beta/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oatP.c b/src/files/lang/ntsc-beta/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_f.c b/src/files/lang/ntsc-beta/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_g.c b/src/files/lang/ntsc-beta/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_i.c b/src/files/lang/ntsc-beta/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oat_str_s.c b/src/files/lang/ntsc-beta/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldE.c b/src/files/lang/ntsc-beta/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldJ.c b/src/files/lang/ntsc-beta/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/oldP.c b/src/files/lang/ntsc-beta/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_f.c b/src/files/lang/ntsc-beta/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_g.c b/src/files/lang/ntsc-beta/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_i.c b/src/files/lang/ntsc-beta/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/old_str_s.c b/src/files/lang/ntsc-beta/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/optionsE.c b/src/files/lang/ntsc-beta/optionsE.c new file mode 100644 index 000000000..b90a9a955 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 6.4 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file\ninto any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Take Off\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak Onboard\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/optionsJ.c b/src/files/lang/ntsc-beta/optionsJ.c new file mode 100644 index 000000000..9766367e0 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "Choose Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/optionsP.c b/src/files/lang/ntsc-beta/optionsP.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_f.c b/src/files/lang/ntsc-beta/options_str_f.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_g.c b/src/files/lang/ntsc-beta/options_str_g.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_i.c b/src/files/lang/ntsc-beta/options_str_i.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/options_str_s.c b/src/files/lang/ntsc-beta/options_str_s.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-beta/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamE.c b/src/files/lang/ntsc-beta/pamE.c new file mode 100644 index 000000000..f8f1096ef --- /dev/null +++ b/src/files/lang/ntsc-beta/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo Wasted - Unable to disable Megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamJ.c b/src/files/lang/ntsc-beta/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/ntsc-beta/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pamP.c b/src/files/lang/ntsc-beta/pamP.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_f.c b/src/files/lang/ntsc-beta/pam_str_f.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_g.c b/src/files/lang/ntsc-beta/pam_str_g.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_i.c b/src/files/lang/ntsc-beta/pam_str_i.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pam_str_s.c b/src/files/lang/ntsc-beta/pam_str_s.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-beta/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteE.c b/src/files/lang/ntsc-beta/peteE.c new file mode 100644 index 000000000..b7c24cf86 --- /dev/null +++ b/src/files/lang/ntsc-beta/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine Has Been Wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteJ.c b/src/files/lang/ntsc-beta/peteJ.c new file mode 100644 index 000000000..088c12b76 --- /dev/null +++ b/src/files/lang/ntsc-beta/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/peteP.c b/src/files/lang/ntsc-beta/peteP.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_f.c b/src/files/lang/ntsc-beta/pete_str_f.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_g.c b/src/files/lang/ntsc-beta/pete_str_g.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_i.c b/src/files/lang/ntsc-beta/pete_str_i.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/pete_str_s.c b/src/files/lang/ntsc-beta/pete_str_s.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-beta/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/propobjE.c b/src/files/lang/ntsc-beta/propobjE.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobjJ.c b/src/files/lang/ntsc-beta/propobjJ.c new file mode 100644 index 000000000..e2c9a5da7 --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "hand grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "drugs", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "speed pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobjP.c b/src/files/lang/ntsc-beta/propobjP.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobjP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_f.c b/src/files/lang/ntsc-beta/propobj_str_f.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_g.c b/src/files/lang/ntsc-beta/propobj_str_g.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_i.c b/src/files/lang/ntsc-beta/propobj_str_i.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/propobj_str_s.c b/src/files/lang/ntsc-beta/propobj_str_s.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-beta/propobj_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-beta/refE.c b/src/files/lang/ntsc-beta/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/refJ.c b/src/files/lang/ntsc-beta/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/refP.c b/src/files/lang/ntsc-beta/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_f.c b/src/files/lang/ntsc-beta/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_g.c b/src/files/lang/ntsc-beta/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_i.c b/src/files/lang/ntsc-beta/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ref_str_s.c b/src/files/lang/ntsc-beta/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/ritE.c b/src/files/lang/ntsc-beta/ritE.c new file mode 100644 index 000000000..c3234e95a --- /dev/null +++ b/src/files/lang/ntsc-beta/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ritJ.c b/src/files/lang/ntsc-beta/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/ntsc-beta/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/ritP.c b/src/files/lang/ntsc-beta/ritP.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_f.c b/src/files/lang/ntsc-beta/rit_str_f.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_g.c b/src/files/lang/ntsc-beta/rit_str_g.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_i.c b/src/files/lang/ntsc-beta/rit_str_i.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/rit_str_s.c b/src/files/lang/ntsc-beta/rit_str_s.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-beta/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/runE.c b/src/files/lang/ntsc-beta/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/runJ.c b/src/files/lang/ntsc-beta/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/runP.c b/src/files/lang/ntsc-beta/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_f.c b/src/files/lang/ntsc-beta/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_g.c b/src/files/lang/ntsc-beta/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_i.c b/src/files/lang/ntsc-beta/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/run_str_s.c b/src/files/lang/ntsc-beta/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevE.c b/src/files/lang/ntsc-beta/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevJ.c b/src/files/lang/ntsc-beta/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevP.c b/src/files/lang/ntsc-beta/sevP.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_f.c b/src/files/lang/ntsc-beta/sev_str_f.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_g.c b/src/files/lang/ntsc-beta/sev_str_g.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_i.c b/src/files/lang/ntsc-beta/sev_str_i.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sev_str_s.c b/src/files/lang/ntsc-beta/sev_str_s.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-beta/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbE.c b/src/files/lang/ntsc-beta/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbJ.c b/src/files/lang/ntsc-beta/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevbP.c b/src/files/lang/ntsc-beta/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_f.c b/src/files/lang/ntsc-beta/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_g.c b/src/files/lang/ntsc-beta/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_i.c b/src/files/lang/ntsc-beta/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevb_str_s.c b/src/files/lang/ntsc-beta/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sevxE.c b/src/files/lang/ntsc-beta/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxJ.c b/src/files/lang/ntsc-beta/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxP.c b/src/files/lang/ntsc-beta/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_f.c b/src/files/lang/ntsc-beta/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_g.c b/src/files/lang/ntsc-beta/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_i.c b/src/files/lang/ntsc-beta/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevx_str_s.c b/src/files/lang/ntsc-beta/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbE.c b/src/files/lang/ntsc-beta/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbJ.c b/src/files/lang/ntsc-beta/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxbP.c b/src/files/lang/ntsc-beta/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_f.c b/src/files/lang/ntsc-beta/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_g.c b/src/files/lang/ntsc-beta/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_i.c b/src/files/lang/ntsc-beta/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/sevxb_str_s.c b/src/files/lang/ntsc-beta/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/shoE.c b/src/files/lang/ntsc-beta/shoE.c new file mode 100644 index 000000000..60389f002 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, theres another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/shoJ.c b/src/files/lang/ntsc-beta/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/shoP.c b/src/files/lang/ntsc-beta/shoP.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_f.c b/src/files/lang/ntsc-beta/sho_str_f.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_g.c b/src/files/lang/ntsc-beta/sho_str_g.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_i.c b/src/files/lang/ntsc-beta/sho_str_i.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/sho_str_s.c b/src/files/lang/ntsc-beta/sho_str_s.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-beta/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/siloE.c b/src/files/lang/ntsc-beta/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/siloJ.c b/src/files/lang/ntsc-beta/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/siloP.c b/src/files/lang/ntsc-beta/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_f.c b/src/files/lang/ntsc-beta/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_g.c b/src/files/lang/ntsc-beta/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_i.c b/src/files/lang/ntsc-beta/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/silo_str_s.c b/src/files/lang/ntsc-beta/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/statE.c b/src/files/lang/ntsc-beta/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/statJ.c b/src/files/lang/ntsc-beta/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/ntsc-beta/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/statP.c b/src/files/lang/ntsc-beta/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_f.c b/src/files/lang/ntsc-beta/stat_str_f.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_g.c b/src/files/lang/ntsc-beta/stat_str_g.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_i.c b/src/files/lang/ntsc-beta/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/stat_str_s.c b/src/files/lang/ntsc-beta/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-beta/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleE.c b/src/files/lang/ntsc-beta/titleE.c new file mode 100644 index 000000000..505278802 --- /dev/null +++ b/src/files/lang/ntsc-beta/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "rare twycross\n", + /*111*/ "chris stamper\n", + /*112*/ "wombat\n", + /*113*/ "rare miami\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "nintendo\n", + /*135*/ "mr arakawa\n", + /*136*/ "mike fukuda\n", + /*137*/ "don james\n", + /*138*/ "michael kelbaugh\n", + /*139*/ "howard lincoln\n", + /*140*/ "ken lobb\n", + /*141*/ "jacqualee story\n", + /*142*/ "gail tilden\n", + /*143*/ "copyright rare 2000\n", + /*144*/ "perfect dark and the pd device\n", + /*145*/ "are trademarks\n", + /*146*/ "rare\n", + /*147*/ "designs on the future\n", + /*148*/ "perfect dark is forever\n", + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleJ.c b/src/files/lang/ntsc-beta/titleJ.c new file mode 100644 index 000000000..f1ac89ef0 --- /dev/null +++ b/src/files/lang/ntsc-beta/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j. northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons animator\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "(is watching)\n", + /* 17*/ "b jones\n", + /* 18*/ "(unknown purpose)\n", + /* 19*/ "steve malpass\n", + /* 20*/ "edge wrangler\n", + /* 21*/ "brian marshall\n", + /* 22*/ "code janitor\n", + /* 23*/ "russell irwin\n", + /* 24*/ "pak man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "pad jockey\n", + /* 27*/ "ross bury\n", + /* 28*/ "pixel pusher\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonsz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "background artist\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "development tools\n", + /* 59*/ "richard gale\n", + /* 60*/ "mark green\n", + /* 61*/ "mark wilson\n", + /* 62*/ "hardware support\n", + /* 63*/ "pete cox\n", + /* 64*/ "paul mikell\n", + /* 65*/ "doug crouch\n", + /* 66*/ "thanks\n", + /* 67*/ "neil gallagher\n", + /* 68*/ "jonathon o'conner\n", + /* 69*/ "gareth glover\n", + /* 70*/ "motion capture\n", + /* 71*/ "alan tipper\n", + /* 72*/ "des easen\n", + /* 73*/ "jim ballard\n", + /* 74*/ "michelle tipper\n", + /* 75*/ "testing (rare)\n", + /* 76*/ "huw ward\n", + /* 77*/ "david wong\n", + /* 78*/ "adam munton\n", + /* 79*/ "luke munton\n", + /* 80*/ "garry phelps\n", + /* 81*/ "jon silke\n", + /* 82*/ "matthew carter\n", + /* 83*/ "gavin price\n", + /* 84*/ "gareth stevenson\n", + /* 85*/ "joe stamper\n", + /* 86*/ "stephen stamper\n", + /* 87*/ "testing (noa)\n", + /* 88*/ "nintendo guy\n", + /* 89*/ "nintendo gal\n", + /* 90*/ "rare miami\n", + /* 91*/ "eileen hochberg\n", + /* 92*/ "joel hochberg\n", + /* 93*/ "rare twycross\n", + /* 94*/ "chris stamper\n", + /* 95*/ "tim stamper\n", + /* 96*/ "nintendo\n", + /* 97*/ "ken lobb\n", + /* 98*/ "howard lincoln\n", + /* 99*/ "mr arrakawa\n", + /*100*/ "mr yamauchi\n", + /*101*/ "copyright rare 2000\n", + /*102*/ "perfect dark, the pd device and\n", + /*103*/ "perfecthead are trademarks\n", + /*104*/ "rare\n", + /*105*/ "designs on the future\n", + /*106*/ "t&a support\n", + /*107*/ "emma scully\n", + /*108*/ "claire phelan\n", + /*109*/ "joanna dark is forever\n", + /*110*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/titleP.c b/src/files/lang/ntsc-beta/titleP.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_f.c b/src/files/lang/ntsc-beta/title_str_f.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_g.c b/src/files/lang/ntsc-beta/title_str_g.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_i.c b/src/files/lang/ntsc-beta/title_str_i.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/title_str_s.c b/src/files/lang/ntsc-beta/title_str_s.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-beta/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traE.c b/src/files/lang/ntsc-beta/traE.c new file mode 100644 index 000000000..26aea314a --- /dev/null +++ b/src/files/lang/ntsc-beta/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traJ.c b/src/files/lang/ntsc-beta/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/ntsc-beta/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/traP.c b/src/files/lang/ntsc-beta/traP.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_f.c b/src/files/lang/ntsc-beta/tra_str_f.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_g.c b/src/files/lang/ntsc-beta/tra_str_g.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_i.c b/src/files/lang/ntsc-beta/tra_str_i.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/tra_str_s.c b/src/files/lang/ntsc-beta/tra_str_s.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-beta/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/uffE.c b/src/files/lang/ntsc-beta/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uffJ.c b/src/files/lang/ntsc-beta/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uffP.c b/src/files/lang/ntsc-beta/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_f.c b/src/files/lang/ntsc-beta/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_g.c b/src/files/lang/ntsc-beta/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_i.c b/src/files/lang/ntsc-beta/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/uff_str_s.c b/src/files/lang/ntsc-beta/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-beta/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-beta/waxE.c b/src/files/lang/ntsc-beta/waxE.c new file mode 100644 index 000000000..0810f4685 --- /dev/null +++ b/src/files/lang/ntsc-beta/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift Has Been Disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/waxJ.c b/src/files/lang/ntsc-beta/waxJ.c new file mode 100644 index 000000000..ccf1f85d0 --- /dev/null +++ b/src/files/lang/ntsc-beta/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/waxP.c b/src/files/lang/ntsc-beta/waxP.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_f.c b/src/files/lang/ntsc-beta/wax_str_f.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_g.c b/src/files/lang/ntsc-beta/wax_str_g.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_i.c b/src/files/lang/ntsc-beta/wax_str_i.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-beta/wax_str_s.c b/src/files/lang/ntsc-beta/wax_str_s.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-beta/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameE.c b/src/files/lang/ntsc-final/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/ntsc-final/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameJ.c b/src/files/lang/ntsc-final/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/ntsc-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ameP.c b/src/files/lang/ntsc-final/ameP.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_f.c b/src/files/lang/ntsc-final/ame_str_f.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_g.c b/src/files/lang/ntsc-final/ame_str_g.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_i.c b/src/files/lang/ntsc-final/ame_str_i.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ame_str_s.c b/src/files/lang/ntsc-final/ame_str_s.c new file mode 100644 index 000000000..09c7e2b80 --- /dev/null +++ b/src/files/lang/ntsc-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're\nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nSecurity Room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive; if you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/archE.c b/src/files/lang/ntsc-final/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/archJ.c b/src/files/lang/ntsc-final/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/archP.c b/src/files/lang/ntsc-final/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_f.c b/src/files/lang/ntsc-final/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_g.c b/src/files/lang/ntsc-final/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_i.c b/src/files/lang/ntsc-final/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arch_str_s.c b/src/files/lang/ntsc-final/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecE.c b/src/files/lang/ntsc-final/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecJ.c b/src/files/lang/ntsc-final/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arecP.c b/src/files/lang/ntsc-final/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_f.c b/src/files/lang/ntsc-final/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_g.c b/src/files/lang/ntsc-final/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_i.c b/src/files/lang/ntsc-final/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arec_str_s.c b/src/files/lang/ntsc-final/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/arkE.c b/src/files/lang/ntsc-final/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/ntsc-final/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/arkJ.c b/src/files/lang/ntsc-final/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/ntsc-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/arkP.c b/src/files/lang/ntsc-final/arkP.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_f.c b/src/files/lang/ntsc-final/ark_str_f.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_g.c b/src/files/lang/ntsc-final/ark_str_g.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_i.c b/src/files/lang/ntsc-final/ark_str_i.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ark_str_s.c b/src/files/lang/ntsc-final/ark_str_s.c new file mode 100644 index 000000000..557778f8e --- /dev/null +++ b/src/files/lang/ntsc-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evac\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Sight.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't\nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you\ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to...\nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ashE.c b/src/files/lang/ntsc-final/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ashJ.c b/src/files/lang/ntsc-final/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ashP.c b/src/files/lang/ntsc-final/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_f.c b/src/files/lang/ntsc-final/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_g.c b/src/files/lang/ntsc-final/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_i.c b/src/files/lang/ntsc-final/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ash_str_s.c b/src/files/lang/ntsc-final/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ateE.c b/src/files/lang/ntsc-final/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ateJ.c b/src/files/lang/ntsc-final/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/ntsc-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ateP.c b/src/files/lang/ntsc-final/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_f.c b/src/files/lang/ntsc-final/ate_str_f.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_g.c b/src/files/lang/ntsc-final/ate_str_g.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_i.c b/src/files/lang/ntsc-final/ate_str_i.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ate_str_s.c b/src/files/lang/ntsc-final/ate_str_s.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/ntsc-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/aztE.c b/src/files/lang/ntsc-final/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/ntsc-final/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/aztJ.c b/src/files/lang/ntsc-final/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/ntsc-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/ntsc-final/aztP.c b/src/files/lang/ntsc-final/aztP.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_f.c b/src/files/lang/ntsc-final/azt_str_f.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_g.c b/src/files/lang/ntsc-final/azt_str_g.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_i.c b/src/files/lang/ntsc-final/azt_str_i.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/azt_str_s.c b/src/files/lang/ntsc-final/azt_str_s.c new file mode 100644 index 000000000..c8e8f97f5 --- /dev/null +++ b/src/files/lang/ntsc-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Sight.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... Maybe it's coming from that other craft.\n", + /* 39*/ "I'd better find that jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind...the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/ntsc-final/catE.c b/src/files/lang/ntsc-final/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/catJ.c b/src/files/lang/ntsc-final/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/catP.c b/src/files/lang/ntsc-final/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_f.c b/src/files/lang/ntsc-final/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_g.c b/src/files/lang/ntsc-final/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_i.c b/src/files/lang/ntsc-final/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cat_str_s.c b/src/files/lang/ntsc-final/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/caveE.c b/src/files/lang/ntsc-final/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/ntsc-final/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/caveJ.c b/src/files/lang/ntsc-final/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/ntsc-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/caveP.c b/src/files/lang/ntsc-final/caveP.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_f.c b/src/files/lang/ntsc-final/cave_str_f.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_g.c b/src/files/lang/ntsc-final/cave_str_g.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_i.c b/src/files/lang/ntsc-final/cave_str_i.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cave_str_s.c b/src/files/lang/ntsc-final/cave_str_s.c new file mode 100644 index 000000000..bc8f7b607 --- /dev/null +++ b/src/files/lang/ntsc-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "Please holster your weapon, miss.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/ntsc-final/cradE.c b/src/files/lang/ntsc-final/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cradJ.c b/src/files/lang/ntsc-final/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cradP.c b/src/files/lang/ntsc-final/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_f.c b/src/files/lang/ntsc-final/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_g.c b/src/files/lang/ntsc-final/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_i.c b/src/files/lang/ntsc-final/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crad_str_s.c b/src/files/lang/ntsc-final/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypE.c b/src/files/lang/ntsc-final/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypJ.c b/src/files/lang/ntsc-final/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/crypP.c b/src/files/lang/ntsc-final/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_f.c b/src/files/lang/ntsc-final/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_g.c b/src/files/lang/ntsc-final/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_i.c b/src/files/lang/ntsc-final/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/cryp_str_s.c b/src/files/lang/ntsc-final/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/damE.c b/src/files/lang/ntsc-final/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/ntsc-final/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/damJ.c b/src/files/lang/ntsc-final/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/ntsc-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/damP.c b/src/files/lang/ntsc-final/damP.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_f.c b/src/files/lang/ntsc-final/dam_str_f.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_g.c b/src/files/lang/ntsc-final/dam_str_g.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_i.c b/src/files/lang/ntsc-final/dam_str_i.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/dam_str_s.c b/src/files/lang/ntsc-final/dam_str_s.c new file mode 100644 index 000000000..be1b2630f --- /dev/null +++ b/src/files/lang/ntsc-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me -\nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/ntsc-final/depoE.c b/src/files/lang/ntsc-final/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/ntsc-final/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depoJ.c b/src/files/lang/ntsc-final/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/ntsc-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/ntsc-final/depoP.c b/src/files/lang/ntsc-final/depoP.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_f.c b/src/files/lang/ntsc-final/depo_str_f.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_g.c b/src/files/lang/ntsc-final/depo_str_g.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_i.c b/src/files/lang/ntsc-final/depo_str_i.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/depo_str_s.c b/src/files/lang/ntsc-final/depo_str_s.c new file mode 100644 index 000000000..ff68390aa --- /dev/null +++ b/src/files/lang/ntsc-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the cam spy. Once shut down, the cam spy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead.\nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted.\nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe that \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51; that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/ntsc-final/destE.c b/src/files/lang/ntsc-final/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/destJ.c b/src/files/lang/ntsc-final/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/destP.c b/src/files/lang/ntsc-final/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_f.c b/src/files/lang/ntsc-final/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_g.c b/src/files/lang/ntsc-final/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_i.c b/src/files/lang/ntsc-final/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dest_str_s.c b/src/files/lang/ntsc-final/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/dishE.c b/src/files/lang/ntsc-final/dishE.c new file mode 100644 index 000000000..932fa468d --- /dev/null +++ b/src/files/lang/ntsc-final/dishE.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dishJ.c b/src/files/lang/ntsc-final/dishJ.c new file mode 100644 index 000000000..9ac44c2cf --- /dev/null +++ b/src/files/lang/ntsc-final/dishJ.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight From Table To Begin\n", + /* 9*/ "Activate The Night Sight\nLocate The Light Switch\nTurn The Lights Back On\n", + /* 10*/ "Collect Data Uplink From Table To Begin\n", + /* 11*/ "Stand next to the terminal and use the uplink\n", + /* 12*/ "You Need To Be Holding The Data Uplink\n", + /* 13*/ "Connection Established...\n", + /* 14*/ "Terminal Has Been Successfully Hacked\n", + /* 15*/ "Connection Broken - Too Far From PC\n", + /* 16*/ "Collect ECM Mine From Table To Begin\n", + /* 17*/ "Locate Hub And Throw ECM Mine Onto Hub\n", + /* 18*/ "ECM Mine Has Been Placed Incorrectly\n", + /* 19*/ "ECM Mine Has Been Placed Correctly\n", + /* 20*/ "Collect Eye-Spy From Table To Begin\n", + /* 21*/ "Locate Info Room PC and Holograph It\n", + /* 22*/ "Info Room PC Successfully Holographed\n", + /* 23*/ "Lights Have Been Re-activated\n", + /* 24*/ "Collect Door Decoder From Table To Begin\n", + /* 25*/ "Use Decoder On Door Pad To Unlock It\n", + /* 26*/ "You Need To Be Holding The Door Decoder\n", + /* 27*/ "Decoder Attached. Initiating Cracking Routines..\n", + /* 28*/ "Decoding Complete. Door Has Been Unlocked.\n", + /* 29*/ "Collect Tracker From Table To Begin\n", + /* 30*/ "Locate IR Scanner Using Tracker\n", + /* 31*/ "IR Scanner Has Been Successfully Located\n", + /* 32*/ "Collect IR Scanner From Table To Begin\n", + /* 33*/ "Locate Secret Door Using IR Scanner\n", + /* 34*/ "Secret Door Has Been Successfully Located\n", + /* 35*/ "Collect XRay Scanner From Table To Begin\n", + /* 36*/ "Find Hidden Switches To Shutdown Laser Grid\n", + /* 37*/ "All Laser Grids Have Been Deactivated\n", + /* 38*/ "Collect Disguise From Table To Begin\n", + /* 39*/ "Fool Someone Into Giving You Cloaking Device\n", + /* 40*/ "Cloaking Device Successfully Retrieved\n", + /* 41*/ "Laser Grid 1 Has Been Deactivated\n", + /* 42*/ "Laser Grid 2 Has Been Deactivated\n", + /* 43*/ "I'm Here To Pick The Equipment\n", + /* 44*/ "Go away Joanna, you don't fool me!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device Has Been Secured Successfully\n", + /* 47*/ "You're Meant To Use The Disguise, remember?\n", + /* 48*/ "You'll Have To Try Harder Than That Joanna\n", + /* 49*/ "Joanna - Where Did You Spring From?\n", + /* 50*/ "You Have Been Detected By The Camera\n", + /* 51*/ "Collect Cloaking Device From Table To Begin\n", + /* 52*/ "Use Cloaking Device And Locate Carrington\n", + /* 53*/ "I think we can safely say you're training\nis now complete!\n", + /* 54*/ "Mission Accomplished - Device Training Complete!\n", + /* 55*/ "Mission Failed - You Have Been Detected\n", + /* 56*/ "Select The Uplink\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Data Uplink And Release A\n", + /* 57*/ "Select The EyeSpy\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Eye-Spy And Release A\n", + /* 58*/ "Select The Night Vision\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Night Vision And Release A\n", + /* 59*/ "Select The Door Decoder\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight DoorDecoder And Release A\n", + /* 60*/ "Select The X-Ray Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight X-Ray Scanner And Release A\n", + /* 61*/ "Select The Disguise\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Disguise And Release A\n", + /* 62*/ "Select The IR Scanner\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight IR Scanner And Release A\n", + /* 63*/ "Select The Tracker\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Tracker And Release A\n", + /* 64*/ "Select The Cloaking Device\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight Device And Release A\n", + /* 65*/ "Select The ECM Mine\n- Hold A\n- Use Analogue Stick To Change Selecion\n- Highlight ECM Mine And Release A\n", + /* 66*/ "Joanna, It's good to see you.\n", + /* 67*/ "Come with me Joanna.\nI'll walk you to the training room.\n", + /* 68*/ "The information centre is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B next to Hovcrate to grab it...\n", + /* 74*/ "Press B when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble Tap B next to Hovbike to ride it...\n", + /* 76*/ "Double Tap B when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B next to door to open it.\n", + /* 78*/ "B will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B next to door to call elevator.\n", + /* 80*/ "Cannot Exit While Training Is In Progress\n", + /* 81*/ "Switch Code 1 Has Been Obtained.\n", + /* 82*/ "Switch Code 2 Has Been Obtained.\n", + /* 83*/ "Switch Code 3 Has Been Obtained.\n", + /* 84*/ "Switch Code 4 Has Been Obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C To Look Up At The Target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C To Look Down At The Target.\n", + /* 87*/ "Holoprogram 2 Has Been Completed Successfully.\n", + /* 88*/ "Holoprogram 4 Has Been Completed Successfully.\n", + /* 89*/ "Holoprogram 5 Has Been Completed Successfully.\n", + /* 90*/ "Guard Has Been Successfully Disarmed.\n", + /* 91*/ "Guard Has Been Successfully Knocked Out.\n", + /* 92*/ "Disarm This Live Target If You Can.\n", + /* 93*/ "Knock Out This Target - Stealth Is The Key.\n", + /* 94*/ "and the final guard....\n", + /* 95*/ "DUCK\n- Hold R Then Press Down C To Duck.\n", + /* 96*/ "CROUCH\n- When Ducking, Hold R Then Press Down C To Duck.\n", + /* 97*/ "Holoprogram 3 Has Been Completed Successfully.\n", + /* 98*/ "Activate All The Switches.\n", + /* 99*/ "Activate All Of The Wall Switches.\n- Be Quick, As They Will Quickly Reset.\n", + /*100*/ "Get The Access Codes By Examining Terminals.\n- Use The Codes On The Wall Terminals.\n", + /*101*/ "Code 1 Has Been Obtained.\n", + /*102*/ "Code 2 Has Been Obtained.\n", + /*103*/ "Code 3 Has Been Obtained.\n", + /*104*/ "Code 4 Has Been Obtained.\n", + /*105*/ "Training Failed - You Must Face Forward.\n", + /*106*/ "Holoprogram 1 Has Been Completed Successfully.\n", + /*107*/ "Unarmed Combat - Knock Out The Target.\n- Press Z repeatedly to punch.\n", + /*108*/ "Now Try Against A Moving Target...\n", + /*109*/ "And Finally Against A Target That Fights Back.\n", + /*110*/ "Defeat All Enemies Without Getting Hit.\n", + /*111*/ "Training Failed - You Have Been Hit.\n", + /*112*/ "Holoprogram 6 Has Been Completed Successfully.\n", + /*113*/ "Holoprogram 7 Has Been Completed Successfully.\n", + /*114*/ "TERMINALS\n- Press B next to terminal to use it.\n", + /*115*/ "Now Activate The Red Terminals On The Wall.\n", + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dishP.c b/src/files/lang/ntsc-final/dishP.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dishP.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_f.c b/src/files/lang/ntsc-final/dish_str_f.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_f.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_g.c b/src/files/lang/ntsc-final/dish_str_g.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_g.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_i.c b/src/files/lang/ntsc-final/dish_str_i.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_i.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/dish_str_s.c b/src/files/lang/ntsc-final/dish_str_s.c new file mode 100644 index 000000000..ef088cba6 --- /dev/null +++ b/src/files/lang/ntsc-final/dish_str_s.c @@ -0,0 +1,132 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Sight from table to begin.\n", + /* 9*/ "Activate the Night Sight.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earE.c b/src/files/lang/ntsc-final/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/ntsc-final/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earJ.c b/src/files/lang/ntsc-final/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/ntsc-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/earP.c b/src/files/lang/ntsc-final/earP.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_f.c b/src/files/lang/ntsc-final/ear_str_f.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_g.c b/src/files/lang/ntsc-final/ear_str_g.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_i.c b/src/files/lang/ntsc-final/ear_str_i.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ear_str_s.c b/src/files/lang/ntsc-final/ear_str_s.c new file mode 100644 index 000000000..1a5c140fd --- /dev/null +++ b/src/files/lang/ntsc-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Sight.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's\nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you\nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldE.c b/src/files/lang/ntsc-final/eldE.c new file mode 100644 index 000000000..746ed6f63 --- /dev/null +++ b/src/files/lang/ntsc-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldJ.c b/src/files/lang/ntsc-final/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/ntsc-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eldP.c b/src/files/lang/ntsc-final/eldP.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_f.c b/src/files/lang/ntsc-final/eld_str_f.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_g.c b/src/files/lang/ntsc-final/eld_str_g.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_i.c b/src/files/lang/ntsc-final/eld_str_i.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/eld_str_s.c b/src/files/lang/ntsc-final/eld_str_s.c new file mode 100644 index 000000000..319ebfcf9 --- /dev/null +++ b/src/files/lang/ntsc-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has neen restored to the Villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunE.c b/src/files/lang/ntsc-final/gunE.c new file mode 100644 index 000000000..d65751bc4 --- /dev/null +++ b/src/files/lang/ntsc-final/gunE.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunJ.c b/src/files/lang/ntsc-final/gunJ.c new file mode 100644 index 000000000..4c55c54e4 --- /dev/null +++ b/src/files/lang/ntsc-final/gunJ.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gunP.c b/src/files/lang/ntsc-final/gunP.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gunP.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_f.c b/src/files/lang/ntsc-final/gun_str_f.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_f.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_g.c b/src/files/lang/ntsc-final/gun_str_g.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_g.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_i.c b/src/files/lang/ntsc-final/gun_str_i.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_i.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/gun_str_s.c b/src/files/lang/ntsc-final/gun_str_s.c new file mode 100644 index 000000000..837b35bb2 --- /dev/null +++ b/src/files/lang/ntsc-final/gun_str_s.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, usually killing the target in approximately six seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impE.c b/src/files/lang/ntsc-final/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/ntsc-final/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impJ.c b/src/files/lang/ntsc-final/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/ntsc-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/impP.c b/src/files/lang/ntsc-final/impP.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_f.c b/src/files/lang/ntsc-final/imp_str_f.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_g.c b/src/files/lang/ntsc-final/imp_str_g.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_i.c b/src/files/lang/ntsc-final/imp_str_i.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/imp_str_s.c b/src/files/lang/ntsc-final/imp_str_s.c new file mode 100644 index 000000000..29186568e --- /dev/null +++ b/src/files/lang/ntsc-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them, they will help thin the attackers out.\n\n|Objective Two: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimize Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Minimize hostage casualties\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off; you can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/junE.c b/src/files/lang/ntsc-final/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/junJ.c b/src/files/lang/ntsc-final/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/junP.c b/src/files/lang/ntsc-final/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_f.c b/src/files/lang/ntsc-final/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_g.c b/src/files/lang/ntsc-final/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_i.c b/src/files/lang/ntsc-final/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/jun_str_s.c b/src/files/lang/ntsc-final/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamE.c b/src/files/lang/ntsc-final/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamJ.c b/src/files/lang/ntsc-final/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lamP.c b/src/files/lang/ntsc-final/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_f.c b/src/files/lang/ntsc-final/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_g.c b/src/files/lang/ntsc-final/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_i.c b/src/files/lang/ntsc-final/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lam_str_s.c b/src/files/lang/ntsc-final/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/leeE.c b/src/files/lang/ntsc-final/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/ntsc-final/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/leeJ.c b/src/files/lang/ntsc-final/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/ntsc-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/leeP.c b/src/files/lang/ntsc-final/leeP.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_f.c b/src/files/lang/ntsc-final/lee_str_f.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_g.c b/src/files/lang/ntsc-final/lee_str_g.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_i.c b/src/files/lang/ntsc-final/lee_str_i.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lee_str_s.c b/src/files/lang/ntsc-final/lee_str_s.c new file mode 100644 index 000000000..5330b352a --- /dev/null +++ b/src/files/lang/ntsc-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift;\nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter.\nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lenE.c b/src/files/lang/ntsc-final/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lenJ.c b/src/files/lang/ntsc-final/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lenP.c b/src/files/lang/ntsc-final/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_f.c b/src/files/lang/ntsc-final/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_g.c b/src/files/lang/ntsc-final/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_i.c b/src/files/lang/ntsc-final/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/len_str_s.c b/src/files/lang/ntsc-final/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/lipE.c b/src/files/lang/ntsc-final/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/ntsc-final/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lipJ.c b/src/files/lang/ntsc-final/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/ntsc-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lipP.c b/src/files/lang/ntsc-final/lipP.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_f.c b/src/files/lang/ntsc-final/lip_str_f.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_g.c b/src/files/lang/ntsc-final/lip_str_g.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_i.c b/src/files/lang/ntsc-final/lip_str_i.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lip_str_s.c b/src/files/lang/ntsc-final/lip_str_s.c new file mode 100644 index 000000000..f7214d8c9 --- /dev/null +++ b/src/files/lang/ntsc-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lueE.c b/src/files/lang/ntsc-final/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/ntsc-final/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lueJ.c b/src/files/lang/ntsc-final/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/ntsc-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/lueP.c b/src/files/lang/ntsc-final/lueP.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_f.c b/src/files/lang/ntsc-final/lue_str_f.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_g.c b/src/files/lang/ntsc-final/lue_str_g.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_i.c b/src/files/lang/ntsc-final/lue_str_i.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/lue_str_s.c b/src/files/lang/ntsc-final/lue_str_s.c new file mode 100644 index 000000000..1b2ae8c64 --- /dev/null +++ b/src/files/lang/ntsc-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point; a deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall; \nwatch out for these guards.\n", + /* 61*/ "Here is the communications antenna; \nattach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No? Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/ntsc-final/miscE.c b/src/files/lang/ntsc-final/miscE.c new file mode 100644 index 000000000..9b4701a18 --- /dev/null +++ b/src/files/lang/ntsc-final/miscE.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "YKK: 95935", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PeaceSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KazeSim", + /* 98*/ "FistSim", + /* 99*/ "PreySim", + /*100*/ "CowardSim", + /*101*/ "JudgeSim", + /*102*/ "FeudSim", + /*103*/ "SpeedSim", + /*104*/ "TurtleSim", + /*105*/ "VengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A51 Infiltration", + /*144*/ "A51 Infiltration X", + /*145*/ "A51 Rescue", + /*146*/ "A51 Rescue X", + /*147*/ "A51 Escape", + /*148*/ "A51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon\n", + /*171*/ "Function\n", + /*172*/ "Orders\n", + /*173*/ "No Weapon\n", + /*174*/ "Pick Target\n", + /*175*/ "Follow\n", + /*176*/ "Attack\n", + /*177*/ "Defend\n", + /*178*/ "Hold\n", + /*179*/ "Normal\n", + /*180*/ "Download\n", + /*181*/ "Get Case\n", + /*182*/ "Tag Box\n", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "JM: 201172", + /*209*/ "Save Case\n", + /*210*/ "Def Hill\n", + /*211*/ "Hold Hill\n", + /*212*/ "Get Case\n", + /*213*/ "Pop Cap\n", + /*214*/ "Protect\n", + /*215*/ "All Simulants\n", + /*216*/ "MODEL 1.3", + /*217*/ "BNC: 15877", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ "Stealth\n", +}; diff --git a/src/files/lang/ntsc-final/miscJ.c b/src/files/lang/ntsc-final/miscJ.c new file mode 100644 index 000000000..5b110ec01 --- /dev/null +++ b/src/files/lang/ntsc-final/miscJ.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Bond Invisible", + /* 5*/ "Bond Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny Bond", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Golden Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "invincibility on\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Bond Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny Bond On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy Now Karl?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Bond Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Bond Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - Abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun\n", + /* 72*/ "Don't point that gun at me\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "EYESPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is therefore the best choice for the beginner. It is not very intelligent and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills & intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists which protest the use of weapons. They will go around the level hunting for guns that are lying around and horde them so that players cannot use them. Of course, if you were to shoot them they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamiKazeSim: This simulant will stop at nothing to destroy it's target. It is very aggressive and never keeps it's distance (even if it's holding a grenade!). Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However it has no such reservations when it comes to unarmed combat. It will always try to use it's fists to attack or disarm it's opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try and survive by running away. It may sometimes attack but only if the opponent has an inferior weapon. Draw out a better gun or shoot it and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and dispises the tactics of the PredatorSim. It will always try and kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily out-run a human player so it's no use running away from a CheetahSim unless you know some good short-cuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately this restricts the hosts movement so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomise\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Flag", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Flag", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the callsign 'Perfect Dark'.\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark he held the honour of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents, runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power, dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she hates. \n\n[source: WALL STREET JOURNAL]\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne corp with an emphasis on language skills and code-breaking. Fortunately he has morals, and due to his formidable level of intelligence has guessed some of dataDyne's future plans. The voice is highly precise and educated, and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde young human male whose the voice is dull, annoying, and cringeworthy. Very tall. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar Warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The US President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys'. They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington, a formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. Tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion, and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battlecruiser of immense power was scuttled in the Pacific ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of Humans alone to develop.\n\nThe Maians meet the Skedar and they have a fight that turns into a protracted war. After hundreds of years of fighting an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations'. They fear that announcing their presence may well precipitate further wars on the planet, and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battlecruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battlecruiser is. Their tests direct them to the pacific ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne have to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the president. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the US government so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne have made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battlecruiser. When it expresses concern about the mission it is being created for the response of Cassandra De Vries is to order its personality removed. Clearly it is thinking too much. In desperation it contacts the Carrington organisation with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation, but continues with the mission to get him/it to a place of safety. With the alarm raised Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll but her boss has heard enough from the AI to prompt him into summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 building, a front for the dataDyne corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent job for her to complete first.\n\nThe specialists' have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the president's entourage to gain access to the airbase where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for the President, Elvis, herself and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible they head down to the ocean floor, where they get their first sight of the sunken Cetan battlecruiser. Entering the ship through the portal the Skedar have made they come across a dead skedar warrior... clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship where they find the AI that was once Dr. Caroll. Once his personality is restored he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. Joanna holds them off while the majority of the employees escape, before getting knocked unconscious and captured by the Skedar.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar battle shrine, which gives Elvis a shock since the Maians could never find this Skedar holiest of holy places. If the Shrine is destroyed the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the battle shrine, while Elvis returns to the Assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "dataDyne are nasty\n", + /*269*/ "Carrington Institute\n", + /*270*/ "The Carrington Institute is lovely\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human sized pulse of heat.\n\nTraining Instructions\n- Holograph the Hackers terminal next door in the Info room.\n\nOperation\n- Press Z to take a holograph. Pressing B will open any doors in the way.Hold down R to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights lifeforms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch and activate it to turn the lights back on.\n\nOperation\n- Select the Nightvision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Standalone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the door decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press B while holding the door decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the night vision and IR goggles can not.\n\nTraining Instructions\n- With the Xray Scanner on, search for the 2 hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the Xray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick witted enemy.\n\nTraining Instructions\n- Grimshaw has a cloaking device waiting to be serviced. Head next door and 'aquire' it from him.\n\nOperation\n- To wear the disguise simply select it from your inventory.\n", + /*276*/ "Drscription\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Distrupts the radiation field around the wearer, creating a chameleon type effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the cloaking device and head to Carringtons office to suprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM mine onto the lighting hub located through the secret door.\n\nOperation\n- Press Z to throw the mine. Hold down R and move the stick to fine tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Comms Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press B when holding Comms Uplink.\n", + /*281*/ "FIRING\n Press Z to fire gun\n", + /*282*/ "AUTO RELOAD\n Release Z to reload when magazine empty\n", + /*283*/ "MANUAL RELOAD\n Press B to reload early if magazine not full\n", + /*284*/ "Aiming: hold down R to enter aim mode\n", + /*285*/ "Use analog stick to move aiming sight\n", + /*286*/ "AUTO FIRE\n Hold Z to repeatedly fire automatically\n", + /*287*/ "ALTER AIM\n Press up C or down C to move sight up/down\n", + /*288*/ "ZOOM\n Hold R to enter Zoom mode\n", + /*289*/ "FAST FIRE\n Press Z quickly to fire faster\n", + /*290*/ "ELVIS IS DEAD OR FALLEN OUT OF THE BACKGROUND\n", + /*291*/ "Carrington Institute\0|Main building and base of operations\n", + /*292*/ "Lucerne Tower\0|Global Headquarters\n", + /*293*/ "Laboratory Basement\0|Underground research labs\n", + /*294*/ "Carrington Villa\0|Private coastal retreat\n", + /*295*/ "Chicago\0|Backstreets of the city\n", + /*296*/ "G5 Building\0|dataDyne front corporation\n", + /*297*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*298*/ "Alaskan Airbase\0|Brooks Range, Alaska\n", + /*299*/ "Air Force One\0|The President's Airplane\n", + /*300*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*301*/ "Pelagic 2\0|Specialised Deep Sea Research Ship\n", + /*302*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*303*/ "Skedar Assault Ship\0|Troop Carrying spacecraft\n", + /*304*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*305*/ "Dropship\0|Insert subtitle here\n", + /*306*/ "HoverCrate\0|Insert subtitle here\n", + /*307*/ "HoverBike\0|subtitle here\n", + /*308*/ "Cleaning Hovbot\0|Insert subtitle here\n", + /*309*/ "Hovercopter\0|Insert subtitle here\n", + /*310*/ "G5 Robot\0|Insert subtitle here\n", + /*311*/ "A51 Interceptor\0|Insert subtitle here\n", + /*312*/ "Maian Vessel\0|Insert subtitle here\n", + /*313*/ "Skedar Shuttle\0|Insert subtitle here\n", + /*314*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*315*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*316*/ "These heavily guarded, well hidden labs hold the key to dataDyne's future. Within them, techs work on top secret projects aimed at putting dataDyne on the top of the heap.\n", + /*317*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*318*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 corporation has their headquarters.\n", + /*319*/ "Inside the G5 building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*320*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*321*/ "One of a series of reinforced airbases available as staging posts for Air Force One. Typically, the airbase is remote, in an inhospitable region, far away from prying eyes.\n", + /*322*/ "This particular Air Force One is optimised for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*323*/ "In the rocky snow-covered landscape of the Arctic Circle the wreckage of the stricken plane has come to rest.\n", + /*324*/ "Owned by the US government, the Pelagic 2 is capable of staging deep sea diving operations in all weathers. It is the only fully integrated ocean floor research vessel in the world.\n", + /*325*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*326*/ "An interplanetary assault ship that carries Skedar Warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*327*/ "A highly arid planet, wracked by earthquakes, sandstorms and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*328*/ "that thing in the first cutscene\n", + /*329*/ "a floating crate\n", + /*330*/ "a floating bike\n", + /*331*/ "a floating hoover\n", + /*332*/ "a cool ship with startling AI and realistic dynamic movement\n", + /*333*/ "a superb attack drone with lovely rotating guns and brilliant AI\n", + /*334*/ "just as cool as the hovercopter, especially when it crashes\n", + /*335*/ "ooh! shiny\n", + /*336*/ "skedar shuttle thing\n", + /*337*/ "Description\n- A good agent notices everything around them.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press Down C\n-Look down- Press Up C\n-Free Look- Hold down R to enter aim mode and use the stick to look.\n", + /*338*/ "Description\n- Proverb type saying about movement 1 here.\n\nTraining Instructions\n- Activate All Of The Switches In Front. Be Quick Though, As Each Switch Will Reset On A Time Limit.\n\nOperation\n- Sidestep left- Left C\n- Sidestep right- Right C\n\n", + /*339*/ "Description\n- Proverb type saying about movement 2 here.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate The Switches.\n\nOperation\n- Duck- Hold R then press down C.\n- Crouch- When ducking, Hold R then press down C.\n- Get Up- Tap R.\n\n", + /*340*/ "Description\n- Proverb type saying about unarmed combat 1 here.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press Z repeatedly when unarmed to launch a flurry of punches.\n\n", + /*341*/ "Description\n- Proverb type saying about unarmed combat 2 here.\n\nTraining Instructions\n- Knockout/Disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold B then press Z to disarm an enemy.\n- Knockout Punch - punch an unaware enemy from behind.\n", + /*342*/ "Description\n- Proverb type saying about combat test 1 here.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*343*/ "Description\n- Proverb type saying about combat test 2 here.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*344*/ "holo_tips1\n", + /*345*/ "holo_tips2\n", + /*346*/ "holo_tips3\n", + /*347*/ "holo_tips4\n", + /*348*/ "holo_tips5\n", + /*349*/ "holo_tips6\n", + /*350*/ "holo_tips7\n", + /*351*/ "holo_advice1\n", + /*352*/ "holo_advice2\n", + /*353*/ "holo_advice3\n", + /*354*/ "holo_advice4\n", + /*355*/ "holo_advice5\n", + /*356*/ "holo_advice6\n", + /*357*/ "holo_advice7\n", + /*358*/ "device_tips1\n", + /*359*/ "device_tips2\n", + /*360*/ "device_tips3\n", + /*361*/ "device_tips4\n", + /*362*/ "device_tips5\n", + /*363*/ "device_tips6\n", + /*364*/ "device_tips7\n", + /*365*/ "device_tips8\n", + /*366*/ "device_tips9\n", + /*367*/ "device_tips10\n", + /*368*/ "device_advice1\n", + /*369*/ "device_advice2\n", + /*370*/ "device_advice3\n", + /*371*/ "device_advice4\n", + /*372*/ "device_advice5\n", + /*373*/ "device_advice6\n", + /*374*/ "device_advice7\n", + /*375*/ "device_advice8\n", + /*376*/ "device_advice9\n", + /*377*/ "device_advice10\n", + /*378*/ "Instructions for falcon2\n", + /*379*/ "Instructions for falcon2scope\n", + /*380*/ "Instructions for falcon2silenced\n", + /*381*/ "Instructions for leegun1\n", + /*382*/ "Instructions for skedarpistol\n", + /*383*/ "Instructions for maianpistol\n", + /*384*/ "Instructions for dy357\n", + /*385*/ "Instructions for dy357_trent\n", + /*386*/ "Instructions for cmp150\n", + /*387*/ "Instructions for cyclone\n", + /*388*/ "Instructions for maiansmg\n", + /*389*/ "Instructions for anothersmg\n", + /*390*/ "Instructions for pcgun\n", + /*391*/ "Instructions for dydragon\n", + /*392*/ "Instructions for k7avenger\n", + /*393*/ "Instructions for ar34\n", + /*394*/ "Instructions for dysuperdragon\n", + /*395*/ "Instructions for shotgun\n", + /*396*/ "Instructions for sniperrifle\n", + /*397*/ "Instructions for z2020\n", + /*398*/ "Instructions for crossbow\n", + /*399*/ "Instructions for druggun\n", + /*400*/ "Instructions for skedarminigun\n", + /*401*/ "Instructions for dydevastator\n", + /*402*/ "Instructions for dyrocket\n", + /*403*/ "Instructions for skedarrocket\n", + /*404*/ "Instructions for knife\n", + /*405*/ "Instructions for laser\n", + /*406*/ "Instructions for grenade\n", + /*407*/ "Instructions for nbomb\n", + /*408*/ "Instructions for timedmine\n", + /*409*/ "Instructions for proximitymine\n", + /*410*/ "Instructions for remotemine\n", + /*411*/ "Style 1", + /*412*/ "Style 2", + /*413*/ "Style 3", + /*414*/ "Style 4", + /*415*/ "Blond", + /*416*/ "Black", + /*417*/ "Auburn", + /*418*/ "Blue Rinse", + /*419*/ "Player", + /*420*/ "", + /*421*/ "Identify\n", + /*422*/ "Sim", + /*423*/ "Challenges\n", + /*424*/ "Load/Preset Games\n", + /*425*/ "Quick Start\n", + /*426*/ "Advanced Setup\n", + /*427*/ "Combat Simulator\n", + /*428*/ "Carrington Institute\n", + /*429*/ "Team Score\n", + /*430*/ "Finished Setup\n", + /*431*/ "Player 1 Team\n", + /*432*/ "Player 2 Team\n", + /*433*/ "Player 3 Team\n", + /*434*/ "Player 4 Team\n", + /*435*/ "Number Of Sims\n", + /*436*/ "Sims Per Team\n", + /*437*/ "Sim Difficulty\n", + /*438*/ "Start Game\n", + /*439*/ "Drop Out\n", + /*440*/ "Player Settings\n", + /*441*/ "Game Settings\n", + /*442*/ "Quick Go\n", + /*443*/ "Ready!\n", + /*444*/ "Quick Team\n", + /*445*/ "Players Only\n", + /*446*/ "Players and Simulants\n", + /*447*/ "Player Teams\n", + /*448*/ "Players versus Simulants\n", + /*449*/ "Player-Simulant Teams\n", + /*450*/ NULL, + /*451*/ NULL, + /*452*/ NULL, + /*453*/ NULL, + /*454*/ NULL, + /*455*/ NULL, + /*456*/ NULL, + /*457*/ NULL, + /*458*/ NULL, + /*459*/ NULL, + /*460*/ NULL, + /*461*/ NULL, + /*462*/ NULL, + /*463*/ NULL, + /*464*/ NULL, + /*465*/ NULL, + /*466*/ NULL, + /*467*/ NULL, + /*468*/ NULL, + /*469*/ NULL, + /*470*/ NULL, + /*471*/ NULL, + /*472*/ NULL, + /*473*/ NULL, + /*474*/ NULL, + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/miscP.c b/src/files/lang/ntsc-final/miscP.c new file mode 100644 index 000000000..fd5f4834a --- /dev/null +++ b/src/files/lang/ntsc-final/miscP.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_f.c b/src/files/lang/ntsc-final/misc_str_f.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_f.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_g.c b/src/files/lang/ntsc-final/misc_str_g.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_g.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_i.c b/src/files/lang/ntsc-final/misc_str_i.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_i.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/misc_str_s.c b/src/files/lang/ntsc-final/misc_str_s.c new file mode 100644 index 000000000..ce2945e31 --- /dev/null +++ b/src/files/lang/ntsc-final/misc_str_s.c @@ -0,0 +1,480 @@ +#include + +char *lang[] = { + /* 0*/ "Invincible", + /* 1*/ "All Guns", + /* 2*/ "Super x2 Health", + /* 3*/ "Super x2 Armor", + /* 4*/ "Invisible", + /* 5*/ "Phase", + /* 6*/ "Infinite Ammo", + /* 7*/ "DK Mode", + /* 8*/ "Tiny", + /* 9*/ "Super x10 Health", + /* 10*/ "Magnum", + /* 11*/ "Laser", + /* 12*/ "Gun", + /* 13*/ "Silver PP7", + /* 14*/ "Gold PP7", + /* 15*/ "Invincibility On\n", + /* 16*/ "All Guns On\n", + /* 17*/ "Maximum Ammo\n", + /* 18*/ "Super x2 Health\n", + /* 19*/ "Super x2 Armor\n", + /* 20*/ "Invisibility On\n", + /* 21*/ "Phase On\n", + /* 22*/ "Infinite Ammo On\n", + /* 23*/ "DK Mode On\n", + /* 24*/ "Extra Weapons\n", + /* 25*/ "Tiny On\n", + /* 26*/ "Paintball Mode On\n", + /* 27*/ "Super x10 Health\n", + /* 28*/ "Happy?\n", + /* 29*/ "Fast Mode On\n", + /* 30*/ "Invincibility Off\n", + /* 31*/ "All Guns Off\n", + /* 32*/ "Invisibility Off\n", + /* 33*/ "Phase Off\n", + /* 34*/ "Infinite Ammo Off\n", + /* 35*/ "DK Mode Off\n", + /* 36*/ "Tiny Off\n", + /* 37*/ "Paintball Mode Off\n", + /* 38*/ "Radar On\n", + /* 39*/ "Fast Mode Off\n", + /* 40*/ "NO NAME", + /* 41*/ "E R R O R\n", + /* 42*/ "No briefing for this mission\n", + /* 43*/ "\n", + /* 44*/ "Objective", + /* 45*/ "Completed\n", + /* 46*/ "Incomplete\n", + /* 47*/ "Failed\n", + /* 48*/ "Slowest Motion\n", + /* 49*/ "Very Slow Motion\n", + /* 50*/ "Slow Motion\n", + /* 51*/ "Normal Motion\n", + /* 52*/ "Fast Motion\n", + /* 53*/ "Very Fast Motion\n", + /* 54*/ "Fastest Motion\n", + /* 55*/ "Line Mode", + /* 56*/ "Paintball Mode", + /* 57*/ "Enemy Rockets", + /* 58*/ "2x Rocket L.", + /* 59*/ "2x Grenade L.", + /* 60*/ "2x RC-P90", + /* 61*/ "2x Throwing Knife", + /* 62*/ "2x Hunting Knife", + /* 63*/ "2x Laser", + /* 64*/ "Turbo Mode", + /* 65*/ "Fast Animation", + /* 66*/ "Slow Animation", + /* 67*/ "No Radar [Multi]", + /* 68*/ "One minute left.\n", + /* 69*/ "OBJECTIVES FAILED - abort mission.\n", + /* 70*/ "Guard Greeting\n", + /* 71*/ "What's that gun?\n", + /* 72*/ "Don't point that gun at me.\n", + /* 73*/ "S/MPS", + /* 74*/ "H/M", + /* 75*/ "Y/D", + /* 76*/ "P/D", + /* 77*/ "CI 2023", + /* 78*/ "BN: 161176", + /* 79*/ "CAMSPY", + /* 80*/ "MODEL 1.2", + /* 81*/ "GYROSTAT", + /* 82*/ "Meat", + /* 83*/ "Easy", + /* 84*/ "Normal", + /* 85*/ "Hard", + /* 86*/ "Perfect", + /* 87*/ "Dark", + /* 88*/ "MeatSim", + /* 89*/ "EasySim", + /* 90*/ "NormalSim", + /* 91*/ "HardSim", + /* 92*/ "PerfectSim", + /* 93*/ "DarkSim", + /* 94*/ "PacifistSim", + /* 95*/ "ShieldSim", + /* 96*/ "RocketSim", + /* 97*/ "KamikazeSim", + /* 98*/ "FistSim", + /* 99*/ "PredatorSim", + /*100*/ "CowardSim", + /*101*/ "JusticeSim", + /*102*/ "VendettaSim", + /*103*/ "CheetahSim", + /*104*/ "TurtleSim", + /*105*/ "RevengeSim", + /*106*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /*107*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /*108*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /*109*/ "HardSim: This simulant is as skilled as a good human player.\n", + /*110*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /*111*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /*112*/ "PacifistSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /*113*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /*114*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /*115*/ "KamikazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /*116*/ "FistSim: This simulant protests the use of weapons in a similar way to the PacifistSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /*117*/ "PredatorSim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /*118*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /*119*/ "JusticeSim: This simulant has a strong sense of justice and despises the tactics of the PredatorSim. It will always try to kill the winning player in order to even up the score.\n", + /*120*/ "VendettaSim: Once this simulant picks a target, that player had better watch out! A VendettaSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /*121*/ "CheetahSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a CheetahSim unless you know some good shortcuts!\n", + /*122*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /*123*/ "RevengeSim: Be careful if you shoot or kill a RevengeSim because it always attacks the player who last killed it.", + /*124*/ "Dark Combat", + /*125*/ "Skedar Mystery", + /*126*/ "CI Operative", + /*127*/ "dataDyne Action", + /*128*/ "Maian Tears", + /*129*/ "Alien Conflict", + /*130*/ "Carrington Institute", + /*131*/ "dD Central", + /*132*/ "dD Central X", + /*133*/ "dD Research", + /*134*/ "dD Research X", + /*135*/ "dD Extraction", + /*136*/ "dD Extraction X", + /*137*/ "Carrington Villa", + /*138*/ "Carrington Villa X", + /*139*/ "Chicago", + /*140*/ "Chicago X", + /*141*/ "G5 Building", + /*142*/ "G5 Building X", + /*143*/ "A-51 Infiltration", + /*144*/ "A-51 Infiltration X", + /*145*/ "A-51 Rescue", + /*146*/ "A-51 Rescue X", + /*147*/ "A-51 Escape", + /*148*/ "A-51 Escape X", + /*149*/ "Air Base", + /*150*/ "Air Base X", + /*151*/ "Air Force One", + /*152*/ "Air Force One X", + /*153*/ "Crash Site", + /*154*/ "Crash Site X", + /*155*/ "Pelagic II", + /*156*/ "Pelagic II X", + /*157*/ "Deep Sea", + /*158*/ "Deep Sea X", + /*159*/ "Institute Defense", + /*160*/ "Institute Defense X", + /*161*/ "Attack Ship", + /*162*/ "Attack Ship X", + /*163*/ "Skedar Ruins", + /*164*/ "Skedar Ruins X", + /*165*/ "End Credits", + /*166*/ "Random\n", + /*167*/ "Select All\n", + /*168*/ "Select None\n", + /*169*/ "Randomize\n", + /*170*/ "Weapon", + /*171*/ "Function", + /*172*/ "Orders", + /*173*/ "No Weapon", + /*174*/ "Pick Target\n", + /*175*/ "Follow", + /*176*/ "Attack", + /*177*/ "Defend", + /*178*/ "Hold", + /*179*/ "Normal", + /*180*/ "Download", + /*181*/ "Get Case", + /*182*/ "Tag Box", + /*183*/ "Killed by", + /*184*/ "Killed", + /*185*/ "Beginner:21\n", + /*186*/ "Trainee:20\n", + /*187*/ "Amateur:19\n", + /*188*/ "Rookie:18\n", + /*189*/ "Novice:17\n", + /*190*/ "Trooper:16\n", + /*191*/ "Agent:15\n", + /*192*/ "Star Agent:14\n", + /*193*/ "Special Agent:13\n", + /*194*/ "Expert:12\n", + /*195*/ "Veteran:11\n", + /*196*/ "Professional:10\n", + /*197*/ "Dangerous:9\n", + /*198*/ "Deadly:8\n", + /*199*/ "Killer:7\n", + /*200*/ "Assassin:6\n", + /*201*/ "Lethal:5\n", + /*202*/ "Elite:4\n", + /*203*/ "Invincible:3\n", + /*204*/ "Near Perfect:2\n", + /*205*/ "Perfect:1\n", + /*206*/ "DARTAMMO", + /*207*/ "MODEL 1.4", + /*208*/ "BN: 200959", + /*209*/ "Save Case", + /*210*/ "Def Hill", + /*211*/ "Hold Hill", + /*212*/ "Get Case", + /*213*/ "Pop Cap", + /*214*/ "Protect", + /*215*/ "All Simulants", + /*216*/ "MODEL 1.3", + /*217*/ "BN: 261069", + /*218*/ "Not enough room to launch ", + /*219*/ "Joanna Dark\n", + /*220*/ "Human (Female)\n", + /*221*/ "23 years 2 months\n", + /*222*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*223*/ "Jonathan\n", + /*224*/ "Human (Male)\n", + /*225*/ "28 years 5 months\n", + /*226*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*227*/ "Daniel Carrington\n", + /*228*/ "Human (Male)\n", + /*229*/ "62 years 8 months\n", + /*230*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*231*/ "Cassandra De Vries\n", + /*232*/ "Human (Female)\n", + /*233*/ "39 years ? months\n", + /*234*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*235*/ "Trent Easton\n", + /*236*/ "Human (Male)\n", + /*237*/ "46 years ? months\n", + /*238*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*239*/ "Dr. Caroll\n", + /*240*/ "The Caroll Sapient (AI)\n", + /*241*/ "6 months\n", + /*242*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*243*/ "Elvis\n", + /*244*/ "Maian (Male)\n", + /*245*/ "320 years\n", + /*246*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*247*/ "Mr. Blonde\n", + /*248*/ "Human (Male)\n", + /*249*/ "Late 20's\n", + /*250*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*251*/ "Mr. Blonde\n", + /*252*/ "Skedar (disguised)\n", + /*253*/ "unknown\n", + /*254*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*255*/ "The U.S. President\n", + /*256*/ "Human (Male)\n", + /*257*/ "50 years\n", + /*258*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*259*/ "Maians\n", + /*260*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*261*/ "Skedar Warrior\n", + /*262*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use huge mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*263*/ "Background\n", + /*264*/ "Millions of years ago, a battle cruiser of immense power was scuttled in the Pacific Ocean by a race of aliens called Cetans. It was equipped with an untried weapon - the weak nuclear force de-coupler, which could in theory cause the bonds which held molecules together to fail. So that watching eyes would believe in the destruction of the ship, a message pod was sent back to the home system, and vital parts of the drive systems were destroyed in the star system they had chosen to hide in.\n\nMaian aliens encounter life on Earth. They see potential, but decide to leave the primitive race of humans alone to develop.\n\nThe Maians meet the Skedar, and they have a fight that turns into a protracted war. After hundreds of years of fighting, an uneasy peace develops. Fanatical Skedar continually test the boundaries of this peace with terrorist activities, but the Maians refuse to be drawn.\n\nThe Maians are wary of humans, sensing that too many crises have arisen on Earth as a result of technology and 'outside context situations.' They fear that announcing their presence may well precipitate further wars on the planet and therefore decide to observe the race until it becomes more mature.\n\nDaniel Carrington jumps the gun by contacting a Maian ship in orbit above Earth. He has a plan that would help both parties, resulting in accelerated contact between humans and Maians. Having agreed that his plan is sound, and that he is a person of integrity, the Maians help Daniel Carrington to release their technology into the public domain.\n\nThe Skedar fanatics find a message pod from the Cetan battle cruiser. They immediately scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to find out where the battle cruiser is. Their tests direct them to the Pacific Ocean where they locate the ship. However, they need help to get to it.\n\nThey perform their own study of Earth and come up with a shortlist of companies with the resources to help them recover the sunken ship. At the top of the list is the dataDyne Corporation. They contact the head of the corporation, Cassandra De Vries, and present her with a deal that sounds too good to be true - which it is. They say that in return for helping the Skedar raise 'their' ship from the ocean floor, they will give dataDyne enough technology to become the biggest corporation on the planet. All that dataDyne has to do is build an AI unit with language and code-breaking abilities. This is tricky, but within their means. Work commences on the project.\n\nCassandra De Vries approaches the head of the NSA, Trent Easton, with the details. He attempts to get Presidential approval for the loan of a deep-sea research vessel to dataDyne but is refused by the President. There is no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. government, so they settle on a plan of replacing the President with a clone that they can control. This promises to have extra rewards for Trent and Cassandra after the Skedar operation is finished.\n\nHowever, they will not have an awful lot of time to gloat. The Skedar plan to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence. Cassandra is blinded to the possibility of being double-crossed by the enormous gain in power she will have. This affliction also affects Trent Easton.\n\nBut dataDyne has made the one thing that can see such dangers emerge from the sea of facts around itself - the sapient AI created to crack the access codes of the Cetan battle cruiser. When it expresses concern about the mission it is being created for, the response of Cassandra De Vries is to order its personality removed. Clearly, it is thinking too much. In desperation, it contacts the Carrington organization with a plea for help, under the pseudonym Dr. Caroll...\n", + /*265*/ "The Story\n", + /*266*/ "Untried agent Joanna Dark is assigned the mission to extract a scientist from the high security research area below the dataDyne skyscraper. She is surprised to discover that 'Dr. Caroll' is an AI created by the corporation but continues with the mission to get him/it to a place of safety. With the alarm raised, Joanna has to fight her way up the tower to get to the helipad for the extraction by dropship.\n\nIn response to this, dataDyne targets Daniel Carrington and takes him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for Daniel Carrington's life. Unknown to them, the AI is at the villa. Carrington had been talking with it to find out about dataDyne's future plans. Joanna rescues Daniel but is unable to prevent dataDyne from recovering Dr. Caroll. However, her boss has heard enough from the AI to prompt him to summon a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. She learns of the involvement of Trent Easton, the head of the NSA, and of the strange Nordic men that seem to be in control of the whole scheme. Once the plan to move on the President is disclosed by Trent, Jo calls in with the news but finds out there is another, more urgent, job for her to complete first.\n\nThe specialists have been intercepted by the conspirators, and the survivors of the crash and the crash wreckage itself have been taken to Area 51 in Nevada. Joanna is dropped in to link up with another Carrington Institute agent to rescue any survivors and to retrieve any of their equipment. When she breaks into the medlab, Joanna discovers the Carrington Institute's secret - their allies are Maians, the aliens known as Greys. The particular alien she rescues is called Elvis. He was a bodyguard for the Ambassador who was coming in as the head of the team of specialists.\n\nHaving aided the remnants of the Maian delegation, Joanna can turn to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed and manages to conceal herself on board the airplane. Once it is in the air, Trent and the cloaked Skedar make their move - but Joanna is there to stop him. She gets the President to a safety capsule while a team of Trent's men scour the aircraft for him, intent on dragging the hapless politician aboard the Skedar UFO, now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it. She calls on Elvis, who decides to crash into it. All three craft go down in the Alaskan wilderness, and the escape pod is launched.\n\nJo wakes up and tries to report in but finds her communications being jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis. She comes across teams of cloaked Skedar who are searching for her, the President, Elvis, and some of the President's belongings. She tracks one group back to the downed Skedar ship where she discovers a clone of the President. She destroys this and shuts down the jamming device, then calls in the cavalry. The Skedar have been thwarted again, the President is saved, and Trent is killed horribly by the Skedar for failing to be competent in the first place.\n\nThrowing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the crash site. Joanna goes out with Elvis to disrupt activity on board the ship and to find out what the big project is. After crippling the diving operations on the ship and recalling the submersible, they head down to the ocean floor, where they get their first sight of the sunken Cetan battle cruiser. Entering the ship through the portal the Skedar have made, they come across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. After fighting off the Skedar and avoiding the Cetans, Joanna and Elvis get to the core of the ship, where they find the AI that was once Dr. Caroll. Once his personality is restored, he urges Joanna and Elvis to leave the ship, which he intends to destroy for good.\n\nBack at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The surviving Skedar assault team vent their anger on the people responsible for their failure to recover the Cetan ship. Joanna runs around the Institute trying to escort CI employees to the hangars while the Skedar attack different parts of the building. While the majority of the employees escape, Joanna holds the Skedar off before getting knocked unconscious and captured by them.\n\nShe wakes up in a holding cell on board the Skedar assault ship with Cassandra De Vries for company. The dataDyne CEO dies while creating a distraction for Joanna to break out. Jo manages to get through to lower the docking bay shields, and Elvis brings a few friends in for a shooting party.\n\nThe captured ship enters orbit above the Skedar Battle Shrine, which gives Elvis a shock since the Maians could never find this Skedar 'holiest of holy' places. If the Shrine were destroyed, the Skedar morale would be dealt a fatal blow and there would be true peace instead of an uneasy ceasefire. Jo sets her sights on the leader of the Skedar, the high priest of the Battle Shrine, while Elvis returns to the assault ship to summon the Maian fleet.\n\nThe game finishes with the temple in ruins... Elvis calls for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by a Skedar that grabbed her foot before she could get clear. Elvis lends her a gun to help convince the Skedar to let go, and they depart for orbit.\n", + /*267*/ "dataDyne Corporation\n", + /*268*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*269*/ "Carrington Institute\n", + /*270*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*271*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*272*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*273*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*274*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Goggles cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*275*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*276*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*277*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*278*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*279*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*280*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*281*/ "FIRING\n Press Z Button to fire gun.\n", + /*282*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*283*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*284*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*285*/ "Use Control Stick to move aiming sight.\n", + /*286*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*287*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*288*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*289*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*290*/ "Carrington Institute\0|Main building and base of operations\n", + /*291*/ "Lucerne Tower\0|Global headquarters\n", + /*292*/ "Laboratory Basement\0|Underground research labs\n", + /*293*/ "Carrington Villa\0|Private coastal retreat\n", + /*294*/ "Chicago\0|Backstreets of the city\n", + /*295*/ "G5 Building\0|dataDyne front corporation\n", + /*296*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*297*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*298*/ "Air Force One\0|The President's airplane\n", + /*299*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*300*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*301*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*302*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*303*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*304*/ "Jumpship\0|Agile troop craft\n", + /*305*/ "HoverCrate\0|Gravity-negation device\n", + /*306*/ "HoverBike\0|Low altitude vehicle\n", + /*307*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*308*/ "Hovercopter\0|Urban AG gunship\n", + /*309*/ "G5 Robot\0|Urban combat droid\n", + /*310*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*311*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*312*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*313*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*314*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*315*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*316*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*317*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*318*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*319*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*320*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*321*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*322*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*323*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep- sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*324*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*325*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*326*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*327*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*328*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*329*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*330*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*331*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*332*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*333*/ "A robotic variant of the Hoverbike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*334*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*335*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*336*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*337*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*338*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*339*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*340*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*341*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*342*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*343*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*344*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*345*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*346*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*347*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*348*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*349*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*350*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*351*/ "Sidestepping and strafing can get you out of trouble.\n", + /*352*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*353*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*354*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*355*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*356*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*357*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*358*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*359*/ "The CamSpy can be difficult to control, so take your time.\n", + /*360*/ "Useful in combat, but can cause problems when overloading.\n", + /*361*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*362*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*363*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*364*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*365*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*366*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*367*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*368*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*369*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*370*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*371*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*372*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*373*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*374*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*375*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*376*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*377*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*378*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*379*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*380*/ "The Magsec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*381*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*382*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*383*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*384*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*385*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*386*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*387*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*388*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*389*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*390*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*391*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*392*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*393*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*394*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*395*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*396*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*397*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*398*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*399*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*400*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has past, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*401*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*402*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*403*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*404*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*405*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*406*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*407*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*408*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*409*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*410*/ "Holo 1 - Looking Around\n", + /*411*/ "Holo 2 - Movement 1\n", + /*412*/ "Holo 3 - Movement 2\n", + /*413*/ "Holo 4 - Unarmed Combat 1\n", + /*414*/ "Holo 5 - Unarmed Combat 2\n", + /*415*/ "Holo 6 - Live Combat 1\n", + /*416*/ "Holo 7 - Live Combat 2\n", + /*417*/ "GOAL TARGETS:", + /*418*/ "GOAL SCORE:", + /*419*/ "MIN ACCURACY:", + /*420*/ "FIRE TO START\n", + /*421*/ "GET READY!\n", + /*422*/ "LIMIT:", + /*423*/ "ZONE 3\n", + /*424*/ "ZONE 2\n", + /*425*/ "ZONE 1\n", + /*426*/ "BULL'S-EYE\n", + /*427*/ "EXPLODED\n", + /*428*/ "Elvis is dead.\n", + /*429*/ "Style 1", + /*430*/ "Style 2", + /*431*/ "Style 3", + /*432*/ "Style 4", + /*433*/ "Blonde", + /*434*/ "Black", + /*435*/ "Auburn", + /*436*/ "Blue Rinse", + /*437*/ "Player", + /*438*/ "", + /*439*/ "Identify\n", + /*440*/ "unused", + /*441*/ "Challenges\n", + /*442*/ "Load/Preset Games\n", + /*443*/ "Quick Start\n", + /*444*/ "Advanced Setup\n", + /*445*/ "Combat Simulator\n", + /*446*/ "Carrington Institute\n", + /*447*/ "Team Score\n", + /*448*/ "Finished Setup\n", + /*449*/ "Player 1 Team\n", + /*450*/ "Player 2 Team\n", + /*451*/ "Player 3 Team\n", + /*452*/ "Player 4 Team\n", + /*453*/ "Number Of Simulants\n", + /*454*/ "Simulants Per Team\n", + /*455*/ "Simulant Difficulty\n", + /*456*/ "Start Game\n", + /*457*/ "Drop Out\n", + /*458*/ "Player Settings\n", + /*459*/ "Game Settings\n", + /*460*/ "Quick Go\n", + /*461*/ "Ready!\n", + /*462*/ "Quick Team\n", + /*463*/ "Players Only\n", + /*464*/ "Players and Simulants\n", + /*465*/ "Player Teams\n", + /*466*/ "Players vs. Simulants\n", + /*467*/ "Player-Simulant Teams\n", + /*468*/ "DRUGSPY", + /*469*/ "BOMBSPY", + /*470*/ "Replay Previous Mission\n", + /*471*/ "Holograph\n", + /*472*/ "Aggressive\n", + /*473*/ "Passive\n", + /*474*/ "Perfect Buddies\n", + /*475*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mp10E.c b/src/files/lang/ntsc-final/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10J.c b/src/files/lang/ntsc-final/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10P.c b/src/files/lang/ntsc-final/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_f.c b/src/files/lang/ntsc-final/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_g.c b/src/files/lang/ntsc-final/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_i.c b/src/files/lang/ntsc-final/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp10_str_s.c b/src/files/lang/ntsc-final/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11E.c b/src/files/lang/ntsc-final/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11J.c b/src/files/lang/ntsc-final/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11P.c b/src/files/lang/ntsc-final/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_f.c b/src/files/lang/ntsc-final/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_g.c b/src/files/lang/ntsc-final/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_i.c b/src/files/lang/ntsc-final/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp11_str_s.c b/src/files/lang/ntsc-final/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12E.c b/src/files/lang/ntsc-final/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12J.c b/src/files/lang/ntsc-final/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12P.c b/src/files/lang/ntsc-final/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_f.c b/src/files/lang/ntsc-final/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_g.c b/src/files/lang/ntsc-final/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_i.c b/src/files/lang/ntsc-final/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp12_str_s.c b/src/files/lang/ntsc-final/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13E.c b/src/files/lang/ntsc-final/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13J.c b/src/files/lang/ntsc-final/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13P.c b/src/files/lang/ntsc-final/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_f.c b/src/files/lang/ntsc-final/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_g.c b/src/files/lang/ntsc-final/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_i.c b/src/files/lang/ntsc-final/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp13_str_s.c b/src/files/lang/ntsc-final/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14E.c b/src/files/lang/ntsc-final/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14J.c b/src/files/lang/ntsc-final/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14P.c b/src/files/lang/ntsc-final/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_f.c b/src/files/lang/ntsc-final/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_g.c b/src/files/lang/ntsc-final/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_i.c b/src/files/lang/ntsc-final/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp14_str_s.c b/src/files/lang/ntsc-final/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15E.c b/src/files/lang/ntsc-final/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15J.c b/src/files/lang/ntsc-final/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15P.c b/src/files/lang/ntsc-final/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_f.c b/src/files/lang/ntsc-final/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_g.c b/src/files/lang/ntsc-final/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_i.c b/src/files/lang/ntsc-final/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp15_str_s.c b/src/files/lang/ntsc-final/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16E.c b/src/files/lang/ntsc-final/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16J.c b/src/files/lang/ntsc-final/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16P.c b/src/files/lang/ntsc-final/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_f.c b/src/files/lang/ntsc-final/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_g.c b/src/files/lang/ntsc-final/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_i.c b/src/files/lang/ntsc-final/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp16_str_s.c b/src/files/lang/ntsc-final/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17E.c b/src/files/lang/ntsc-final/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17J.c b/src/files/lang/ntsc-final/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17P.c b/src/files/lang/ntsc-final/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_f.c b/src/files/lang/ntsc-final/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_g.c b/src/files/lang/ntsc-final/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_i.c b/src/files/lang/ntsc-final/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp17_str_s.c b/src/files/lang/ntsc-final/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18E.c b/src/files/lang/ntsc-final/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18J.c b/src/files/lang/ntsc-final/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18P.c b/src/files/lang/ntsc-final/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_f.c b/src/files/lang/ntsc-final/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_g.c b/src/files/lang/ntsc-final/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_i.c b/src/files/lang/ntsc-final/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp18_str_s.c b/src/files/lang/ntsc-final/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19E.c b/src/files/lang/ntsc-final/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19J.c b/src/files/lang/ntsc-final/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19P.c b/src/files/lang/ntsc-final/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_f.c b/src/files/lang/ntsc-final/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_g.c b/src/files/lang/ntsc-final/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_i.c b/src/files/lang/ntsc-final/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp19_str_s.c b/src/files/lang/ntsc-final/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1E.c b/src/files/lang/ntsc-final/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1J.c b/src/files/lang/ntsc-final/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1P.c b/src/files/lang/ntsc-final/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_f.c b/src/files/lang/ntsc-final/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_g.c b/src/files/lang/ntsc-final/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_i.c b/src/files/lang/ntsc-final/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp1_str_s.c b/src/files/lang/ntsc-final/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20E.c b/src/files/lang/ntsc-final/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20J.c b/src/files/lang/ntsc-final/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20P.c b/src/files/lang/ntsc-final/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_f.c b/src/files/lang/ntsc-final/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_g.c b/src/files/lang/ntsc-final/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_i.c b/src/files/lang/ntsc-final/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp20_str_s.c b/src/files/lang/ntsc-final/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2E.c b/src/files/lang/ntsc-final/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2J.c b/src/files/lang/ntsc-final/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2P.c b/src/files/lang/ntsc-final/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_f.c b/src/files/lang/ntsc-final/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_g.c b/src/files/lang/ntsc-final/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_i.c b/src/files/lang/ntsc-final/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp2_str_s.c b/src/files/lang/ntsc-final/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3E.c b/src/files/lang/ntsc-final/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3J.c b/src/files/lang/ntsc-final/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3P.c b/src/files/lang/ntsc-final/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_f.c b/src/files/lang/ntsc-final/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_g.c b/src/files/lang/ntsc-final/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_i.c b/src/files/lang/ntsc-final/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp3_str_s.c b/src/files/lang/ntsc-final/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4E.c b/src/files/lang/ntsc-final/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4J.c b/src/files/lang/ntsc-final/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4P.c b/src/files/lang/ntsc-final/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_f.c b/src/files/lang/ntsc-final/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_g.c b/src/files/lang/ntsc-final/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_i.c b/src/files/lang/ntsc-final/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp4_str_s.c b/src/files/lang/ntsc-final/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5E.c b/src/files/lang/ntsc-final/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5J.c b/src/files/lang/ntsc-final/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5P.c b/src/files/lang/ntsc-final/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_f.c b/src/files/lang/ntsc-final/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_g.c b/src/files/lang/ntsc-final/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_i.c b/src/files/lang/ntsc-final/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp5_str_s.c b/src/files/lang/ntsc-final/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6E.c b/src/files/lang/ntsc-final/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6J.c b/src/files/lang/ntsc-final/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6P.c b/src/files/lang/ntsc-final/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_f.c b/src/files/lang/ntsc-final/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_g.c b/src/files/lang/ntsc-final/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_i.c b/src/files/lang/ntsc-final/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp6_str_s.c b/src/files/lang/ntsc-final/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7E.c b/src/files/lang/ntsc-final/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7J.c b/src/files/lang/ntsc-final/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7P.c b/src/files/lang/ntsc-final/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_f.c b/src/files/lang/ntsc-final/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_g.c b/src/files/lang/ntsc-final/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_i.c b/src/files/lang/ntsc-final/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp7_str_s.c b/src/files/lang/ntsc-final/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8E.c b/src/files/lang/ntsc-final/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8J.c b/src/files/lang/ntsc-final/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8P.c b/src/files/lang/ntsc-final/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_f.c b/src/files/lang/ntsc-final/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_g.c b/src/files/lang/ntsc-final/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_i.c b/src/files/lang/ntsc-final/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp8_str_s.c b/src/files/lang/ntsc-final/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9E.c b/src/files/lang/ntsc-final/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9J.c b/src/files/lang/ntsc-final/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9P.c b/src/files/lang/ntsc-final/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_f.c b/src/files/lang/ntsc-final/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_g.c b/src/files/lang/ntsc-final/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_i.c b/src/files/lang/ntsc-final/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mp9_str_s.c b/src/files/lang/ntsc-final/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/mpmenuE.c b/src/files/lang/ntsc-final/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenuJ.c b/src/files/lang/ntsc-final/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpmenuP.c b/src/files/lang/ntsc-final/mpmenuP.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_f.c b/src/files/lang/ntsc-final/mpmenu_str_f.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_g.c b/src/files/lang/ntsc-final/mpmenu_str_g.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_i.c b/src/files/lang/ntsc-final/mpmenu_str_i.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpmenu_str_s.c b/src/files/lang/ntsc-final/mpmenu_str_s.c new file mode 100644 index 000000000..9ab8db52f --- /dev/null +++ b/src/files/lang/ntsc-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/ntsc-final/mpweaponsE.c b/src/files/lang/ntsc-final/mpweaponsE.c new file mode 100644 index 000000000..df325961a --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsE.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe Controller Pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker/Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "SuperDragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Controller 1:", + /*212*/ "Controller 2:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ "Controller Pak Not Found\n", + /*230*/ "Name:\n", + /*231*/ "Location:\n", + /*232*/ "Duplicate File Name\n", + /*233*/ "already contains\n", + /*234*/ "a file named\n", + /*235*/ "Rename File\n", + /*236*/ "Change Location\n", + /*237*/ "Cancel\n", + /*238*/ "Change File Name\n", + /*239*/ "Enter new file name:\n", + /*240*/ "The file you are copying\ncannot be deleted.\n", + /*241*/ "ShockSim:%d\n", + /*242*/ "Target Time:\n", + /*243*/ "New Cheat Available!:\n", + /*244*/ "Continue\n", + /*245*/ "Replay Last Level\n", + /*246*/ "Save Player\n", + /*247*/ "Save new player\nand statistics?\n", + /*248*/ "Save Now\n", + /*249*/ "No Thanks!\n", + /*250*/ "Confirm player name:\n", + /*251*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*252*/ "Continue\n", + /*253*/ "Error\n", + /*254*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*255*/ "Cancel\n", + /*256*/ "Error\n", + /*257*/ "The saved data has\n", + /*258*/ "been erased due to\n", + /*259*/ "corruption or damage.\n", + /*260*/ "Cancel\n", + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweaponsJ.c b/src/files/lang/ntsc-final/mpweaponsJ.c new file mode 100644 index 000000000..40b123186 --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsJ.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Capture the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Flag\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweaponsP.c b/src/files/lang/ntsc-final/mpweaponsP.c new file mode 100644 index 000000000..8aea3231c --- /dev/null +++ b/src/files/lang/ntsc-final/mpweaponsP.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak\n", + /* 65*/ "is damaged or\n", + /* 66*/ "inserted incorrectly.\n", + /* 67*/ "Attempt Repair\n", + /* 68*/ "Retry\n", + /* 69*/ "Continue without using\nthe Controller Pak\n", + /* 70*/ "Full Controller Pak\n", + /* 71*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 72*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker/Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "SuperDragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP9i\n", + /*110*/ "CC13\n", + /*111*/ "KL01313\n", + /*112*/ "KF7 Special\n", + /*113*/ "ZZT (9mm)\n", + /*114*/ "DMC\n", + /*115*/ "AR53\n", + /*116*/ "RC-P45\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*184*/ "Player Handicaps\n", + /*185*/ "L/R BUTTONS: ", + /*186*/ "UP C BUTTON: ", + /*187*/ "LEFT/RIGHT C BUTTONS: ", + /*188*/ "DOWN C BUTTON: ", + /*189*/ "A BUTTON: ", + /*190*/ "B BUTTON: ", + /*191*/ "CONTROL STICK: ", + /*192*/ "Z BUTTON: ", + /*193*/ "+ CONTROL PAD: ", + /*194*/ "AIM", + /*195*/ "AIM TOGGLE", + /*196*/ "LOOK UP", + /*197*/ "LOOK DOWN", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK UP", + /*200*/ "FORWARDS", + /*201*/ "BACKWARDS", + /*202*/ "STRAFE", + /*203*/ "WEAPON", + /*204*/ "ACTION/RELOAD", + /*205*/ "FIRE", + /*206*/ "WALK/TURN", + /*207*/ "LOOK", + /*208*/ "WALK/STRAFE", + /*209*/ "LOOK/STRAFE", + /*210*/ "AS C BUTTONS", + /*211*/ "Left Hand:", + /*212*/ "Right Hand:", + /*213*/ "Control Style %s %s\n", + /*214*/ "(One-Handed)", + /*215*/ "(Two-Handed)", + /*216*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*217*/ "Turn off all Cheats\n", + /*218*/ "Language Filter\n", + /*219*/ "USERNAME:\n", + /*220*/ "PASSWORD:\n", + /*221*/ "Perfect Dark\n", + /*222*/ "Choose Settings:\n", + /*223*/ "Enemy Reaction Speed:\n", + /*224*/ "Enemy Health:\n", + /*225*/ "Enemy Damage:\n", + /*226*/ "Enemy Accuracy:\n", + /*227*/ "OK\n", + /*228*/ "Cancel\n", + /*229*/ "Controller Pak Not Found\n", + /*230*/ "Name:\n", + /*231*/ "Location:\n", + /*232*/ "Duplicate File Name\n", + /*233*/ "already contains\n", + /*234*/ "a file named\n", + /*235*/ "Rename File\n", + /*236*/ "Change Location\n", + /*237*/ "Cancel\n", + /*238*/ "Change File Name\n", + /*239*/ "Enter new file name:\n", + /*240*/ "The file you are copying\ncannot be deleted.\n", + /*241*/ "ShockSim:%d\n", + /*242*/ "Target Time:\n", + /*243*/ "New Cheat Available!:\n", + /*244*/ "Continue\n", + /*245*/ "Replay Last Level\n", + /*246*/ "Save Player\n", + /*247*/ "Save new player\nand statistics?\n", + /*248*/ "Save Now\n", + /*249*/ "No Thanks!\n", + /*250*/ "Confirm player name:\n", + /*251*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*252*/ "Continue\n", + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_f.c b/src/files/lang/ntsc-final/mpweapons_str_f.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_f.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_g.c b/src/files/lang/ntsc-final/mpweapons_str_g.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_g.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_i.c b/src/files/lang/ntsc-final/mpweapons_str_i.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_i.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/mpweapons_str_s.c b/src/files/lang/ntsc-final/mpweapons_str_s.c new file mode 100644 index 000000000..4f7dece4e --- /dev/null +++ b/src/files/lang/ntsc-final/mpweapons_str_s.c @@ -0,0 +1,268 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\n%s", + /* 1*/ "%shas the %s%s", + /* 2*/ "%shas our\n%s", + /* 3*/ "Got the %s%s", + /* 4*/ "You captured\nthe %s%s", + /* 5*/ "%scaptured our\n%s", + /* 6*/ "%scaptured\nthe %s%s", + /* 7*/ "Have a point for living!\n", + /* 8*/ "You're supposed to look\n", + /* 9*/ "after your friends!\n", + /* 10*/ "Well done!\n", + /* 11*/ "You popped a cap!\n", + /* 12*/ "Have 2 Points...\n", + /* 13*/ "You are the victim!\n", + /* 14*/ "Protect %s!\n", + /* 15*/ "Get %s!\n", + /* 16*/ "Download successful.\n", + /* 17*/ "Connection broken.\n", + /* 18*/ "Starting download.\n", + /* 19*/ "You need to use the Data Uplink.\n", + /* 20*/ "King of\nthe Hill!\n", + /* 21*/ "We have\nthe Hill!\n", + /* 22*/ "%shas captured\nthe Hill!\n", + /* 23*/ "%ds/Point\n", + /* 24*/ "1 Point!\n", + /* 25*/ "No Shield\n", + /* 26*/ "Automatics\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Simulants\n", + /* 29*/ "King of the Hill\n", + /* 30*/ "Complex FarSight\n", + /* 31*/ "Hold the Briefcase\n", + /* 32*/ "Pistol One-Hit Kills\n", + /* 33*/ "Capture the Case\n", + /* 34*/ "Cloaking\n", + /* 35*/ "Temple Explosives\n", + /* 36*/ "Slayer\n", + /* 37*/ "Tranquilizer\n", + /* 38*/ "Slow Motion\n", + /* 39*/ "Press START\n", + /* 40*/ "Paused\n", + /* 41*/ "Custom\n", + /* 42*/ "Random\n", + /* 43*/ "Random Five\n", + /* 44*/ "Close Combat\n", + /* 45*/ "Proximity Mine\n", + /* 46*/ "Rocket Launcher\n", + /* 47*/ "Grenade Launcher\n", + /* 48*/ "Explosive\n", + /* 49*/ "Golden Magnum\n", + /* 50*/ "Heavy\n", + /* 51*/ "Tranquilizer\n", + /* 52*/ "FarSight\n", + /* 53*/ "Power\n", + /* 54*/ "Automatics\n", + /* 55*/ "Pistols\n", + /* 56*/ "Test\n", + /* 57*/ "4mb Test\n", + /* 58*/ "Nothing\n", + /* 59*/ "Shield\n", + /* 60*/ "Disabled\n", + /* 61*/ "Objectives Complete\n", + /* 62*/ "Unknown\n", + /* 63*/ "Missing\n", + /* 64*/ "Damaged Controller Pak Inserted\n", + /* 65*/ "is damaged or inserted\n", + /* 66*/ "incorrectly.\n", + /* 67*/ "Please remove and try again.\n", + /* 68*/ "Full Controller Pak Inserted\n", + /* 69*/ "is too full to save files.\n", + /* 70*/ "Use the Game Notes Editor to\n", + /* 71*/ "free some space (hold START\n", + /* 72*/ "while powering up.)\n", + /* 73*/ "OK\n", + /* 74*/ "----------\n", + /* 75*/ "Hurricane Fists\n", + /* 76*/ "Cloaking Device\n", + /* 77*/ "Invincible\n", + /* 78*/ "All Guns in Solo\n", + /* 79*/ "Unlimited Ammo\n", + /* 80*/ "Unlimited Ammo, No Reloads\n", + /* 81*/ "Slo-mo Single Player\n", + /* 82*/ "DK Mode\n", + /* 83*/ "Trent's Magnum\n", + /* 84*/ "FarSight\n", + /* 85*/ "Small Jo\n", + /* 86*/ "Small Characters\n", + /* 87*/ "Enemy Shields\n", + /* 88*/ "Jo Shield\n", + /* 89*/ "Super Shield\n", + /* 90*/ "Classic Sight\n", + /* 91*/ "Team Heads Only\n", + /* 92*/ "Play as Elvis\n", + /* 93*/ "Enemy Rockets\n", + /* 94*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 95*/ "Marquis of Queensbury Rules\n", + /* 96*/ "Perfect Darkness\n", + /* 97*/ "Pugilist\n", + /* 98*/ "Hotshot\n", + /* 99*/ "Hit and Run\n", + /*100*/ "Alien\n", + /*101*/ "R-Tracker / Weapon Cache Locations\n", + /*102*/ "Rocket Launcher\n", + /*103*/ "Sniper Rifle\n", + /*104*/ "X-Ray Scanner\n", + /*105*/ "Superdragon\n", + /*106*/ "Laptop Gun\n", + /*107*/ "Phoenix\n", + /*108*/ "Psychosis Gun\n", + /*109*/ "PP7\n", + /*110*/ "DD44\n", + /*111*/ "Klobb\n", + /*112*/ "KF7 Soviet\n", + /*113*/ "ZMG (9mm)\n", + /*114*/ "D5K\n", + /*115*/ "AR33\n", + /*116*/ "RC-P90\n", + /*117*/ "Velvet Dark\n", + /*118*/ "Fun\n", + /*119*/ "Gameplay\n", + /*120*/ "Weapons\n", + /*121*/ "Buddies\n", + /*122*/ "Weapons for Jo in Solo\n", + /*123*/ "Classic Weapons for Jo in Solo\n", + /*124*/ "dataDyne Defection", + /*125*/ "dataDyne Extraction", + /*126*/ "A51 Infiltration", + /*127*/ "A51 Rescue", + /*128*/ "A51 Escape", + /*129*/ "Difficulty:\n", + /*130*/ "Cheat Solo Missions\n", + /*131*/ "Cheat Combat Simulator\n", + /*132*/ "Cheat Co-Operative\n", + /*133*/ "Cheat Counter-Operative\n", + /*134*/ "Dishonored\n", + /*135*/ "Cheated\n", + /*136*/ "Cheat available", + /*137*/ "Complete", + /*138*/ "for cheat:", + /*139*/ "on", + /*140*/ "in under", + /*141*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*142*/ "Select cheat for information\n", + /*143*/ "Buddy Available", + /*144*/ "Win Golds on the firing range to enable classic guns.\n", + /*145*/ "Sight on Screen\n", + /*146*/ "Target\n", + /*147*/ "Zoom Range\n", + /*148*/ "Show Ammo\n", + /*149*/ "Gun Function\n", + /*150*/ "Paintball\n", + /*151*/ "Subtitles\n", + /*152*/ "Mission Time\n", + /*153*/ "Mode\n", + /*154*/ "Split\n", + /*155*/ "Do you want to abort\nthe mission?\n", + /*156*/ "Joanna Leather\n", + /*157*/ "Joanna Negotiator\n", + /*158*/ "Elvis (Waistcoat)\n", + /*159*/ "Error\n", + /*160*/ "Cannot delete file as\nit is being used.\n", + /*161*/ "Cancel\n", + /*162*/ "Time Limit:\n", + /*163*/ "Score Limit:\n", + /*164*/ "Team Score Limit:\n", + /*165*/ "Challenge Completed!\n", + /*166*/ "Challenge Failed!\n", + /*167*/ "Challenge Cheated!\n", + /*168*/ "Cutscene Subtitles\n", + /*169*/ "In-Game Subtitles\n", + /*170*/ "Alternative Title Screen\n", + /*171*/ "Start Challenge\n", + /*172*/ "dataDyne Investigation", + /*173*/ "Error\n", + /*174*/ "The Controller Pak\nhas been removed.\n", + /*175*/ "Attempt Repair\n", + /*176*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*177*/ "Data may be lost!\n", + /*178*/ "Cancel\n", + /*179*/ "Repair\n", + /*180*/ "Repair Successful\n", + /*181*/ "The Controller Pak has\nbeen repaired.\n", + /*182*/ "Repair Failed\n", + /*183*/ "The Controller Pak could\nnot be repaired.\n", + /*184*/ "L/R: ", + /*185*/ "C-UP: ", + /*186*/ "C-L/R: ", + /*187*/ "C-DOWN: ", + /*188*/ "A: ", + /*189*/ "B: ", + /*190*/ "STICK: ", + /*191*/ "Z: ", + /*192*/ "D-PAD: ", + /*193*/ "AIM TOGGLE", + /*194*/ "LOOK UP / GET UP", + /*195*/ "STRAFE", + /*196*/ "LOOK DOWN / CROUCH", + /*197*/ "CHANGE GUN / ACTIVEMENU", + /*198*/ "RELOAD / ACTION / SECONDARY FIRE", + /*199*/ "WALK AND TURN", + /*200*/ "FIRE", + /*201*/ "AS C-BUTTONS", + /*202*/ "Turn off all Cheats\n", + /*203*/ NULL, + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/oatE.c b/src/files/lang/ntsc-final/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oatJ.c b/src/files/lang/ntsc-final/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oatP.c b/src/files/lang/ntsc-final/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_f.c b/src/files/lang/ntsc-final/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_g.c b/src/files/lang/ntsc-final/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_i.c b/src/files/lang/ntsc-final/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oat_str_s.c b/src/files/lang/ntsc-final/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldE.c b/src/files/lang/ntsc-final/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldJ.c b/src/files/lang/ntsc-final/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/oldP.c b/src/files/lang/ntsc-final/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_f.c b/src/files/lang/ntsc-final/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_g.c b/src/files/lang/ntsc-final/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_i.c b/src/files/lang/ntsc-final/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/old_str_s.c b/src/files/lang/ntsc-final/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/optionsE.c b/src/files/lang/ntsc-final/optionsE.c new file mode 100644 index 000000000..34c785342 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/optionsJ.c b/src/files/lang/ntsc-final/optionsJ.c new file mode 100644 index 000000000..9766367e0 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "Choose Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/optionsP.c b/src/files/lang/ntsc-final/optionsP.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_f.c b/src/files/lang/ntsc-final/options_str_f.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_g.c b/src/files/lang/ntsc-final/options_str_g.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_i.c b/src/files/lang/ntsc-final/options_str_i.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/options_str_s.c b/src/files/lang/ntsc-final/options_str_s.c new file mode 100644 index 000000000..80ff8f715 --- /dev/null +++ b/src/files/lang/ntsc-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.3 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Files\n", + /*104*/ "MultiPlayer Game Files\n", + /*105*/ "MultiPlayer Player Files\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Game Notes Editor\n", + /*108*/ "Use this editor to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1\n", + /*240*/ "1.2\n", + /*241*/ "1.3\n", + /*242*/ "1.4\n", + /*243*/ "2.1\n", + /*244*/ "2.2\n", + /*245*/ "2.3\n", + /*246*/ "2.4\n", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak was not found.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "Controller Pak has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the\nController Pak\ncontaining your file.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press the B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press the B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark save already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark saves.\n", + /*400*/ "Perfect Dark requires space\nfor %d more notes.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1\n", + /*439*/ "Mission 2\n", + /*440*/ "Mission 3\n", + /*441*/ "Mission 4\n", + /*442*/ "Mission 5\n", + /*443*/ "Mission 6\n", + /*444*/ "Mission 7\n", + /*445*/ "Mission 8\n", + /*446*/ "Mission 9\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro\n", + /*451*/ "1:1 Outro\n", + /*452*/ "1:2 Intro\n", + /*453*/ "1:2 Outro\n", + /*454*/ "1:3 Intro\n", + /*455*/ "1:3 Outro\n", + /*456*/ "2:1 Intro\n", + /*457*/ "2:1 Intro 2\n", + /*458*/ "2:1 Outro\n", + /*459*/ "3:1 Intro\n", + /*460*/ "3:1 Outro\n", + /*461*/ "3:2 Intro\n", + /*462*/ "3:2 Special\n", + /*463*/ "3:2 Outro\n", + /*464*/ "4:1 Intro\n", + /*465*/ "4:1 Outro\n", + /*466*/ "4:2 Intro\n", + /*467*/ "4:2 Outro\n", + /*468*/ "4:3 Intro\n", + /*469*/ "4:3 Special\n", + /*470*/ "4:3 Outro\n", + /*471*/ "5:1 Intro\n", + /*472*/ "5:1 Outro\n", + /*473*/ "5:2 Intro\n", + /*474*/ "5:2 Special\n", + /*475*/ "5:2 Outro\n", + /*476*/ "5:3 Intro\n", + /*477*/ "5:3 Outro\n", + /*478*/ "6:1 Intro\n", + /*479*/ "6:1 Outro\n", + /*480*/ "6:2 Intro\n", + /*481*/ "6:2 Special\n", + /*482*/ "6:2 Outro\n", + /*483*/ "7:1 Intro\n", + /*484*/ "7:1 Outro\n", + /*485*/ "8:1 Intro\n", + /*486*/ "8:1 Outro\n", + /*487*/ "9:1 Intro\n", + /*488*/ "9:1 Outro\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamE.c b/src/files/lang/ntsc-final/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/ntsc-final/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamJ.c b/src/files/lang/ntsc-final/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/ntsc-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pamP.c b/src/files/lang/ntsc-final/pamP.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_f.c b/src/files/lang/ntsc-final/pam_str_f.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_g.c b/src/files/lang/ntsc-final/pam_str_g.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_i.c b/src/files/lang/ntsc-final/pam_str_i.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pam_str_s.c b/src/files/lang/ntsc-final/pam_str_s.c new file mode 100644 index 000000000..fcfb4a139 --- /dev/null +++ b/src/files/lang/ntsc-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar\noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc...***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it; those vandals have been rearranging my circuitry. I feel cheapened...used! I'm a tart!\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna: there is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteE.c b/src/files/lang/ntsc-final/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/ntsc-final/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteJ.c b/src/files/lang/ntsc-final/peteJ.c new file mode 100644 index 000000000..088c12b76 --- /dev/null +++ b/src/files/lang/ntsc-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/peteP.c b/src/files/lang/ntsc-final/peteP.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_f.c b/src/files/lang/ntsc-final/pete_str_f.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_g.c b/src/files/lang/ntsc-final/pete_str_g.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_i.c b/src/files/lang/ntsc-final/pete_str_i.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/pete_str_s.c b/src/files/lang/ntsc-final/pete_str_s.c new file mode 100644 index 000000000..2745a7e8c --- /dev/null +++ b/src/files/lang/ntsc-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer bug placed correctly.\n", + /* 24*/ "Tracer bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will\ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/propobjE.c b/src/files/lang/ntsc-final/propobjE.c new file mode 100644 index 000000000..9977a50df --- /dev/null +++ b/src/files/lang/ntsc-final/propobjE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "N-Bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "Your ", +}; diff --git a/src/files/lang/ntsc-final/propobjJ.c b/src/files/lang/ntsc-final/propobjJ.c new file mode 100644 index 000000000..e2c9a5da7 --- /dev/null +++ b/src/files/lang/ntsc-final/propobjJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "hand grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "drugs", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "speed pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobjP.c b/src/files/lang/ntsc-final/propobjP.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobjP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_f.c b/src/files/lang/ntsc-final/propobj_str_f.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_g.c b/src/files/lang/ntsc-final/propobj_str_g.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_i.c b/src/files/lang/ntsc-final/propobj_str_i.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/propobj_str_s.c b/src/files/lang/ntsc-final/propobj_str_s.c new file mode 100644 index 000000000..d251597ff --- /dev/null +++ b/src/files/lang/ntsc-final/propobj_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "some ", + /* 3*/ "Some ", + /* 4*/ "a ", + /* 5*/ "A ", + /* 6*/ "an ", + /* 7*/ "An ", + /* 8*/ "the ", + /* 9*/ "The ", + /* 10*/ "ammo", + /* 11*/ "cartridge", + /* 12*/ "magnum bullet", + /* 13*/ "golden bullet", + /* 14*/ "grenade", + /* 15*/ "grenade round", + /* 16*/ "rocket", + /* 17*/ "homing rocket", + /* 18*/ "remote mine", + /* 19*/ "proximity mine", + /* 20*/ "timed mine", + /* 21*/ "combat ", + /* 22*/ "knife", + /* 23*/ "knives", + /* 24*/ "s", + /* 25*/ "dart", + /* 26*/ "n-bomb", + /* 27*/ "sedatives", + /* 28*/ "explosive pen", + /* 29*/ "explosive case", + /* 30*/ "flare", + /* 31*/ "piton", + /* 32*/ "of dynamite", + /* 33*/ "stick ", + /* 34*/ "sticks ", + /* 35*/ "bug", + /* 36*/ "micro camera", + /* 37*/ "GoldenEye key", + /* 38*/ "token", + /* 39*/ "plastique", + /* 40*/ "Picked up a key.\n", + /* 41*/ "Picked up a shield.\n", + /* 42*/ "A shield.\n", + /* 43*/ "Picked up something.\n", + /* 44*/ "This door is locked.\n", + /* 45*/ "bolt", + /* 46*/ "orb", + /* 47*/ "Reaper ammo", + /* 48*/ "cloaking device", + /* 49*/ "boost pill", + /* 50*/ "your ", + /* 51*/ "YOUR ", +}; diff --git a/src/files/lang/ntsc-final/refE.c b/src/files/lang/ntsc-final/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/refJ.c b/src/files/lang/ntsc-final/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/refP.c b/src/files/lang/ntsc-final/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_f.c b/src/files/lang/ntsc-final/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_g.c b/src/files/lang/ntsc-final/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_i.c b/src/files/lang/ntsc-final/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ref_str_s.c b/src/files/lang/ntsc-final/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/ritE.c b/src/files/lang/ntsc-final/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/ntsc-final/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ritJ.c b/src/files/lang/ntsc-final/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/ntsc-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/ritP.c b/src/files/lang/ntsc-final/ritP.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_f.c b/src/files/lang/ntsc-final/rit_str_f.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_g.c b/src/files/lang/ntsc-final/rit_str_g.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_i.c b/src/files/lang/ntsc-final/rit_str_i.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/rit_str_s.c b/src/files/lang/ntsc-final/rit_str_s.c new file mode 100644 index 000000000..f9ec87abc --- /dev/null +++ b/src/files/lang/ntsc-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatPresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment destroyed.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands.\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stablised Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/runE.c b/src/files/lang/ntsc-final/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/runJ.c b/src/files/lang/ntsc-final/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/runP.c b/src/files/lang/ntsc-final/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_f.c b/src/files/lang/ntsc-final/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_g.c b/src/files/lang/ntsc-final/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_i.c b/src/files/lang/ntsc-final/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/run_str_s.c b/src/files/lang/ntsc-final/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevE.c b/src/files/lang/ntsc-final/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/ntsc-final/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevJ.c b/src/files/lang/ntsc-final/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/ntsc-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevP.c b/src/files/lang/ntsc-final/sevP.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_f.c b/src/files/lang/ntsc-final/sev_str_f.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_g.c b/src/files/lang/ntsc-final/sev_str_g.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_i.c b/src/files/lang/ntsc-final/sev_str_i.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sev_str_s.c b/src/files/lang/ntsc-final/sev_str_s.c new file mode 100644 index 000000000..76874af6a --- /dev/null +++ b/src/files/lang/ntsc-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n", + /* 1*/ "|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\nAREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbE.c b/src/files/lang/ntsc-final/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbJ.c b/src/files/lang/ntsc-final/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevbP.c b/src/files/lang/ntsc-final/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_f.c b/src/files/lang/ntsc-final/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_g.c b/src/files/lang/ntsc-final/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_i.c b/src/files/lang/ntsc-final/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevb_str_s.c b/src/files/lang/ntsc-final/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/ntsc-final/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sevxE.c b/src/files/lang/ntsc-final/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxJ.c b/src/files/lang/ntsc-final/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxP.c b/src/files/lang/ntsc-final/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_f.c b/src/files/lang/ntsc-final/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_g.c b/src/files/lang/ntsc-final/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_i.c b/src/files/lang/ntsc-final/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevx_str_s.c b/src/files/lang/ntsc-final/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbE.c b/src/files/lang/ntsc-final/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbJ.c b/src/files/lang/ntsc-final/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxbP.c b/src/files/lang/ntsc-final/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_f.c b/src/files/lang/ntsc-final/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_g.c b/src/files/lang/ntsc-final/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_i.c b/src/files/lang/ntsc-final/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/sevxb_str_s.c b/src/files/lang/ntsc-final/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/shoE.c b/src/files/lang/ntsc-final/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/ntsc-final/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/shoJ.c b/src/files/lang/ntsc-final/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/ntsc-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/shoP.c b/src/files/lang/ntsc-final/shoP.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_f.c b/src/files/lang/ntsc-final/sho_str_f.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_g.c b/src/files/lang/ntsc-final/sho_str_g.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_i.c b/src/files/lang/ntsc-final/sho_str_i.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/sho_str_s.c b/src/files/lang/ntsc-final/sho_str_s.c new file mode 100644 index 000000000..ab1e9b8d6 --- /dev/null +++ b/src/files/lang/ntsc-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Sight.\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area.\nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?\n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me a gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/siloE.c b/src/files/lang/ntsc-final/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/siloJ.c b/src/files/lang/ntsc-final/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/siloP.c b/src/files/lang/ntsc-final/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_f.c b/src/files/lang/ntsc-final/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_g.c b/src/files/lang/ntsc-final/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_i.c b/src/files/lang/ntsc-final/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/silo_str_s.c b/src/files/lang/ntsc-final/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/statE.c b/src/files/lang/ntsc-final/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/statJ.c b/src/files/lang/ntsc-final/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/ntsc-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/statP.c b/src/files/lang/ntsc-final/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_f.c b/src/files/lang/ntsc-final/stat_str_f.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_g.c b/src/files/lang/ntsc-final/stat_str_g.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_i.c b/src/files/lang/ntsc-final/stat_str_i.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/stat_str_s.c b/src/files/lang/ntsc-final/stat_str_s.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/ntsc-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleE.c b/src/files/lang/ntsc-final/titleE.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/ntsc-final/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleJ.c b/src/files/lang/ntsc-final/titleJ.c new file mode 100644 index 000000000..f1ac89ef0 --- /dev/null +++ b/src/files/lang/ntsc-final/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j. northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons animator\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "(is watching)\n", + /* 17*/ "b jones\n", + /* 18*/ "(unknown purpose)\n", + /* 19*/ "steve malpass\n", + /* 20*/ "edge wrangler\n", + /* 21*/ "brian marshall\n", + /* 22*/ "code janitor\n", + /* 23*/ "russell irwin\n", + /* 24*/ "pak man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "pad jockey\n", + /* 27*/ "ross bury\n", + /* 28*/ "pixel pusher\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonsz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "background artist\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "development tools\n", + /* 59*/ "richard gale\n", + /* 60*/ "mark green\n", + /* 61*/ "mark wilson\n", + /* 62*/ "hardware support\n", + /* 63*/ "pete cox\n", + /* 64*/ "paul mikell\n", + /* 65*/ "doug crouch\n", + /* 66*/ "thanks\n", + /* 67*/ "neil gallagher\n", + /* 68*/ "jonathon o'conner\n", + /* 69*/ "gareth glover\n", + /* 70*/ "motion capture\n", + /* 71*/ "alan tipper\n", + /* 72*/ "des easen\n", + /* 73*/ "jim ballard\n", + /* 74*/ "michelle tipper\n", + /* 75*/ "testing (rare)\n", + /* 76*/ "huw ward\n", + /* 77*/ "david wong\n", + /* 78*/ "adam munton\n", + /* 79*/ "luke munton\n", + /* 80*/ "garry phelps\n", + /* 81*/ "jon silke\n", + /* 82*/ "matthew carter\n", + /* 83*/ "gavin price\n", + /* 84*/ "gareth stevenson\n", + /* 85*/ "joe stamper\n", + /* 86*/ "stephen stamper\n", + /* 87*/ "testing (noa)\n", + /* 88*/ "nintendo guy\n", + /* 89*/ "nintendo gal\n", + /* 90*/ "rare miami\n", + /* 91*/ "eileen hochberg\n", + /* 92*/ "joel hochberg\n", + /* 93*/ "rare twycross\n", + /* 94*/ "chris stamper\n", + /* 95*/ "tim stamper\n", + /* 96*/ "nintendo\n", + /* 97*/ "ken lobb\n", + /* 98*/ "howard lincoln\n", + /* 99*/ "mr arrakawa\n", + /*100*/ "mr yamauchi\n", + /*101*/ "copyright rare 2000\n", + /*102*/ "perfect dark, the pd device and\n", + /*103*/ "perfecthead are trademarks\n", + /*104*/ "rare\n", + /*105*/ "designs on the future\n", + /*106*/ "t&a support\n", + /*107*/ "emma scully\n", + /*108*/ "claire phelan\n", + /*109*/ "joanna dark is forever\n", + /*110*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/titleP.c b/src/files/lang/ntsc-final/titleP.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_f.c b/src/files/lang/ntsc-final/title_str_f.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_g.c b/src/files/lang/ntsc-final/title_str_g.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_i.c b/src/files/lang/ntsc-final/title_str_i.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/title_str_s.c b/src/files/lang/ntsc-final/title_str_s.c new file mode 100644 index 000000000..5b97048ed --- /dev/null +++ b/src/files/lang/ntsc-final/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "barry j northern\n", + /* 12*/ "code warrior gti\n", + /* 13*/ "chris darling\n", + /* 14*/ "weapons specialist\n", + /* 15*/ "duncan botwood\n", + /* 16*/ "attitude adjuster\n", + /* 17*/ "b jones\n", + /* 18*/ "textured guru\n", + /* 19*/ "steve malpass\n", + /* 20*/ "psychic locator and vox\n", + /* 21*/ "brian marshall\n", + /* 22*/ "-aqham-\n", + /* 23*/ "russell irwin\n", + /* 24*/ "packed man\n", + /* 25*/ "jamie williams\n", + /* 26*/ "manic welsh designer\n", + /* 27*/ "ross bury\n", + /* 28*/ "bionic backgrounds\n", + /* 29*/ "martin penny\n", + /* 30*/ "sound geezer\n", + /* 31*/ "grant kirkhope\n", + /* 32*/ "play that music maestro\n", + /* 33*/ "david clynick\n", + /* 34*/ "bangin hardkore choonz\n", + /* 35*/ "keith rabbette\n", + /* 36*/ "aliens by the sea\n", + /* 37*/ "additional\n", + /* 38*/ "dean smith\n", + /* 39*/ "kevin bayliss\n", + /* 40*/ "graham smith\n", + /* 41*/ "mike currington\n", + /* 42*/ "tony wong\n", + /* 43*/ "simon farmer\n", + /* 44*/ "leigh loveday\n", + /* 45*/ "rob harrison\n", + /* 46*/ "lee musgrave\n", + /* 47*/ "mark betteridge\n", + /* 48*/ "chris marlow\n", + /* 49*/ "phillip dunne\n", + /* 50*/ "johnni christensen\n", + /* 51*/ "robin beanland\n", + /* 52*/ "steven hurst\n", + /* 53*/ "voice talent\n", + /* 54*/ "eveline fischer\n", + /* 55*/ "chris sutherland\n", + /* 56*/ "chris seavor\n", + /* 57*/ "john silke\n", + /* 58*/ "ben cullum\n", + /* 59*/ "louise tilston\n", + /* 60*/ "alistair lindsay\n", + /* 61*/ "development tools\n", + /* 62*/ "richard gale\n", + /* 63*/ "mark green\n", + /* 64*/ "mark wilson\n", + /* 65*/ "hardware support\n", + /* 66*/ "pete cox\n", + /* 67*/ "paul mikell\n", + /* 68*/ "doug crouch\n", + /* 69*/ "thanks\n", + /* 70*/ "neil gallagher\n", + /* 71*/ "jonathon o'conner\n", + /* 72*/ "gareth glover\n", + /* 73*/ "motion capture\n", + /* 74*/ "alan tipper\n", + /* 75*/ "des easen\n", + /* 76*/ "jim ballard\n", + /* 77*/ "michelle tipper\n", + /* 78*/ "sue fell\n", + /* 79*/ "testing (rare)\n", + /* 80*/ "huw ward\n", + /* 81*/ "david wong\n", + /* 82*/ "adam munton\n", + /* 83*/ "luke munton\n", + /* 84*/ "gary phelps\n", + /* 85*/ "jon silke\n", + /* 86*/ "matthew carter\n", + /* 87*/ "gavin price\n", + /* 88*/ "gareth stevenson\n", + /* 89*/ "bushbaby\n", + /* 90*/ "stephen stamper\n", + /* 91*/ "ross bullimore\n", + /* 92*/ "justin cook\n", + /* 93*/ "dale murchie\n", + /* 94*/ "testing (noa)\n", + /* 95*/ "nintendo guy\n", + /* 96*/ "nintendo gal\n", + /* 97*/ "rare miami\n", + /* 98*/ "eileen hochberg\n", + /* 99*/ "joel hochberg\n", + /*100*/ "rare twycross\n", + /*101*/ "chris stamper\n", + /*102*/ "wombat\n", + /*103*/ "nintendo\n", + /*104*/ "ken lobb\n", + /*105*/ "howard lincoln\n", + /*106*/ "mr arakawa\n", + /*107*/ "mr yamauchi\n", + /*108*/ "copyright rare 2000\n", + /*109*/ "perfect dark and the pd device\n", + /*110*/ "are trademarks\n", + /*111*/ "rare\n", + /*112*/ "designs on the future\n", + /*113*/ "joanna dark is forever\n", + /*114*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traE.c b/src/files/lang/ntsc-final/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/ntsc-final/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traJ.c b/src/files/lang/ntsc-final/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/ntsc-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/traP.c b/src/files/lang/ntsc-final/traP.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_f.c b/src/files/lang/ntsc-final/tra_str_f.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_g.c b/src/files/lang/ntsc-final/tra_str_g.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_i.c b/src/files/lang/ntsc-final/tra_str_i.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/tra_str_s.c b/src/files/lang/ntsc-final/tra_str_s.c new file mode 100644 index 000000000..3b28566bf --- /dev/null +++ b/src/files/lang/ntsc-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her; she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/uffE.c b/src/files/lang/ntsc-final/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uffJ.c b/src/files/lang/ntsc-final/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uffP.c b/src/files/lang/ntsc-final/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_f.c b/src/files/lang/ntsc-final/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_g.c b/src/files/lang/ntsc-final/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_i.c b/src/files/lang/ntsc-final/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/uff_str_s.c b/src/files/lang/ntsc-final/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/ntsc-final/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/ntsc-final/waxE.c b/src/files/lang/ntsc-final/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/ntsc-final/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/waxJ.c b/src/files/lang/ntsc-final/waxJ.c new file mode 100644 index 000000000..ccf1f85d0 --- /dev/null +++ b/src/files/lang/ntsc-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/waxP.c b/src/files/lang/ntsc-final/waxP.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_f.c b/src/files/lang/ntsc-final/wax_str_f.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_g.c b/src/files/lang/ntsc-final/wax_str_g.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_i.c b/src/files/lang/ntsc-final/wax_str_i.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/ntsc-final/wax_str_s.c b/src/files/lang/ntsc-final/wax_str_s.c new file mode 100644 index 000000000..6b8d410ba --- /dev/null +++ b/src/files/lang/ntsc-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ NULL, + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameE.c b/src/files/lang/pal-beta/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-beta/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameJ.c b/src/files/lang/pal-beta/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/pal-beta/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ameP.c b/src/files/lang/pal-beta/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-beta/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_f.c b/src/files/lang/pal-beta/ame_str_f.c new file mode 100644 index 000000000..d903e7cd5 --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être fixé sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte la clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Accéder aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est à l'ordre du jour d'une réunion, dans l'un des bureaux. Le dirigeant chargé du projet du Dr. Caroll sera présent. Suivez-le jusqu'à son bureau et accédez à ses fichiers, puis téléchargez-les grâce à votre récepteur.\n\n|Objectif 4: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, et elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être appliquée sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte sa clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais intérieur\n", + /* 17*/ "Obtenir collier-clé\n", + /* 18*/ "Télécharger fichiers\n", + /* 19*/ "Neutraliser relais extérieur\n", + /* 20*/ "Accéder au laboratoire\n", + /* 21*/ "Qui êtes-vous? Que faites-vous là?\n", + /* 22*/ "Attention! Elle est armée!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la sécurité.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal placée.\n", + /* 29*/ "Mine CME placée correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effacé.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion terminée...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale traître!\n", + /* 44*/ "Téléchargement en cours.\n", + /* 45*/ "Téléchargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte déverrouillée.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur télécharg. - Récepteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial détruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tué.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir récepteur.\n", + /* 64*/ "\n", + /* 65*/ "Récepteur\n", + /* 66*/ "Un récepteur\n", + /* 67*/ "Récepteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalité.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en même temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un problème de mot de passe, et vous\nallez le résoudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - téléchargement incomplet.\n", + /* 76*/ "Système de sécurité temporairement annulé.\n", + /* 77*/ "Communications extérieures coupées.\n", + /* 78*/ "Ascenseur du laboratoire localisé.\n", + /* 79*/ "Sécurité!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller sécurité.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me déranger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Pitié!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif -\nle relais de com intérieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est à \ncet étage.\n", + /* 95*/ "L'autre relais doit être dans la\nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit être dans\nle coin.\n", + /* 97*/ "Système de sécurité opérationnel.\n", + /* 98*/ "Bravo...ça ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauvé ce soir, \nses supérieurs conditionneront son \nesprit et nous ne pourrons découvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les éliminer?\n", + /*103*/ "Pas de bêtises: une clé de sécurité ne \nfonctionne que si le détenteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes armés...\n", + /*104*/ "Où se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninférieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnaître?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_g.c b/src/files/lang/pal-beta/ame_str_g.c new file mode 100644 index 000000000..d0a43b2dd --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Verkehrs-Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Überwachungskameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries´ Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus-Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird über Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der für Dr. Carrols Projekt verantwortlich zeichnet anwesend ist, findet in einem der Bürotrakte statt. Folgen Sie ihm in sein Büro, greifen Sie auf die Projektdaten zu und übertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Gerätes.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Verkehrs-Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Überwachungskameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries´ Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus-Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangen-gehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vries´ Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vries´ Halskette\n", + /* 15*/ "De Vries´ Halskette aufgenommen.\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlüssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schießen, dummes Kind!\n", + /* 24*/ "Du weißt wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "Wäre ich du, würde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollständig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMÖGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu löschen.\n", + /* 34*/ "Festplatte gelöscht.\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verräter!\n", + /* 44*/ "Kopiervorgang gestartet.\n", + /* 45*/ "Kopiervorgang abgeschlossen.\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich.\n", + /* 47*/ "Türverriegelung aufgehoben.\n", + /* 48*/ "HÄH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Löschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schießen, nicht schießen!\n", + /* 54*/ "Wichtiges Objekt zerstört.\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmöglich.\n", + /* 57*/ "Wichtige Person neutralisiert.\n", + /* 58*/ "Erlangen Sie ECM Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "Eine ECM Mine\n", + /* 62*/ "ECM Mine aufgenommen.\n", + /* 63*/ "Erlangen Sie das Data Uplink-Gerät.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen.\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Büro\naus initiieren und die entsprechenden Files löschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhören.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schießen, nicht schießen!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert.\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollständig.\n", + /* 76*/ "Internes Sicherheitssystem temporär außer Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme außer Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM Mine benötigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM Mine benötigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stören?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "Wäre ich du, würde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schießen!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen.\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock für die internen Sicherheitssysteme muss in der Nähe sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Büro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstört!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So würden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie müssen vorsichtig sein, Joanna. \nCodeschlüssel nützen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlüssel seinen Wert. Bewaffnete Wachen sind natürlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfügen über kein Bildmaterial, und wir können \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glück, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_i.c b/src/files/lang/pal-beta/ame_str_i.c new file mode 100644 index 000000000..c1d6cda62 --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo dispositivo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "La collana di\n", + /* 13*/ "Cassandra De Vries\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Prendi collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! È armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "È ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Farò quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Farò quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "Sì, sì! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizierò subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che può aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos'è tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli farà il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta è \nancora vivo; altrimenti si disattiverà. \nCerto, con le guardie armate \nè tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo né sue foto, né file \nufficiali. Tutto ciò che abbiamo è il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ame_str_s.c b/src/files/lang/pal-beta/ame_str_s.c new file mode 100644 index 000000000..fdc335b5e --- /dev/null +++ b/src/files/lang/pal-beta/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para notrosos. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll está siendo decidido en una reunión en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll está allí presente. Síguele a su oficina y accede a los ficheros de su proyecto, entonces mándanoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para notrosos. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para notrosos. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG División Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obtén el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-código\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "¿Quién eres tú y qué estás haciendo aquí?\n", + /* 22*/ "¡Cuidado! Tiene un arma.\n", + /* 23*/ "¡No me dispararás, tonta criatura!\n", + /* 24*/ "¿No sabes quién soy?\n", + /* 25*/ "Veamos cómo te las apañas con seguridad.\n", + /* 26*/ "¡¡¡¡POR FAVOR!!!! ¡No me mates!\n", + /* 27*/ "Si fuera tú, me marcharía... ¡AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIÓN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIÓN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "¡Haré lo que tú quieras!\n", + /* 36*/ "AYUDA. ¡Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "¡AYUDA, AYUDA!\n", + /* 39*/ "¡Haré lo que tú quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adiós, Dr. Caroll.\n", + /* 43*/ "¡Has procesado tu último error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contraseña.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "¡OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversación del Dr. Caroll...\n", + /* 53*/ "¡No dispares, no dispares!\n", + /* 54*/ "Objeto crítico de la misión destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIÓN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crítica para misión.\n", + /* 58*/ "Obtén las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obtén el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "Conector de Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "Sí, sí, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezaré enseguida. Adiós.\n", + /* 71*/ "¡En marcha!\n", + /* 72*/ "Tengo un problema de contraseñas, y tú \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "¡No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexión terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... ¡Ayúdenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "¡Cómo te atreves a molestarme!\n", + /* 84*/ "¡Te vas a arrepentir de esta intrusión, chica!\n", + /* 85*/ "Si yo fuera tú, me iría... ¡YA!\n", + /* 86*/ "¡Por favor, no me mates!\n", + /* 87*/ "¡No dispares!\n", + /* 88*/ "Obtén la Cámara Espía.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "Cámara Espía\n", + /* 91*/ "Una Cámara Espía\n", + /* 92*/ "Cámara Espía obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno está cerca.\n", + /* 94*/ "Estás en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del sótano debe de estar por \naquí en algún lugar.\n", + /* 97*/ "El sistema de seguridad está activo de nuevo.\n", + /* 98*/ "¡Vándalo! ¡Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "¿Por qué tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavará el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "¿Son todos prescindibles?\n", + /*103*/ "¡No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves código sólo funcionan cuando el \npropietario está vivo... Si les matas, la llave \nes inútil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "¿Dónde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estará en el laboratorio de \ninvestigación en algún lugar del subsuelo.\n", + /*106*/ "¿Cómo le reconoceré?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-beta/archE.c b/src/files/lang/pal-beta/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/archJ.c b/src/files/lang/pal-beta/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/archP.c b/src/files/lang/pal-beta/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_f.c b/src/files/lang/pal-beta/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_g.c b/src/files/lang/pal-beta/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_i.c b/src/files/lang/pal-beta/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arch_str_s.c b/src/files/lang/pal-beta/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecE.c b/src/files/lang/pal-beta/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecJ.c b/src/files/lang/pal-beta/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arecP.c b/src/files/lang/pal-beta/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_f.c b/src/files/lang/pal-beta/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_g.c b/src/files/lang/pal-beta/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_i.c b/src/files/lang/pal-beta/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arec_str_s.c b/src/files/lang/pal-beta/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/arkE.c b/src/files/lang/pal-beta/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-beta/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/arkJ.c b/src/files/lang/pal-beta/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/pal-beta/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/arkP.c b/src/files/lang/pal-beta/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-beta/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_f.c b/src/files/lang/pal-beta/ark_str_f.c new file mode 100644 index 000000000..05b3c23cb --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Réactiver l'ascenseur\n\nNous avons détecté la commande d'arrêt de fonctionnement de l'ascenseur donnée par un PC des bureaux inférieurs. Trouvez ce terminal et modifiez la commande pour réactiver l'ascenseur.\n\n|Objectif 3: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous interdire l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 5: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 4: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 3: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Accéder à l'ascenseur du hall\n", + /* 10*/ "Réactiver l'ascenseur du bureau\n", + /* 11*/ "Détruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour à l'héliport avec Dr. Caroll\n", + /* 14*/ "Accès paramètres ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommagé!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous êtes une sacrée peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning hélico.\n", + /* 27*/ "Obtenir Vision nocturne.\n", + /* 28*/ "Vision nocturne de\n", + /* 29*/ "Cassandra De Vries\n", + /* 30*/ "Vision nocturne\n", + /* 31*/ "Vision nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne éliminé.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme ça!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais dépêchez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voilà...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial détruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouillé le rez-de-chaussée - \nallez à l'ascenseur!\n", + /* 52*/ "Il faut détruire cet hélico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez à l'héliport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut mère-grand?\n", + /* 65*/ "Remettez-moi le sapiens immédiatement! Vous ne\nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la dernière fois: rendez ce qui\nm'appartient et je vous offre un poste.\n", + /* 68*/ "Désolée! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'opération en dépend.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi à qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable à cet étage.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_g.c b/src/files/lang/pal-beta/ark_str_g.c new file mode 100644 index 000000000..ffebb5d75 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Bürotrakt. Sie müssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne Gunship!\n\nEin dataDyne Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne Gunship!\n\nEin dataDyne Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Truppenkonzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Büro-Aufzug!\n", + /* 11*/ "Zerstören Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzüge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll erlitt einen kritischen Treffer!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde beschädigt!\n", + /* 19*/ "Zu spät! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig lästig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät\n", + /* 31*/ "Nachtsichtgerät aufgenommen.\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten.\n", + /* 34*/ "Tür zum Büro-Aufzug entriegelt.\n", + /* 35*/ "dataDyne Gunship eliminiert.\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hör auf mich zu nerven.\n", + /* 41*/ "Würdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu spät!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstört. \n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen.\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kümmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurück zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Büro-Schlüsselkarte\n", + /* 58*/ "Büro-Schlüsselkarte\n", + /* 59*/ "Cassandras Büro-Schlusselkarte aufgenommen.\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas für dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurück! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurück, und Sie\nkönnten vielleicht in Zukunft für mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie müssen uns das Ding zurückbringen. Wir können \nsonst nicht fortfahren.\n", + /* 70*/ "Das weiß ich!\n", + /* 71*/ "Ich weiß auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstüren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_i.c b/src/files/lang/pal-beta/ark_str_i.c new file mode 100644 index 000000000..22f5e66b0 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington - \n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll è stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll è ferito!\n", + /* 19*/ "Troppo tardi! È già qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa così, idiota!\n", + /* 38*/ "Sì, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \n Va all'ascensore!\n", + /* 52*/ "Bisogna tirar giù quella cannoniera \n o abbatterà la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \n Torna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: è qui!\n", + /* 61*/ "Spegnete le luci!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Devo farlo!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon è possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \nSig. Carrington.\n", + /* 72*/ "La porta dell'ascensore è fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ark_str_s.c b/src/files/lang/pal-beta/ark_str_s.c new file mode 100644 index 000000000..3052b14c6 --- /dev/null +++ b/src/files/lang/pal-beta/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el único ascensor accesible enviada a un PC situado en el piso de oficinas más bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestíbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicóptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "¡LUCES ENCENDIDAS!\n", + /* 16*/ "¡El Dr. Caroll ha muerto!\n", + /* 17*/ "¡Están atacando al Dr. Caroll!\n", + /* 18*/ "¡El Dr. Caroll ha sido dañado!\n", + /* 19*/ "¡Demasiado tarde! Ella está aquí...\n", + /* 20*/ "Estás empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIÓN FALLADA\n", + /* 25*/ "MISIÓN CUMPLIDA\n", + /* 26*/ "Aviso del Helicóptero va aquí.\n", + /* 27*/ "Obtén Visión Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Visión Nocturna\n", + /* 30*/ "Visión Nocturna\n", + /* 31*/ "Visión Nocturna obtenida.\n", + /* 32*/ "¡Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestíbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicóptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "Así no es como va.\n", + /* 38*/ "Sí, así es.\n", + /* 39*/ "Dámelo. Lo estás haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "¡Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella está aquí...\n", + /* 44*/ "¡Cogedla!\n", + /* 45*/ "Objeto crítico de la misión destruido. \n", + /* 46*/ "Obtén la Cámara Espía.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Cámara Espía\n", + /* 49*/ "Una Cámara Espía\n", + /* 50*/ "Cámara Espía obtenida.\n", + /* 51*/ "Han cerrado la planta baja: \n¡Ve al ascensor!\n", + /* 52*/ "¡Necesitamos acabar con ese helicóptero, \no derribará la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obtén la llave magnética alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave magnética de la oficina\n", + /* 58*/ "Llave magnética de la oficina\n", + /* 59*/ "Llave magnética de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: ¡ella está aquí!\n", + /* 61*/ "¡Luces fuera!\n", + /* 62*/ "¿Qué dem...?\n", + /* 63*/ "¿Vas a alguna parte?\n", + /* 64*/ "¿Puedo hacer algo por ti, anciana?\n", + /* 65*/ "¡Devuelve nuestra IA inmediatamente! No sabes \nlo que estás haciendo.\n", + /* 66*/ "Sí lo sé. Me largo.\n", + /* 67*/ "¡Otra oportunidad! Devuélvelo, y podrás \ntrabajar para mí.\n", + /* 68*/ "¡Lo siento! ¿Lo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "¡Ya lo sé!\n", + /* 71*/ "También sé con quién hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ashE.c b/src/files/lang/pal-beta/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ashJ.c b/src/files/lang/pal-beta/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ashP.c b/src/files/lang/pal-beta/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_f.c b/src/files/lang/pal-beta/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_g.c b/src/files/lang/pal-beta/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_i.c b/src/files/lang/pal-beta/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ash_str_s.c b/src/files/lang/pal-beta/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ateE.c b/src/files/lang/pal-beta/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-beta/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ateJ.c b/src/files/lang/pal-beta/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/pal-beta/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ateP.c b/src/files/lang/pal-beta/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-beta/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_f.c b/src/files/lang/pal-beta/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent expérimenté du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez être fière de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 10*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 11*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_g.c b/src/files/lang/pal-beta/ate_str_g.c new file mode 100644 index 000000000..78a7eab25 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines äußerst gefährlichen Regierungsagenten. Der Simulant ist ein überdurchschnittlich erfahrener Kämpfer. Wenn Sie diesen Test bestehen, dürfen Sie zu Recht stolz auf sich sein.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\nEND\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\nEND\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUEL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Ausgezeichnet! Sie waren zu schnell für ihn!\n", + /* 10*/ "Ausgezeichnet! Sie waren zu schnell für ihn!\n", + /* 11*/ "Ausgezeichnet! Sie waren zu schnell für ihn!\n", + /* 12*/ "Gegnerischer Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Gegnerischer Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Gegnerischer Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_i.c b/src/files/lang/pal-beta/ate_str_i.c new file mode 100644 index 000000000..3d92c8b13 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante è un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione - \n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington - \n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilità avversario: AGENTE\n", + /* 13*/ "Livello abilità avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilità avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ate_str_s.c b/src/files/lang/pal-beta/ate_str_s.c new file mode 100644 index 000000000..72f79a1e7 --- /dev/null +++ b/src/files/lang/pal-beta/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedora del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulación de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podrás estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardián de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 10*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 11*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/aztE.c b/src/files/lang/pal-beta/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-beta/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/aztJ.c b/src/files/lang/pal-beta/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/pal-beta/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/pal-beta/aztP.c b/src/files/lang/pal-beta/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-beta/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_f.c b/src/files/lang/pal-beta/azt_str_f.c new file mode 100644 index 000000000..14caeac06 --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez- le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminémais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Désactiver appareil brouillage ennemi\n\nUn système ennemi sophistiqué inonde le secteur d'un brouillage CME impénétrable. Vous pourrez déterminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouvé, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 5: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez- le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminémais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 4: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminémais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 3: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Récupérer scanner médical présidentiel\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Désactiver appareil brouillage ennemi\n", + /* 8*/ "Eliminer le clone du Président\n", + /* 9*/ "Trouver et sauver le Président\n", + /* 10*/ "Voilà le point d'évacuation.\n", + /* 11*/ "Le signal peut venir de là.\n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau.\n", + /* 13*/ "Elvis... Il pourra protéger le Président.\n", + /* 14*/ "Signal de détresse activé.\n", + /* 15*/ "Objet crucial détruit.\n", + /* 16*/ "Obtenir le scanner présidentiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner présidentiel\n", + /* 20*/ "Scanner présidentiel obtenu.\n", + /* 21*/ "Appareil de brouillage désactivé.\n", + /* 22*/ "Le Président a été abattu.\n", + /* 23*/ "Clone présidentiel éliminé.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Président sauvé.\n", + /* 26*/ "Obtenir Vision nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vision nocturne\n", + /* 29*/ "Vision nocturne\n", + /* 30*/ "Vision nocturne obtenue.\n", + /* 31*/ "Prenez ceci. Cela vous sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, répondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-être de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne santé. Sans oublier le Président...\n", + /* 40*/ "Comment vous sentez-vous, M. le Président?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journée. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement américain. Un modèle unique pouvant mener des expériences à de grandes profondeurs. Trent a formulé une demande de prêt au nom de la dataDyne Corporation. J'ai refusé.\n", + /* 44*/ "Trent devra répondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez échoué, Easton. Vous êtes un élément corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est ça oui. Pétasse suédoise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_g.c b/src/files/lang/pal-beta/azt_str_g.c new file mode 100644 index 000000000..ed3f99dcf --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes ECM-Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzeige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|3. Ziel: - Deaktivieren Sie den Dämpfungsfeld-Generator!\n\nEin High-Tech Dämpfungsfeld-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des Dämpfungs-Signals ausfindig zu machen, als unsere Luft-Aufklärer. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann können wir Sie orten und Ihnen zur Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes ECM-Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzeige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|3. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes ECM-Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzeige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Handlungsspielraum.\n\n|2. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Präsidenten-Klon!\n", + /* 9*/ "Orten und retten Sie den Präsidenten!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das Dämpfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Präsidenten zu beschützen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstört.\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen.\n", + /* 21*/ "Dämpfungsfeld-Generator deaktiviert.\n", + /* 22*/ ".\n", + /* 23*/ "Präsidenten-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Präsident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtgerät\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät aufgenommen.\n", + /* 31*/ "Nimm das; es wird sich als nützlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestört... Das Signal kommt von dort drüben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Präsidenten retten.\n", + /* 40*/ "Wie fühlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht länger von Nutzen.\n", + /* 46*/ "Versuch´s nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_i.c b/src/files/lang/pal-beta/azt_str_i.c new file mode 100644 index 000000000..6ceea455c --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere più facile localizzarla e disattivarla. Fatto ciò potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington - \n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si può mandare un segnale da lì!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Può proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente è stato ucciso.\n", + /* 23*/ "Il clone del Presidente è stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente è stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sarà utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C'è qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorrà un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo sì che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos'è il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "È un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondità oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi più!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/azt_str_s.c b/src/files/lang/pal-beta/azt_str_s.c new file mode 100644 index 000000000..13089d2ef --- /dev/null +++ b/src/files/lang/pal-beta/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo está inundando el área con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra más efectivamente de lo que nuestros aviones espía están haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posición y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar escáner médico del Presidente\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "Apagar la señal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ahí está la cápsula de escape.\n", + /* 11*/ "Quizá haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... Él será capaz de proteger al Presidente.\n", + /* 14*/ "Señal de socorro activada.\n", + /* 15*/ "Objeto crítico de la misión destruido.\n", + /* 16*/ "Obtén el Escáner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Escáner Presidencial\n", + /* 20*/ "Escáner Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "¡Ahora ya no podrás salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obtén Visión Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Visión Nocturna\n", + /* 29*/ "Visión Nocturna\n", + /* 30*/ "Visón Nocturna obtenida.\n", + /* 31*/ "Toma esto, ¡lo encontrarás muy útil!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "¡Agente Dark! ¡Informe, por favor!\n", + /* 35*/ "¡Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "¡Agente Dark! ¡Por favor, responda!\n", + /* 38*/ "Algo está bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis está bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "¿Cómo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo así. Sabía que era ambicioso, sí, pero esto...\n", + /* 42*/ "Sólo una cosa, señor. ¿Qué es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navío de investigación de profundidad del gobierno norteamericano, único en su clase... El único barco capaz de dirigir una operación a gran escala a profundidad extrema. Trent quería que se lo prestara a la Corporación dataDyne, pero rehusé.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "¡Inténtalo, mamarracho escandinavo!\n", + /* 47*/ "¡¡¡Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-beta/catE.c b/src/files/lang/pal-beta/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/catJ.c b/src/files/lang/pal-beta/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/catP.c b/src/files/lang/pal-beta/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_f.c b/src/files/lang/pal-beta/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_g.c b/src/files/lang/pal-beta/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_i.c b/src/files/lang/pal-beta/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cat_str_s.c b/src/files/lang/pal-beta/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/caveE.c b/src/files/lang/pal-beta/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-beta/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-beta/caveJ.c b/src/files/lang/pal-beta/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/pal-beta/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/pal-beta/caveP.c b/src/files/lang/pal-beta/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-beta/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_f.c b/src/files/lang/pal-beta/cave_str_f.c new file mode 100644 index 000000000..c5f139a43 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol du coffre\n\nLe plan de vol de l'Air Force One est gardé dans un coffre de la base. Dérobez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme sera donnée et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'équipement\n", + /* 7*/ "Leurrer le système de détection\n", + /* 8*/ "Obtenir le plan de vol du coffre\n", + /* 9*/ "Monter à bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'hôtesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'hôtesse obtenu.\n", + /* 20*/ "Obtenir plans de vol du coffre.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour.\n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie.\n", + /* 32*/ "...??? Oh, mon Dieu!\n", + /* 33*/ "Les armes sont interdites dans la base.\n", + /* 34*/ "J'appelle la sécurité.\n", + /* 35*/ "Coupure système initialisée...\n", + /* 36*/ "Systèmes sécurité coupés.\n", + /* 37*/ "Armement détecté.\n", + /* 38*/ "Valise déposée.\n", + /* 39*/ "Valise scannée.\n", + /* 40*/ "Vous, là! Cette zone est interdite.\n", + /* 41*/ "Vous êtes nouvelle ou quoi?\n", + /* 42*/ "Hé! Ma valise!\n", + /* 43*/ "Appelle la sécurité... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Accès grilles laser refusé.\n", + /* 46*/ "Système grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Empêchez-les d'avoir le coffre...\n", + /* 49*/ "Costume revêtu.\n", + /* 50*/ "Vite! Attrapez le sac de l'hôtesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre équipement.\n", + /* 52*/ "Cette caisse se fera arrêter si vous n'intervenez pas.\n", + /* 53*/ "C'est ça Air Force One, hein? ... C'est assez\npetit en fait.\n", + /* 54*/ "Arrêtez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entrée principale de la base. J'aperçois aussi le point d'arrivée du téléphérique.\n", + /* 56*/ "Excellent, Joanna. Ce téléphérique est votre billet d'entrée. Notre contact a repéré une hôtesse montant à bord il y a une minute. Elle est escortée par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font sûrement pas partie de l'opération de Trent et que je ne dois pas les abattre même sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis néanmoins persuadé que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois à bord et présentez-les au Président.\n", + /* 59*/ "Et le protéger de ses ravisseurs. Avez-vous une théorie sur les plans de Trent et sur les types blonds?\n", + /* 60*/ "Que de vagues soupçons. Concentrez-vous plutôt sur la mission. Bonne chance. Carrington, terminé.\n", + /* 61*/ "Ascenseur inactif - système sécurité actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial détruit.\n", + /* 64*/ "Entrée de la base sécurisée.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coupé.\n", + /* 67*/ "Equipement ne peut être enregistré.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_g.c b/src/files/lang/pal-beta/cave_str_g.c new file mode 100644 index 000000000..d4d9a0d26 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Luftwaffen-Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Überwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpläne aus dem Safe!\n\nDie Route, welche für die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pläne in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamität dient er als Ihre Verstärkung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRÄSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Luftwaffen-Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Überwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Luftwaffen-Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Überwachungssystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, das die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrüstung ein!\n", + /* 7*/ "Unterminieren Sie die Überwachung!\n", + /* 8*/ "Entwenden Sie die Flugpläne!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpläne aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpläne\n", + /* 23*/ "Flugpläne\n", + /* 24*/ "Flugpläne aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schönen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie müssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "Überwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurück!\n", + /* 43*/ "Du holst die Security - Ich kümmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert.\n", + /* 46*/ "Lasermatrix-System wurde überladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde abgetragen.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess \n", + /* 51*/ "mit ihrer Uniform. Verbergen Sie Ihre Ausrüstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. Mit der Bahn gelangen Sie in die Basis. Unser Beobachter hat uns mitgeteilt, das ein Crew-Mitglied vor einer Minute das Flugzeug betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA Agenten?\n", + /* 58*/ "Ich weiß nicht, wie weit diese Verschwörung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenüber absolut loyal sind. Sie müssen einen Beweis gegen Trent erbringen und diesen dem Präsidenten vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschützen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten könnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glück! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person ausgeschaltet.\n", + /* 63*/ "Wichtiges Objekt zerstört.\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir übernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrüstung kann nicht überprüft werden.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_i.c b/src/files/lang/pal-beta/cave_str_i.c new file mode 100644 index 000000000..ef396368e --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione - \n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington - \n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C'è un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamerò la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza è stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia è stata depositata.\n", + /* 39*/ "La valigia è stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area è vietato.\n", + /* 41*/ "È la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedrò io con loro!\n", + /* 44*/ "Di sopra... c'è un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verrà fermata.\n", + /* 53*/ "Così quello è l'Air Force One? Mhm... \n più piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta è il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. È scortata da una squadra della base aerea. È superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui sisia diffusa la cospirazione all'interno dell' NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "Sììì e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base è stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non può essere depositata.\n", +}; diff --git a/src/files/lang/pal-beta/cave_str_s.c b/src/files/lang/pal-beta/cave_str_s.c new file mode 100644 index 000000000..dacf86886 --- /dev/null +++ b/src/files/lang/pal-beta/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One está guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AÉREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener los planos de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obtén la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obtén los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "¿Está bien?\n", + /* 28*/ "Iré para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aquí.\n", + /* 31*/ "Deberás dejar ese arma aquí.\n", + /* 32*/ "¡Oh, Dios mío!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisaré a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, tú: ésta es un área restringida.\n", + /* 41*/ "¿Eres nueva por aquí?\n", + /* 42*/ "Hey. Devuélveme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de láser denegado.\n", + /* 46*/ "Sistema de rejilla de láser sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "¡Ésta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta será detenida a menos que hagas algo.\n", + /* 53*/ "¿Así que ese es el Air Force One? ... Huh, es más \npequeño de lo que pensaba.\n", + /* 54*/ "Detenlos: están accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posición. Puedo ver la entrada principal de la base, y distingo el punto de llegada del teleférico.\n", + /* 56*/ "Excelente, Joanna. Ese teleférico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulación entrar hace un minuto. Está siendo escoltada por tropas de la base aérea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequeña trama de Trent. Y que no puedo dispararles aunque ellos me disparen a mí. ¿Qué pasa con los agentes de la ANS?\n", + /* 58*/ "No sé cuán lejos ha llegado la conspiración a través de la ANS, pero podría apostar a que los hombres que Trent ha situado por aquí son leales a su plan y a él mismo. Debes encontrar evidencias de la traición de Trent en el Air Force One y enseñárselas al Presidente.\n", + /* 59*/ "Sí, y protegerle de sus secuestradores. ¿Tienes alguna idea sobre de qué puede tratar el plan de Trent, y qué pasa con esos chicos rubios?\n", + /* 60*/ "Sólo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crítico de la misión eliminado.\n", + /* 63*/ "Objeto crítico de la misión destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "¡¡Nos ocupamos nosotros!!\n", + /* 66*/ "El teleférico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/pal-beta/cradE.c b/src/files/lang/pal-beta/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cradJ.c b/src/files/lang/pal-beta/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cradP.c b/src/files/lang/pal-beta/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_f.c b/src/files/lang/pal-beta/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_g.c b/src/files/lang/pal-beta/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_i.c b/src/files/lang/pal-beta/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crad_str_s.c b/src/files/lang/pal-beta/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypE.c b/src/files/lang/pal-beta/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypJ.c b/src/files/lang/pal-beta/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/crypP.c b/src/files/lang/pal-beta/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_f.c b/src/files/lang/pal-beta/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_g.c b/src/files/lang/pal-beta/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_i.c b/src/files/lang/pal-beta/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/cryp_str_s.c b/src/files/lang/pal-beta/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/damE.c b/src/files/lang/pal-beta/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-beta/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-beta/damJ.c b/src/files/lang/pal-beta/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/pal-beta/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/damP.c b/src/files/lang/pal-beta/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-beta/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_f.c b/src/files/lang/pal-beta/dam_str_f.c new file mode 100644 index 000000000..166cefac8 --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Sécuriser labos et données de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. Sécurisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoqua des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Désactiver GPS et Auto-pilote\n", + /* 6*/ "Désactiver source d'énergie principale\n", + /* 7*/ "Sécuriser labos et données de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \ndérivera... Parfait!\n", + /* 11*/ "Le sous-marin doit être contrôlé d'ici.\n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'éloignera de la station.\n", + /* 13*/ "Ils ne pourront plus continuer l'opération \nsans énergie.\n", + /* 14*/ "Système auto-pilote désactivé.\n", + /* 15*/ "Système GPS désactivé.\n", + /* 16*/ "Objet crucial détruit.\n", + /* 17*/ "Porte de commande d'arrêt du réacteur ouverte.\n", + /* 18*/ "Réacteur désactivé.\n", + /* 19*/ "Centre de contrôle de plongée localisé.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Données de recherche sécurisées.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur déverrouillée.\n", + /* 29*/ "Ascenseur activé.\n", + /* 30*/ "Opération refusée - portes du hangar fermées.\n", + /* 31*/ "Séquence de déverrouillage réinitialisée.\n", + /* 32*/ "Vas-y. Je sécurise le périmètre.\nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a été abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi...\nOn décampe.\n", + /* 35*/ "Des civils ont été abattus.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Alarme activée.\n", + /* 38*/ "Alarme désactivée.\n", + /* 39*/ "Bien. L'opération de plongée a été annulée à la surface.\nIl est temps de piquer une tête.\n", + /* 40*/ "J'espère que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est allé un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "Débranche ce truc.\n", + /* 44*/ "Eteins-moi ça.\n", + /* 45*/ "Je vais l'éteindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_g.c b/src/files/lang/pal-beta/dam_str_g.c new file mode 100644 index 000000000..4a52cce6b --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tiefsee-Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungsergebnisse!\n\nWir wollen sämtliche Informationen, die dataDyne bis dato über dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker außer Gefecht. Vergessen Sie nicht, dass wir sie später noch verhören wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tiefsee-Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tiefsee-Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator außer Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flüchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr völlig \nnavigationsunfähig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert.\n", + /* 15*/ "GPS-System wurde deaktiviert.\n", + /* 16*/ "Wichtiges Objekt wurde zerstört.\n", + /* 17*/ "Reaktor-Kontrollkonsole geöffnet.\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert.\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen.\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstür wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzulässige Operation - Die Hangartüren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gelände. \nWir treffen uns später.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschüssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfläche unterbrochen.\nZeit für ein wenig Badevergnügen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so mädchenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verräter.\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_i.c b/src/files/lang/pal-beta/dam_str_i.c new file mode 100644 index 000000000..5adef333a --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano lì: li interrogheremo più tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington - \n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se viene disattivato solo uno dei due, non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andrà alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontanerà dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco è stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis è stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va là!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/pal-beta/dam_str_s.c b/src/files/lang/pal-beta/dam_str_s.c new file mode 100644 index 000000000..c8e1be261 --- /dev/null +++ b/src/files/lang/pal-beta/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigación\n\nQueremos cualquier información que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los científicos y técnicos que allí trabajan; queremos interrogarles más tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto automático\n", + /* 6*/ "Desactivar fuente primaria de energía\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave irá \na la deriva... ¡Perfecto!\n", + /* 11*/ "Desde aquí se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto automático y el GPS, la nave \ndeambulará fuera de la estación.\n", + /* 13*/ "No podrán realizar ninguna operación \nsin energía.\n", + /* 14*/ "El sistema de piloto automático ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crítico de la misión destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crítico de la misión.\n", + /* 21*/ "Datos de investigación asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos de investigación\n", + /* 25*/ "Un disco de datos de investigación\n", + /* 26*/ "Disco de datos de investigación obtenido.\n", + /* 27*/ "Ha muerto personal crítico de la misión.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operación denegada: puertas del hangar todavía cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos más tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ¿Por qué has tardado tanto? Sígueme. \nSalgamos de esta vieja bañera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operación de buceo ha sido desbaratada en la superficie. \nEs la hora del baño.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "¿Piensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagaré.\n", + /* 46*/ "Por favor, no me hagas daño.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/pal-beta/depoE.c b/src/files/lang/pal-beta/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-beta/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-beta/depoJ.c b/src/files/lang/pal-beta/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/pal-beta/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/pal-beta/depoP.c b/src/files/lang/pal-beta/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-beta/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_f.c b/src/files/lang/pal-beta/depo_str_f.c new file mode 100644 index 000000000..f6f729fb1 --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble empêche tout système d'enregistrement de fonctionner. Une fois coupée, la Camspy pourra transmettre les données au QG.\n\n|Objectif 2: - Désactiver les systèmes de grilles laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité préservée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver les systèmes de grille laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité préservée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité préservée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Désactiver le champ d'isolement\n", + /* 10*/ "Désactiver les systèmes de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "Récupérer la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial détruit.\n", + /* 25*/ "Générateur champ d'isolement coupé.\n", + /* 26*/ "Générateur ne peut être rallumé.\n", + /* 27*/ "Unité grilles laser coupée.\n", + /* 28*/ "Unité grilles laser activée.\n", + /* 29*/ "Tous systèmes grilles laser coupés.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "Décodeur porte fixé sur panneau d'accès.\n", + /* 36*/ "Commandes piratages lancées.\n", + /* 37*/ "Décodage porte achevé - porte déverrouillée.\n", + /* 38*/ "ALERTE INTRUSION - sécurité dans l'abri.\n", + /* 39*/ "Décodeur porte placé correctement.\n", + /* 40*/ "Décodeur porte mal placé.\n", + /* 41*/ "Conspirateurs alertés.\n", + /* 42*/ "Alarme activée.\n", + /* 43*/ "Alarme désactivée.\n", + /* 44*/ "Porte du coffre fermée.\n", + /* 45*/ "Décodeur porte fixé.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard placé correctement.\n", + /* 54*/ "Mouchard mal placé.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activés.\n", + /* 61*/ "La salle de réunion doit être droit devant.\nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est très complexe.\nLe décodeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite à\nla porte de tout à l'heure.\n", + /* 64*/ "Objet crucial détruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir\nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Détonateur\n", + /* 69*/ "Détonateur\n", + /* 70*/ "Détonateur obtenue.\n", + /* 71*/ "CamSpy détruite - abandonner la mission.\n", + /* 72*/ "Nous avons récupéré le Sapiens chez Carrington \net changé son programme. Il n'a plus de \npersonnalité. Cela évitera de futurs \nincidents.\n", + /* 73*/ "Cela réduira son efficacité. Mon équipe le \nmènera au centre. Ils prendront donc \ndes risques inutiles. Vous auriez dû \nprévoir ce développement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment prévoir une chose pareille?! \nEt pourquoi suis-je la seule à porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Président a-t-il refusé votre demande \nde prêt du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-être sous-estimé son côté \nintègre. Mais nous avons un plan de \nsecours. Nous agirons dès que l'équipe \nprésidentielle arrivera à la base aérienne. \nJe n'ai besoin que d'un échantillon de la \npeau du Président.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne bénéficiera d'aucune aide \nextérieure. L'équipement que vous nous \navez offert est installé au Nevada et est \nopérationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de détruire tout ce qui ne veut pas \nfonctionner. Appliquez-la donc aussi à \nvotre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Préparez-vous à \nrecevoir les données de la réunion. \nDemande prioritaire d'une équipe de \nl'Institut pour protéger le Président \navant son départ pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tôt a été \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, là où les \nrescapés et les débris ont dû être amenés. \nRevenez au poste et préparez-vous \npour un départ imminent. \nCarrington, terminé.\n", + /* 83*/ "Secteur 51? Et le Président alors?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_g.c b/src/files/lang/pal-beta/depo_str_g.c new file mode 100644 index 000000000..74469fe1f --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Dämpfungsfeld-Generator außer Kraft!\n\nAuf dem Garagen-Deck des Gebäudes befindet sich eine Vorrichtung, die den Einsatz jeglicher Aufzeichnungsgeräte verhindert. Finden Sie das Gerät und schalten Sie es ab! Anschließend sollte der CamSpy die Daten ohne Probleme übermitteln können.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persönlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|5. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierten Türen, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persönlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|4. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierten Türen, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seines Persönlichkeitsprofils aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|3. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierten Türen, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator außer Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwörer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Gebäude!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 15*/ "Level 1 Schlüsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlüsselkarte der Wache\n", + /* 18*/ "Schlüsselkarte der Wache aufgenommen.\n", + /* 19*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 20*/ "Level 2 Schlüsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlüsselkarte der Wache\n", + /* 23*/ "Schlüsselkarte der Wache aufgenommen.\n", + /* 24*/ "Wichtiges Objekt wurde zerstört.\n", + /* 25*/ "Dämpfungsfeld-Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen.\n", + /* 35*/ "Tür-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tür wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskräfte sofort ins Kellergeschoß!\n", + /* 39*/ "Tür-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tür-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwörer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetür ist versperrt.\n", + /* 45*/ "Tür-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen.\n", + /* 51*/ "Zielerreichung unvollständig - MISSION FEHLGESCHLAGEN.\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen.\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit für den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklügelt.\nDer Decoder wird etwas mehr Zeit benötigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tür, die ich \nvorhin 'präpariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstört.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen.\n", + /* 71*/ "Der CamSpy wurde zerstört - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurückgeholt \nund sein Programm verändert. Es hat nun keine \nPersönlichkeit mehr. Daher sind auch keine \nweiteren Zwischenfälle mehr zu befürchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie hätten \nvoraussehen müssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand hätte das voraussehen können! Und ich \nlehne es ab, dafür verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Präsident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig überschätzt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit unterschätzt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Stützpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPräsidenten.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Störmaßnahmen. \nWenn Carrington eins und eins zusammengezählt hat, \ndann ist Verstärkung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von außen erhalten. \nDie Technologie, die Sie uns zur Verfügung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit können wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstört werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nÜbertragung der Aufzeichnung vor. Ich beantrage ein \nUnterstützungsteam des Instituts zum Schutz des \nPräsidenten, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorität Eins.\n", + /* 82*/ "Dafür ist nun keine Zeit, Agent Dark. Während \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde über Nevada abgeschossen. \nDie dafür verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nÜberlebende und die Wrackteile gebracht. Bereiten \nSie sich für die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Präsidenten?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_i.c b/src/files/lang/pal-beta/depo_str_i.c new file mode 100644 index 000000000..8d47f1e76 --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio è collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato la TeleSpia potrà trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington - \n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell' Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali di disturbo\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1° piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2° piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unità griglie laser\n", + /* 28*/ "Attivata unità griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "È impossibile passare finché sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nÈ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte è criptata. \nIl decodificatore ci metterà un po'.\n", + /* 63*/ "È ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalità, così non \navremo più spiacevoli sorprese.\n", + /* 73*/ "Questo ridurrà la sua efficienza. La mia \nsquadra dovrà portarlo subito al centro, \nma ciò li metterà in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avrò sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ciò che mi serve \ndal Presidente è un campione di tessuto.\n", + /* 78*/ "Sì... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avrà già chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato è stata \ninstallata in Nevada ed è già operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ciò significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ciò che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c'è tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo è stato abbattuto \nin Nevada. Il colpo è stato sparato dall' \nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sarà del Presidente?\n", +}; diff --git a/src/files/lang/pal-beta/depo_str_s.c b/src/files/lang/pal-beta/depo_str_s.c new file mode 100644 index 000000000..644f092fb --- /dev/null +++ b/src/files/lang/pal-beta/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Húmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisión de cualquier información grabada por la Cámara Espía. Una vez apagado, la Cámara Espía puede enviar cualquier grabación al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Tres: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Dos- Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo húmedo\n", + /* 10*/ "Desactivar sistemas de rejilla láser\n", + /* 11*/ "Holografiar reunión de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obtén la llave magnética alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave magnética de Nivel 1\n", + /* 17*/ "Llave Magnética del Guarda\n", + /* 18*/ "Llave Magnética del Guarda obtenida\n", + /* 19*/ "Obtén la llave magnética alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave magnética de Nivel 2\n", + /* 22*/ "Llave Magnética del Guarda\n", + /* 23*/ "Llave Magnética del Guarda obtenida\n", + /* 24*/ "Objeto crítico de la misión destruido.\n", + /* 25*/ "Generador de campo húmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla láser apagada.\n", + /* 28*/ "Unidad de rejilla láser activada.\n", + /* 29*/ "Todos los sistemas de rejilla láser apagados.\n", + /* 30*/ "Obtén la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas terminó: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte está cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obtén el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIÓN FALLADA.\n", + /* 52*/ "MISIÓN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obtén la Cámara Espía.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Cámara Espía\n", + /* 58*/ "Una Camára Espía\n", + /* 59*/ "Cámara Espía obtenida.\n", + /* 60*/ "No hay ningún camino posible mientras \nesos láseres estén activos.\n", + /* 61*/ "Eso de ahí delante debe ser la sala de reuniones. \nHora de usar la Cámara Espía.\n", + /* 62*/ "La caja fuerte está duramente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "¡Hora de irse! Vamos a la puerta que creé \nantes.\n", + /* 64*/ "Objeto crítico de la misión destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La Cámara Espía ha sido destruida: abortar misión.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programación. Nunca más tendrá \npersonalidad, así no podrá haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducirá su eficiencia. Mi equipo tendrá \nque llevarlo al núcleo por sí mismo. Esto les \npondrá en peligro. Debías haber anticipado \nque la IA podría desarrollar un problemático \ncódigo moral.\n", + /* 74*/ "¡Nadie podría haber predecido eso! ¡Y me \nmolesta que me echen la culpa de ello! \n¿Qué pasa con él?\n", + /* 75*/ "¿El Presidente no ha admitido tu petición \nde préstamo del Pelagic II?\n", + /* 76*/ "¿No podría ser que hayas sobreestimado \ntu influencia sobre él?\n", + /* 77*/ "¡No! Quizá haya menospreciado su resolución. \nTenemos un plan de contigencia preparado, \ny comenzará tan pronto como el séquito presidencial\nllegue a la base aérea. Todo lo que necesito del \nPresidente es una muestra de tejido cutáneo.\n", + /* 78*/ "¡Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisará a los refuerzos.\n", + /* 79*/ "No habrá ayuda exterior para el Sr. Carrington. \nLa tecnología que nos diste está instalada en \nNevada y totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "¿Entonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "¡Agente Dark informando! Preparaos para \nrecibir los datos de la reunión. \nPetición prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nÁrea 51... Allí es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aquí. Carrington fuera.\n", + /* 83*/ "¿Al Área 51? ¿Pero qué pasa con el Presidente?\n", +}; diff --git a/src/files/lang/pal-beta/destE.c b/src/files/lang/pal-beta/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/destJ.c b/src/files/lang/pal-beta/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/destP.c b/src/files/lang/pal-beta/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_f.c b/src/files/lang/pal-beta/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_g.c b/src/files/lang/pal-beta/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_i.c b/src/files/lang/pal-beta/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dest_str_s.c b/src/files/lang/pal-beta/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/dishE.c b/src/files/lang/pal-beta/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dishJ.c b/src/files/lang/pal-beta/dishJ.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dishP.c b/src/files/lang/pal-beta/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-beta/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_f.c b/src/files/lang/pal-beta/dish_str_f.c new file mode 100644 index 000000000..b4e1a6449 --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vision nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vision nocturne.\nTrouver l'interrupteur.\nRétablir la lumière.\n", + /* 10*/ "Prendre le récepteur sur la table pour commencer.\n", + /* 11*/ "Se tenir près du terminal et utiliser le récepteur.\n", + /* 12*/ "Il faut tenir le récepteur.\n", + /* 13*/ "Connexion établie...\n", + /* 14*/ "Terminal piraté avec succès.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal placée.\n", + /* 19*/ "Mine CME placée correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumières réactivées.\n", + /* 24*/ "Prendre le décodeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le décodeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le décodeur porte.\n", + /* 27*/ "Décodeur fixé. Commandes de piratage lancées...\n", + /* 28*/ "Décodage terminé. Porte déverrouillée.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR grâce au pisteur.\n", + /* 31*/ "Scanner IR localisé avec succès.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secrète grâce au scanner IR.\n", + /* 34*/ "Porte secrète localisée avec succès.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cachés pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont désactivées.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur récupéré avec succès.\n", + /* 41*/ "Grille laser 1 désactivée.\n", + /* 42*/ "Grille laser 2 désactivée.\n", + /* 43*/ "Je viens chercher l'équipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme ça on se déguise?\n", + /* 45*/ "Voilà. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur sécurisé avec succès.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'où sortez-vous?\n", + /* 50*/ "La caméra vous a repérée.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entraînement\nest terminé!\n", + /* 54*/ "Mission accomplie - Entraînement équipement terminé!\n", + /* 55*/ "Mission échouée - vous êtes repérée.\n", + /* 56*/ "Choisir le Récepteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le récepteur et relâcher le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la CamSpy et relâcher le bouton A.\n", + /* 58*/ "Choisir la Vision nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir Vision nocturne et relâcher A.\n", + /* 59*/ "Choisir le Décodeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le décodeur porte et relâcher le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner rayons X et relâcher le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le costume et relâcher le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner IR et relâcher le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le pisteur et relâcher le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir l'occulteur et relâcher le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la mine CME et relâcher le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emmène aux salles d'entraînement.\n", + /* 68*/ "Le centre d'information est derrière cette porte.\n", + /* 69*/ "Ici se trouve le labo d'équipement.\n", + /* 70*/ "Par ici se trouve la salle d'entraînement et de simulation.\n", + /* 71*/ "Par là se trouve le champ de tir.\n", + /* 72*/ "Ce couloir mène au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B près de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour relâcher une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B près de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B près d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B près de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entraînement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 terminé avec succès.\n", + /* 88*/ "Holoprogramme 4 terminé avec succès.\n", + /* 89*/ "Holoprogramme 5 terminé avec succès.\n", + /* 90*/ "Garde désarmé avec succès.\n", + /* 91*/ "Garde neutralisé avec succès.\n", + /* 92*/ "Désarmez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-clé: furtivité.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 terminé avec succès.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'éteindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'accès.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entraînement échoué - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 terminé avec succès.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de dégâts.\n", + /*111*/ "Entraînement échoué - dégâts subis.\n", + /*112*/ "Holoprogramme 6 terminé avec succès.\n", + /*113*/ "Holoprogramme 7 terminé avec succès.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B près d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous préparer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entraînement: Complet\nNote entraînement: A++\nStatut actuel: Assignée\n\n|Profil -\n\nBien entraînée mais sans expérience. Formidables réactions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score à l'entraînement. A l'origine d'un nouveau système de notation. Etant la représentation de l'agent idéal de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (Mâle)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entraînement: Complet\nNote entraînement: A+\nStatut actuel: Infiltré\n\n|Profil -\n\nNotre agent infiltré à la plus grande expérience. Très habile avec son arme de choix (Magnum). Plus qualifié pour des missions d'infiltration plutôt que pour le combat ouvert. Avant Joanna Dark, il détenait le meilleur score d'entraînement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (Mâle)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entraînement: Non disp.\nNote entraînement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de génie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les opérations depuis son bureau par lien direct. Il a un goût vestimentaire étrange.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. Déteste recevoir des ordres et perdre l'initiative. Est prête à des actes cruels pour éliminer toute concurrence. Haine conséquente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (Mâle)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est lié par une certaine amitié à Cassandra De Vries ou partage des intérêts/affaires avec cette dernière. Obéit à Cassandra, dotée une personnalité plus dominante que la sienne déjà colossale. Est la figure de proue d'opérations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle créée par la dataDyne Corp. gratifiée d'un penchant pour la lexicographie et les codes à cracker. Il est par chance doté d'une morale, et grâce à son incroyable intelligence, il a pu prédire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renforçant son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Mâle)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en déplacement sur la Terre à la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents maîtres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (Mâle)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Très grand, il porte des vêtements blancs et d'habitude un imperméable. Il semble contrôler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis à jour -\n\nUn guerrier Skedar se dissimulant derrière la projection holographique d'un homme blond d'une vingtaine d'années. Un modulateur vocal donne au Skedar une voix précise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner à merveille.\n", + /*161*/ "Le Président des Etats-Unis\n", + /*162*/ "Humain (Mâle)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Américain de bonne éducation, très intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseillé par des gens comme Trent Easton. Il pense maîtriser Trent depuis qu'il lui a refusé le Pelagic II pour la dataDyne Corp. Il ne bénéficie pas d'une grande popularité: on suppose, peut-être à tort, que la majorité politique a tout contrôle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs siècles) et ayant détecté chez les humains un certain potentiel, ils apprécient notre monde et en sont les généreux mécènes. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore à établir.\n", + /*167*/ "Guerrier Skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des siècles jusqu'au récent cessez-le-feu. Ils utilisent de colossales armures mécaniques pour se déplacer et combattre: ils sont en fait de petite taille et ressemblent à des reptiles. Etant très agressifs, la guerre est leur religion et ils y sont tous dévoués.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'années, un croiseur d'une puissance colossale fut sabordé dans l'Océan Pacifique par une race extraterrestre, les Cetans. Il était équipé d'une arme jamais utilisée: un découpleur nucléaire, pouvant en théorie briser les liens entre les molécules. Pour que les témoins croient à la destruction du vaisseau, une balise fut envoyée vers la planète mère, et ils détruisirent les sondes couvrant le système solaire dans lequel ils décidèrent de se cacher.\n\nLes Maians découvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contactés: les Maians décidèrent d'attendre qu'ils se développent.\n\nLes Maians rencontrèrent les Skedars et s'enlisèrent dans un conflit sans fin. Après des centaines d'années de guerre, ils arrivèrent finalement à une paix fragile. Les fanatiques skedar éprouvent constamment la résistance de cette paix en se livrant à des activités terroristes, mais les Maians refusent de se laisser entraîner.\n\nLes Maians se méfient des humains, conscients que de trop nombreuses crises sont survenues sur Terre à cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur présence n'entraîne d'autres conflits sur la planète. Ils ont donc décidé d'observer la race humaine jusqu'à ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des évènements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en accélérant la prise de contact entre les deux peuples. Les Maians, qui trouvèrent le plan judicieux et Carrington honnête, aidèrent ce dernier à diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouvèrent la sonde messagère provenant du croiseur Cetan. Ils envoyèrent immédiatement des éclaireurs sur Terre pour enquêter de façon brutale, kidnappant les gens et mutilant les animaux dans leur tentative de récupération du croiseur. Leur enquête les mène dans l'Océan Pacifique, où ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y accéder.\n\nIls mènent leur propre étude de la Terre et établissent une liste des sociétés qui possèdent les ressources nécessaires pour les aider à retrouver le vaisseau sabordé. En tête de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour être honnête - ce qui est vrai. En échange d'une aide pour sortir'leur' vaisseau de l'océan, ils donneront à la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacités linguistiques et de décodage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les détails. Il tente d'obtenir l'approbation du Président pour le prêt d'un bâtiment de recherche océanique à la dataDyne mais échoue. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la colère du gouvernement américain. Ils conçoivent donc un nouveau plan : remplacer le Président par un clone sous leur contrôle Cela promet à Easton et De Vries une récompense supplémentaire une fois l'opération skedar terminée.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se réjouir puisque les Skedars ont l'intention de tester le découpleur nucléaire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveuglée par la possibilité de gagner autant de pouvoir, ne pense même pas à l'éventualité de se faire doubler. Il en va de même pour Trent.\n\nMais la dataDyne crée la seule chose qui puisse prévoir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette création, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inquiétudes quant à cette mission, De Vries ordonne que l'on modifie sa personnalité. En d'autres termes, la création pense trop. Désespérée, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant à s'échapper d'un complexe scientifique de haute sécurité, situé sous l'immeuble de la dataDyne. Elle est surprise de découvrir que le Dr. Caroll est en fait une IA créée par la dataDyne mais poursuit néanmoins sa mission de sauvetage. L'alarme donnée, Joanna doit se frayer un chemin jusqu'à l'héliport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn réponse à cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation réclame en échange le retour de leur IA, leur 'propriété'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, où Carrington discutait avec elle des plans de la dataDyne. Joanna délivre Daniel, mais ne peut empêcher la dataDyne de récupérer le Dr. Caroll. L'IA en a cependant assez dit à Carrington pour que celui-ci convoque sur Terre un groupe de spécialistes maians.\n\nJoanna est envoyée à Chicago pour espionner les conspirateurs dans l'immeuble du G5, une façade de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'étrange homme d'origine nordique qui semble tout contrôler. Une fois le plan concernant le Président révélé par Trent, Joanna rapporte la situation, mais découvre qu'il y a quelque chose de plus urgent à accomplir en premier lieu.\n\nLes spécialistes ont été interceptés par les conspirateurs. Les survivants du crash et l'épave ont été transportés dans le Secteur 51, dans le Nevada. Joanna est larguée dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'éventuels survivants et de retrouver leur équipement. Lorsqu'elle pénètre dans le labo, Joanna découvre le secret de l'Institut : ses alliés sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il était garde du corps de l'ambassadeur qui était à la tête de l'équipe de spécialistes.\n\nAprès avoir aidé les survivants de la délégation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Président. Elle se fait passer pour un membre de l'entourage du Président pour accéder à la base aérienne où Air Force One est stationné. Elle réussit ensuite à se cacher à bord de l'avion. Une fois en vol, Trent et les Skedars occultés se manifestent, mais Joanna est là pour les arrêter. Elle escorte le Président jusqu'à la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion à la recherche du Président. Ils désirent entraîner ce dernier à bord de l'OVNI skedar, arrimé à AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas à la détruire. Elle appelle Elvis à la rescousse et celui-ci décide de s'écraser sur Air Force One. La capsule de sauvetage est éjectée et les trois appareils s'écrasent dans le désert glacé de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aperçoit que sa communication est brouillée par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Président et Elvis. Elle rencontre des escouades de Skedars occultés qui recherchent le Président, Elvis, elle-même et certaines possessions du Président. Elle suit un groupe jusqu'au vaisseau skedar abattu, où elle découvre un clone du Président. Elle le détruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedar ont été déjoués une fois de plus, le Président est sauf et Trent est exécuté de façon atroce par les Skedars pour son incompétence.\n\nAu mépris de toute prudence, la dataDyne et les Skedar s'emparent du Pelagic II - le bâtiment d'études océaniques du gouvernement - et se dirigent vers le lieu où se trouve le vaisseau cetan. Joanna et Elvis s'introduisent à bord du bateau pour y semer le désordre et découvrir quel est le grand projet. Après avoir saboté les opérations de plongée et rappelé le sous-marin, ils plongent vers les profondeurs de l'océan, où ils aperçoivent le croiseur cetan pour la première fois. Ils pénètrent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Après avoir combattu les Skedars et évité les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. Là, ils découvrent l'IA qui était le Dr. Caroll. Une fois sa personnalitérestaurée, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de détruire une bonne fois pour toutes.\n\nDe retour à l'Institut Carrington, Joanna est sur le point de partir à un cocktail présidentiel à la Maison Blanche lorsque l'enfer se déchaîne. Les survivants de l'équipe d'assaut skedar libèrent leur vengeance sur les responsables de leur échec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employés vers les hangars, tandis que les Skedars attaquent différentes parties du bâtiment. Tandis que la majorité des employés quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se réveille dans une pièce à bord du croiseur Skedar avec Cassandra comme compagnon de cellule. Cette dernière se sacrifie pour permettre à Joanna de s'échapper. Elle parvient à abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau capturé se place en orbite autour de la planète où se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais réussi à trouver cet endroit, le saint des saints des Skedars. Si l'Autel était détruit, cela anéantirait le moral des Skedars et une véritable paix pourrait être instaurée à la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedar, le Grand Prêtre de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un répit dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coincée sous des gravats et retenue par un Skedar accroché à sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux héros quittent ensuite la planète.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commencé dans la programmation d'IA Lorsqu'il devint évident que la plupart de leurs revenus provenaient de leur travail pour l'armée américaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit à traiter avec des fabricants d'armes et à ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Après le rachat par dataDyne de la troisième corporation d'armement, les bénéfices devinrent astronomiques. Dans le mois qui suivit la réception d'un contrat gouvernemental d'armement, Cassandra De Vries fut nommée PDG une part importante des bénéfices furent injectés dans la recherche sur les IA, avec d'excellents résultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Brièvement considéré comme un inventeur cinglé, Daniel Carrington fut le premier à diffuser la technologie anti-gravité dans le monde. Les revenus générés par cette nouvelle technologie et ses dérivés l'ont aidé à créer l'Institut Carrington, un réservoir des connaissances technologiques situé dans une partie reculée des USA. Mais l'Institut est également une base d'entraînement pour ses agents, qui sont envoyés à travers le monde pour suivre les développements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule caméra contrôlable à distance, parfaite pour l'exploration furtive. Elle est équipée pour l'holographie spectroscopique. Elle peut ouvrir les portes en projetant une zone de chaleur de forme humaine.\n\nInstructions d'entraînement\n- Prenez un hologramme du terminal informatique dans la salle Info voisine.\n\nManipulation\n- Appuyez sur le Bouton Z pour prendre un hologramme. Appuyez sur le Bouton B pour ouvrir n'importe quelle porte. Maintenez le Bouton R appuyé pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumière ambiante pour fournir une image de la zone. Révèle également les formes de vie. L'utilisation avec une luminosité normale entraîne des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entraînement\n- Déplacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumière.\n\n Manipulation\n- Sélectionnez la Vision nocturne dans votre inventaire pour l'activer. Sélectionnez-là à nouveau pour la désactiver.\n", + /*179*/ "Description\n\n- Appareil autonome de décodage. S'attache au panneau de contrôle et passe en revue les différentes combinaisons jusqu'à l'ouverture.\n\n Instructions d'entraînement\n- Trouvez le panneau à côté de la porte et utilisez le décodeur pour la déverrouiller.\n\nManipulation\n- Tenez-vous près de la porte et appuyez sur le Bouton tout en tenant le décodeur.\n", + /*180*/ "Description\n\n- Utilisé pour voir à travers les murs et les objets solides. Peut voir des choses que la Vision nocturne et les lunettes IR ne peuvent détecter.\n\n Instructions d'entraînement\n- Le scanner allumé, recherchez les deux interrupteurs cachés et activez-les pour éteindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir à nouveau pour le désactiver.\n", + /*181*/ "Description\n\n- Endormez les soupçons en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous démasquer.\n\n Instructions d'entraînement\n- Grimshaw possède un occulteur qui attend d'être utilisé. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOpération\n- Sélectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut être utilisé dans le noir. Révèle également des anomalies telles que portes secrètes et les pans de mur peu solides.\n\n Instructions d'entraînement\n- Allumez le scanner IR, trouvez la porte cachée et ouvrez-la.\n\nManipulation\n- Sélectionnez le scanner IR dans votre inventaire pour l'activer. Sélectionnez-le à nouveau pour le désactiver.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'équipement.\n\n Instructions d'entraînement\n- Activez le Pisteur et suivez l'écho radar pour retrouver l'objet.\n\nOperation\n- Sélectionnez le Pisteur dans votre inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*184*/ "Description\n- Crée une disruption du spectre lumineux autour du porteur, ce qui entraîne un effet caméléon presque parfait. L'effet est annulé lorsque le porteur fait feu.\n\n Instructions d'entraînement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- Sélectionnez l'occulteur dans l'inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications électroniques. Doit être placé sur l'appareil pour être efficace.\n\n Instructions d'entraînement\n- Jetez la mine CME sur le voyant lumineux au-delà de la porte secrète.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfoncé et ajustez votre visée avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des données ou ouvrir les serrures électroniques à distance.\n\n Instructions d'entraînement\n- Utilisez le Récepteur pour pirater le terminal dans le coin, pour déverrouiller une porte secrète.\n\nManipulation\n- Tenez-vous à côté du terminal et appuyez sur le Bouton B lorsque vous avez le Récepteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Relâchez le Bouton Z quand vous êtes à court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfoncé pour le mode visée.\n", + /*191*/ "Utilisez le Stick analogique pour déplacer le curseur de visée.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfoncé pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfoncé pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'opérations\n", + /*197*/ "Tour Lucerne\0|QG suprême\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|Résidence côtière privée\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Façade commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Près du lac Groom Dry, Nevada\n", + /*203*/ "Base aérienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion présidentiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Bâtiment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La planète de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Appareil de troupe mobile\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravité\n", + /*212*/ "Hoverbike\0|Véhicule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|Hélico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Droïde de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot aérien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le bâtiment de l'Institut comprend de nombreuses zones différentes: bureaux et laboratoires, ateliers et hangars. Il est isolé du monde extérieur ce qui aide à garder le secret des différentes opérations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'austère bâtiment de la dataDyne Corporation, se détache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cachés et sous haute surveillance, sont la clé de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propriété de l'Institut, cette résidence retirée est le refuge de Daniel Carrington pour échapper au stress de l'Institut. La résidence, équipée d'un générateur, sert d'observatoire et possède une cave à vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, fermé à la circulation terrestre. C'est ici que la Corporation G5 possède son QG.\n", + /*224*/ "A l'intérieur de l'immeuble du G5, il existe une salle de réunion protégée par des dispositifs anti-mouchards. C'est le lieu le plus sûr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour hélicos et les tours de communications donnent une idée de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases aériennes renforcées, servant de points de ravitaillement pour Air Force One. Ces bases sont isolées et se trouvent dans des régions inhospitalières, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimisé pour les climats froids, plutôt utile lorsqu'il est basé au nord de l'Alaska. Le vol est à destination d'Oslo, Norvège.\n", + /*228*/ "Dans le paysage rocheux et enneigé du cercle polaire arctique repose l'épave de l'avion abattu.\n", + /*229*/ "Propriété du gouvernement des USA, le Pelagic II a été conçu pour les missions de plongée dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul bâtiment au monde à pouvoir étudier les grands fonds océaniques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'océan depuis des millions d'années.\n", + /*231*/ "Un vaisseau d'assaut interplanétaire qui transporte les guerriers Skedar vers les zones de conflit. Fait partie de la très diminuée flotte Skedar.\n", + /*232*/ "Une planète aride, secouée par des tremblements de terre, des tempêtes de sable et des tornades. Fait partie d'un système solaire complexe à trois soleils.\n", + /*233*/ "Un véhicule de transport d'agents. Petit, rapide et très maniable, il a été conçu pour une utilisation urbaine. Peut être contrôlé par ordinateur ou piloté à distance. Il peut transporter trois à quatre agents, plus leur équipment.\n", + /*234*/ "Un appareil antigrav conçu pour aider les manutentionnaires qui se fixe à une caisse. Lorsqu'il est activé, le champ antigrav soulève la caisse en réduisant son inertie.\n", + /*235*/ "Moto de patrouille à basse altitude. Utilise une petite unité AG pour flotter, ainsi qu'une petite -mais puissante- turbine à poussée vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent accès à toutes les zones d'un bâtiment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'accès malgré lui à certaines zones importantes.\n", + /*237*/ "Véhicule de patrouille et d'élimination. Equipage de deux hommes, armé d'un canon Vulcain à l'avant, et d'un lance-missiles sur chaque aile. Peut être descendu avec un feu nourri, ou mieux, avec une roquette bien placée.\n", + /*238*/ "Robot de combat urbain. Utilise une unité antigrav pour flotter. Lourdement protégé et armé. Utilisé pour éloigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unité AG beaucoup plus puissantes. Peut atteindre Mach 2 sans problème et peut avancer au pas pendant des heures. En dépit de son armement, ce véhicule compte plus sur sa maniabilité que sur ses boucliers.\n", + /*240*/ "Conçu pour un seul pilote Maian. Un passager se sentirait à l'étroit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers Skedar en armure et armés jusqu'aux dents. Indétectable par des radars conventionnels. Il peut émettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les équipements de détection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque détail autour de lui.\n\n Instructions d'entraînement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfoncé le Bouton R pour passer en mode visée et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n\n Instructions d'entraînement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas à gauche- Bouton C gauche\n- Pas à droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir peut permettre d'accéder à de nouvelles zones.\n\n Instructions d'entraînement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez enfoncé le Bouton R et appuyez sur le Bouton C bas.\n- S'accroupir- Lorsque vous êtes baissé, Maintenez enfoncé le Bouton R et appuyez sur le Bouton C bas.\n- Se relever- Appuyez brièvement sur le Bouton R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps-à-corps peut s'avérer difficile.\n\n Instructions d'entraînement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- Désarmer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entraînement\n- Assommez/désarmez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Désarmer - Maintenez le Bouton B enfoncé, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derrière.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires à mains nues.\n\n Instructions d'entraînement\n- Battez tous les ennemis désarmés sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, armés ou non.\n\n Instructions d'entraînement\n- Battez tous les ennemis armés sans vous faire toucher.\n\n", + /*249*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode visée.\n", + /*250*/ "Pensez à l'endroit où vous souhaitez aller avant de commencer le test. Placez-vous à un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est nécessaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire, et soyez prêt à reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme dérobée avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode Visée.\n", + /*257*/ "Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est réellement nécessaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire et soyez prêt à reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproché juste le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez à ce que l'objet ciblé soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*265*/ "La CamSpy peut être difficile à contrôler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*269*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*271*/ "Un costume n'est pas seulement le vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez à ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la repérer : alors soyez prudent en entrant dans une zone déserte. Souvenez-vous que la CamSpy reste là où vous l'avez laissée jusqu'à ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et réagissez avant l'ennemi.\n", + /*277*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*279*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*281*/ " Un costume n'est pas seulement un vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue nécessité et si vous êtes sûr du résultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing très précise. Par conséquent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile à distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a été ajoutée à l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile à distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les opérations furtives, conçue pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre précision pour vous assurer de ne jamais gâcher votre chance.\n", + /*286*/ "Le Magsec 4 privilégie la puissance de feu au détriment de la précision, particulièrement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut être concentrée en un tir dévastateur. La quantité importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet très versatile possède deux types de munitions: standard ou explosives. Les ingénieurs maians ont réussi cette prouesse sans sacrifier la consommation d'énergie, bien que la cadence de tir soit réduite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'avérer utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours à la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particulières que l'arme. Elles sont conçues pour se fragmenter à l'intérieur de la cible et l'éliminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux dernières années, et ceci grâce à son mode secondaire. Le système d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation complète de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a été conçu pour ne PAS être précis, mais c'est une excellente distraction à l'entraînement. Sa cadence de tir est cependant extrêmement élevée, faisant de cette arme un atout dévastateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilité de conception Maian. Son mode secondaire est intéressant: un projectile à haute vélocité qui peut pénétrer n'importe quoi. Pour éviter d'endommager le canon ou le mécanisme de mise à feu, la cadence de tir - tout comme pour le Phoenix - est réduite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile minéral spécial qui, couplé à une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent être utilisées pour alimenter un prototype d'occulteur. L'entraînement a été modifié pour mettre en valeur cette caractéristique particulière.\n", + /*295*/ "Non seulement cette arme peut être pliée pour ressembler à un PC portable, mais elle peut en plus être transformée en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou protéger une zone.\n", + /*296*/ "C'est le modèle que la dataDyne a réussi à vendre à l'armée américaine, bien qu'elle ne soit pas encore largement répandue. Conçue dans l'esprit de la dataDyne pour faire de mauvaises surprises, le modèle de base est pourvu d'une mine de proximité sous le canon. Vous devez vous débarrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble être un 'détecteur de danger' repérant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour créer une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutôt pour le tir de précision.\n", + /*299*/ "La version lourde du Dragon. La mine a été remplacée par un petit lance-grenades. Il a été adopté par l'armée américaine comme arme de soutien d'escouade. Entraînez-vous à utiliser le lance-grenades.\n", + /*300*/ "La subtilité n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil à pompe, mais méfiez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom à fort grossissement. Seul le tireur peut influer sur la précision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre visée.\n", + /*302*/ "Bien que la technologie employée pour élaborer ce fusil soit au-delà de notre compréhension, nous pouvons toujours apprécier les effets du FarSight. Le tir est presque impossible à arrêter et la lunette peut inspecter à travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbalète est un tir de projectile soporifique, le second un tir de poison mortel à effet immédiat. C'est avant tout une arme pour les missions demandant une grande discrétion. Recharger cette arme prend du temps, attention donc à son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hôpitaux à travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de sédatif.\n", + /*305*/ "Essayez de maîtriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a été conçue pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre visée. Si un ennemi réussit à passer à travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie intéressante. Le mode secondaire active un champ magnétique autour d'une grenade, lui permettant d'adhérer à une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et réutilisable, qui se recharge après chaque tir. Le mode secondaire utilise une variante limitée du système de verrouillage de cible du CMP150, avec la possibilité de verrouiller une seule cible. Le missile se déplace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guidés par l'utilisateur. Les Skedars éprouvent une satisfaction perverse lorsque la caméra située dans la tête du missile se rapproche de la cible. Le missile guidé accélère automatiquement mais peut être ralenti pour plus de maniabilité. L'explosion se produit au contact ou lorsque la détente est pressée.\n", + /*309*/ "Un couteau de combat bien trempé, également équilibré pour le lancer. La pratique est essentielle pour s'habituer à la portée et à la trajectoire de la lame.\n", + /*310*/ "Le département des armes expérimentales a développé ce laser de poignet avec deux rayons différents. Le premier mode envoie une salve à une distance considérable, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle possède un détonateur réglé sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximité à effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est détectée.\n", + /*312*/ "Cette grenade Maian sème le chaos dans l'esprit des créatures soumises à son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous lâcherez ce que vous tenez. La grenade peut être réglée pour exploser à l'impact ou déclenchée par détecteur de proximité. Prenez garde à la lancer assez loin.\n", + /*313*/ "L'utilisation des mines à retardement nécessite jugement et calcul. La cible peut dépasser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un détecteur de danger identique à celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacité des mines de proximité est de savoir les placer là où votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truffée de mines, utilisez le détecteur de danger pour les repérer. Cela vous fera peut-être perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La dernière génération de mines contrôlées à distance, identiques aux modèles plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat réel 1\n", + /*322*/ "Holo 7 - Combat réel 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_g.c b/src/files/lang/pal-beta/dish_str_g.c new file mode 100644 index 000000000..b978fb509 --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Gerät vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Gerät vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie müssen das Gerät bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu groß.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tür-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tür zu entriegeln.\n", + /* 26*/ "Sie müssen den Tür-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen. Tür wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tür mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tür wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Röntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "Täuschen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrüstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So täuschen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie müssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Geräte-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "Wählen Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "Wählen Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "Wählen Sie das Nachtsicht-Gerät aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Gerät und lassen Sie den A-Knopf los.\n", + /* 59*/ "Wählen Sie den Tür-Decoder aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tür-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "Wählen Sie den Röntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "Wählen Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "Wählen Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "Wählen Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "Wählen Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "Wählen Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schön, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch führe Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tür.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schießstand, Jo.\n", + /* 72*/ "Dieser Korridor führt zum Hangar.\n", + /* 73*/ "HOVERCRATE\nStellen Sie sich neben das Hovercrate und drücken Sie den B-Knopf.\n", + /* 74*/ "Lassen Sie den B-Knopf los, um das Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE\nDrücken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drücken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ÖFFEN VON TÜREN\nDrücken Sie den B-Knopf, um eine Tür zu öffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs können auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZÜGE\nDrücken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "Während des Trainings können Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN\n- Drücken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN\n- Drücken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlüssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrückt, und drücken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrückt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Betätigen Sie alle Schalter.\n", + /* 99*/ "Betätigen Sie alle Schalter an der Wand.\n- Sie müssen schnell sein, da sie rasch zurückspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfüllt - Sie müssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drücken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschließend ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfüllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drücken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den Wänden.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, Ich lasse Sie allein, damit Sie sich vorbereiten können.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkörperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (männlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt für Undercover- Missionen, weniger geeignet für Kampfeinsätze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (männlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Gründer des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Büro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Süchtig nach Macht; möchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, äußerst skrupellose Aktion durchzuführen, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenüber Daniel Carrington keine Skrupel, den sie verabscheut.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (männlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu CassandraDe Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht.Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persönlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte künstliche Intelligenz mit einer Vorliebe für Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner überragenden Intelligenz die Pläne von dataDyne erahnen. Seine Stimme ist äußerst präzise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (männlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (männlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr groß, trägt weiße Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwörung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den späten Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine präzise, intelligente Stimme. Dieses Gerät ist übrigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Präsident\n", + /*162*/ "Menschlich (männlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der ständig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, wäre allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine außerirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenüber sind sie wohlgesonnen, und erkennen großes Potential in der Erdbevölkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer kämpfen. Erst kürzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangenähnlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges außerirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Molekülen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, dasSchiff wäre zerstört worden, wurde ein Satellit in das Heimatsystem derCetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschließen aber, die für sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommtzu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen ständig, diesen Frieden durch terroristische Aktionen zu stören. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen 'äußeren Einflüssen' immer mehr Krisenherde auf der Erde entstehen. Sie befürchten, dass noch mehr Unruhe entstehen könnte, wenn sie ihre Existenz offenbaren würden. Daher beschließen sie, den Planeten weiter zu beobachten, bis die Menschen ein höheres Entwicklungsstadiumerreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein könnte. Das Resultat wäre eine schnellere Annäherung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzuführen.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entführung von Menschen und die Verstümmelung von Tieren gehören. Ihre Untersuchungs- ergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die über die nötigen Ressourcen verfügen, um ihnen bei der Bergung behilflich zu sein. An der Spitzedieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstandder Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhört, um wahr zu sein - und genauso istes auch. Als Dank für die Bergungsarbeiten versprechen die Skedar, dasssie dataDyne mit genügend Technologien versorgen, um die Firma zum mächtigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss,ist eine künstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu können. Keine leichte Aufgabe,aber durchaus im Bereich des Möglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, undinformiert ihn über alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Präsident verweigertseine Zusage. Es gibt keine Möglichkeit das Schiff zu stehlen, ohne dassdie Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wirdein Plan ausgeheckt, demzufolge der Präsident durch einen Klon ersetzt werden soll. Auf diese Weise wäre die Kontrolle in den Händen von Easton und De Vries. Außerdem würden dadurch noch einige Extra-Vergünstigungen für die Verschwörer herausspringen, nachdem die Operation der Skedar erstdurchgeführt worden ist.\n\nAllerdings hätten die beiden nicht viel Zeit, sich mit ihrem Triumpf zubrüsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durchihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen könnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, dieseGefahr zu erkennen: Der Sapient, die künstliche Intelligenz, die dafürvorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu äußern, veranlasst Cassandra De Vries,dass dem Sapienten seine Persönlichkeit entzogen werden soll. In einem Aktder Verzweiflung tritt die Maschinen mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einenWissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Gebäude zu befreien. Ihr Erstaunen ist groß, als sie erkennt, dass es sichbei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Missionfort, und bringt ihn/es in Sicherheit. Während der Mission wird der Alarmausgelöst, und Joanna muss sich bis ins oberste Stockwerk vorkämpfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. ZweiTage später wird er in seiner eigenen Villa als Geisel genommen. Verlangtwird die Aushändigung der KI im Austausch für Daniel Carringtons Leben.Was dataDyne nicht weiß, ist die Tatsache, dass sich die KI bereits in derVilla befindet. Carrington wollte im Gespräch mit Dr. Caroll mehr über dievon dataDyne geplanten Aktivitäten erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die Hände des Konzers fällt.Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwörerim G5-Building zu spionieren. Sie erfährt, dass Trent Easton, der Chef derNSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamerskandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist.Nachdem von Trent erörtert worden ist, wie er gegen den Präsidenten vor-gehen möchte, sendet Jo einen Hilferuf an das Institut. Allerdings erfährtsie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwörern abgefangen. Die Über-lebenden des Absturzes sowie die Trümmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderenAgenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle Über-lebenden und deren Ausrüstung in Sicherheit bringen. Nachdem es Joannagelingt, ins medizinische Labor einzudringen, lüftet sie das größte Geheimnis des Carrington Instituts: Bei den Verbündeten handelt es sich umMaianer. Aliens, die als ‚die Grauen' bekannt sind. Der Außerirdische, densie retten kann, wird Elvis genannt. Er war ein Bodyguard des MaianischenBotschafters, der das Spezialistenteam anführen sollte.\n\nNachdem es Joanna gelungen ist, den einzigen Überlebenden der MaianischenDelegation zu retten, wendet sie sich wieder dem Präsidenten und seinerBedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um inBasis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihrauch, an Bord zu gelangen. Während des Flugs treten Trent und der getarnteSkedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten.Während Trents Leute das Flugzeug nach dem Präsidenten absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan wäre gewesen, den glücklosen Politiker an Bord eines Skedar UFO zu bringen,das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterungzu beschädigen, sie schafft es aber nicht, sie zu zerstören. Die Agentinverständigt Elvis, der einen Kamikaze-Angriff auf das UFO durchführt.Alle drei Vehikel stürzen über Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre Übertragung durch ein Störsignal der Skedar unter-brochen wird. Sie macht sich auf, um Elvis und den Präsidenten zu finden.Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klondes Präsidenten findet. Joanna Dark zerstört den Klon, deaktiviert dasStörsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machen-schaften der Skedar vereitelt, der Präsident wurde gerettet, und Trentwird von den Skedar für seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen.Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich aufden Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvisunterbrechen die Aktion und finden heraus, worum es ihren Gegnerneigentlich geht. Anschließend gelangen sie mit einem Tauchboot zum Grunddes Meeres und sehen zum ersten Mal das außerirdische Schlachtschiff. DasTeam betritt das Schiff durch den Eingang, der von den Skedar erschaffenwurde und treffen auf einen leblosen Skedar. Offenbar scheint außer ihnennoch jemand an Bord zu sein. Nach zahllosen Kämpfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommendie KI, die einst Dr. Caroll war. Nachdem seine Persönlichkeit wieder hergestellt wurde, drängt er Joanna und Elvis, das Schiff zu verlassen, daer es endgültig zerstören möchte.\n\nZurück im Carrington Institut bereitet sich Joanna für einen Empfang imWeißen Haus vor, als sich die Ereignisse plötzlich überstürzen. Die überlebenden Skedar richten ihren Zorn nun gegen jene Personen, die siefür das Scheitern ihrer Mission verantwortlich machen. Joanna durchkämmtdas Institut, um so viele Angestellte wie möglich zu retten. Währenddessenattackieren die Skedar alle Teile des Gebäudes. Der Mehrheit der anwesen-Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zellean Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch,ein Ablenkungsmanöver zu starten, um Joanna die Flucht zu ermöglichen. Jogelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigenFreunden, und eine fulminante ‚Party' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit über dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemalsgelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schreinzerstört, wäre dies auch ein harter Schlage gegen die Moral der Skedar.Auf diese Weise könnte ein anhaltender Frieden, anstatt eines unsicherenWaffenstillstands erzielt werden. Jo macht sich auf die Suche nach demAnführer der Skedar, während Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trümmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen, Glücklicher-weise ist sie am Leben, begraben unter Schutt und Asche. Allerdings hält noch ein Skedar ihren Fuß umklammert. Elvis gibt ihr eine Waffe, umdieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstört, die Verschwörung wurde gestoppt, und bei können ruhigen Gewissens in den Orbit zurückkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer für künstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Militär bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Geschäfte mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezüglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Höhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugeführt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einkünfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsstätte für Agenten, die in alle Länder der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese Überwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera für verdeckte Untersuchungen. Ausgerüstet für spektroskopische Holografie. Öffnet Türen durch Projektion von Körperwärme.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drücken Sie den Z-Trigger um zu holografieren. Durch Drücken des B-Knopfs werden Türen geöffnet. Drücken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verstärkt Licht, um die Umgebung besser wahrnehmen zu können. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung überlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und betätigen Sie ihn.\n\nBedienung\n- Wählen Sie das Nachtsichtgerät aus Ihrem Inventar. Wählen Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geöffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tür ein, um sie zu öffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drücken Sie den B-Knopf, nachdem Sie den Decoder ausgewählt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtgerät und die IR-Brillen nicht erfassen können.\n\nTraining\n- Suchen Sie mit dem Röntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' müsste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, wählen Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Türen und brüchige Wände.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tür und öffnen Sie sie.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- Wählen Sie den Tracker aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Träger. Erschafft einen chamäleonähnlichen Effekt. Das Feld bricht zusammen, wenn der Träger eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu überraschen!\n\nBedienung\n- Wählen Sie die Tarnkappe aus Ihrem Inventar. Wählen Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein ständig wechselndes Signal, um jegliche elektronische Kommunikation zu stören. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tür.\n\nBedienung\n- Drücken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrückt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlösser knacken können.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tür zu öffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drücken Sie den B-Knopf, nachdem Sie den Uplink ausgewählt haben.\n", + /*187*/ "SCHIESSEN\n Drücken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drücken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrückt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrückt, um automatisch zu feuern.\n", + /*193*/ "ZIELHÖHE\n Drücken Sie die C-Knöpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrückt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drücken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Stützpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Präsidenten\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Spezialisiertes Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Die größte außerirdische Struktur auf der Erde\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff für Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Späh- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Gebäude beinhaltet viele verschiedene Bereiche: Büros und Laboratorien, Workshops und Hangars. Da es von der Außenwelt relativ isoliert ist, können die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Geschäftsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Größe von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlüssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfügt die Villa einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Geräte geschützt wird. Dies ist für dataDyne der sicherste Ort, um vertrauliche Pläne zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffenstützpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstürme lassen Rückschlüsse auf die Größe des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschützt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde für kalte Klimata optimiert. Sehr nützlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzuführen. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstürmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manövrierbares Fluggerät. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz für bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Unterstützung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Trägheit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Gerät ein, um zu schweben. Der Antrieb erfolgt über zwei starke Turbinen.\n", + /*236*/ "Hält alles rein und sauber. Hat Zugang zu allen Bereichen eines Gebäudes. Es wird geraten, diese Roboter nicht zu beschädigen, da sie teilweise für einen alternativen Zugang zu stark bewachten Räumen ermöglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter für urbane Einsätze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene Gäste fernzuhalten. Frei nach dem Motto: Zuerst schießen, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfügt über stärkere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manövrierbarkeit.\n", + /*240*/ "Designed für einen Maianischen Piloten. Ein Passagier würde sich sehr eingeengt fühlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerüstete Skedar transportieren. Unsichtbar für konventionelles Radar. Sendet starke Störsignale über eine weite Entfernung aus, um Kommunikation und Erfassung unmöglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drücken Sie den C-Knopf unten\n-nach unten schauen - Drücken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrückt und verändern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n\nTraining\n- Betätigen Sie alle Schalter. Sie müssen schnell sein, da sich die Schalter rasch zurücksetzen.\n\nBedienung\n- Sidestep links - Drücken Sie den C-Knopf links.\n- Sidestep rechts - Drücken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken können Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und betätigen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrückt und drücken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrückt.\n- Aufstehen - R-Taste drücken.\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drücken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schläge zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrückt und drücken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "Überlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen müssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*253*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*260*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Nützlich im Kampf, aber achten Sie auf Überladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, setzen Sie daher dieses Gerät nur im Bedarfsfall ein.\n", + /*271*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er könnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, das der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Nützlich im Kampf, aber achten Sie auf Überladung. Versuchen Sie, die Situation abzuschätzen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, daher setzen Sie dieses Gerät nur im Bedarfsfall ein.\n", + /*281*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %%ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekundär-Funktion ist ein Knaufhieb und somit am Schießstand nutzlos.\n", + /*284*/ "Zur Erhöhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekundär-Funktion am Schießstand leider nutzlos.\n", + /*285*/ "Die schallgedämpfte Version der Falcon 2 eignet sich hervorragend dazu, gegenüber Ihren Gegnern den Überraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die Magsec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schuß Sekundär-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, können Sie den Schuß um ein Vielfaches verstärken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlüssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als nützlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt für die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stücke.\n", + /*291*/ "Ein verlässliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekundär- Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel Ärger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafür designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilität und verfügt über eine interessante Sekundär-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natürlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem großen Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln können auch als Energielieferant für die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekundär-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Militär eingeführt. In Überein-stimmung mit dataDynes Tendenz, den Leuten böse Überraschungen zu bereiten, wurde dem Basismodell eine Annäherungs-Mine eingebaut. Wird der Sekundär-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen können, verfügt die Waffe als Sekundär-Funktion über einen Sensor, der mögliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfügt das Magazin über ein nur kleines Fassungsvermögen. \n", + /*298*/ "Der erste Versuch des Instituts, eine unterstützende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekundär-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Annäherungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Militär hat diese Waffe klarerweise großen Anklang gefunden. Gewöhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilität zählt hier nicht. Zwei Modi stehen zur Verfügung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ groß, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallgedämpftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern könnte, ist der Schütze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu können.\n", + /*302*/ "Obwohl die Technologie schon etwas überholt ist, schätzen wir noch immer die Fähigkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch Wände.\n", + /*303*/ "Die Primär-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekundär-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Betäubungsgewehr findet in seinen Grundzügen in vielen medizinischen Labors und Krankenhäusern Verwendung. Die Dosis des Betäubungsmittels kann, bei kurzen Distanzen, erhöht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht für einen menschlichen Schützen konzipiert. Wenn Sie in die Knie gehen, können Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerstößen vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekundär-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an Wänden er-möglicht wird. Nach einiger Zeit fällt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. Lädt nach jedem Schuss selbst nach. Die Sekundär-Funktion ermöglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schüsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flüchtende Ziel durch eine Kamera beobachten können. Ein Agent des Carrington Instituts findet dafür natürlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslöser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. Übung ist unumgänglich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfügbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich stärkerer Kurzstrecken-Laser verfügbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Annäherungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren Händen befindet. Die Detonation erfolgt bei Kontakt oder bei Annäherung.\n", + /*313*/ "Um Zeitzünder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls könnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre Fähigkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekundär-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlüssel zur erfolgreichen Platzierung von Annäherungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekundär-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter überlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezündeter Minen, die aber auf dem üblichen Prinzip aufbaut. Die Primär-Funktion platziert die Mine, die Sekundär-Funktion lässt sie detonieren. Können Sie die Mine nicht sehen, müssen Sie sich auf Ihr Gefühl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_i.c b/src/files/lang/pal-beta/dish_str_i.c new file mode 100644 index 000000000..91487fb0b --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale è stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM piazzata correttamente.\n", + /* 19*/ "Mina ECM in posizione errata.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta è stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi farò fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurrò al reparto addestramento.\n", + /* 68*/ "Il centro informazioni è oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo è il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITÀ\nPremi B vicino all'Antigravità per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiverà anche qualsiasi strumento lì vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIÙ\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia è stata disarmata.\n", + /* 91*/ "La guardia è stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilità!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento corpo a corpo: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI n°027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI n°009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto più capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio più alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI n°000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. È senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, è legato a Cassandra De Vries da una strana amicizia, che sembra più che altro un'alleanza d'interesse. Tende a fare tutto ciò che dice Cassandra, forse perché, pur avendo una forte personalità, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilità linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di proprietà di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. È il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis è un terrafilo: per lui il mondo terrestre è incredibilmente affascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. È un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma è attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ " I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra è Daniel Carrington, però manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poiché non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabissò nell' Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinché possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realtà questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arrivò ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanità continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall' avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e così decisero di continuare pazientemente le loro osservazioni finché gli umani non si fossero dimostrati più 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contattò una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la più grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilità linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries riferì i dettagli del piano a Trent Easton, direttore dell'NSA, che cercò invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. Né gli Skedar né la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben più sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e né Cassandra né Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivelò le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordinò di manipolargli il cervello togliendogli così la personalità. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adottò lo pseudomino di Dr. Caroll e contattò il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark è incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'proprietà'. A loro insaputa l'automa si trova già nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell' istituto, ma non può impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna è inviata a Chicago per spiare una riunione di cospiratori nell' edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, è coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito più urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna può tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna è lì per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocità. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Così si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente è salvo, gli Skedar hanno fallito e ora Trent dovrà pagare cara la sua incompetenza.\n\nMa non è finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affondò la nave Cetan. Joanna e Elvis devono intralciare l'attività a bordo e così scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalità, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell' istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sarà necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poiché i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Così Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. È viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar è giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi è la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries iniziò a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fondò il Carrington Institute, una fucina tecnologica situata in una sperduta località degli USA. L'istituto è anche il campo di addestramento per la formazione di agenti la cui missione è girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualit~a della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finché non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. È più potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Può essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede, che possono così scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai più munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalità Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalità Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle città\n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerca sul fondo oceanico\n", + /*207*/ "Astronave Cetan\0|Segno della presenza aliena sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravità\0|Dispositivo antigravità\n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5 Robot\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. È piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di proprietà dell'istituto, questa residenza appartata è usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osserva- torio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo è il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One è particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo è Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di proprietà del governo USA, il Pelagic II può condurre operazioni subacquee in alto mare in ogni condizione climatica. È l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Può essere comandata dal computer o pilotata a distanza. Può trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravità usato dai magazzinieri. È applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unità antigrevità, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perché possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Può essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unità antigravità per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina più potenti; può facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocità ridotta. Anche se ben armato il suo punto forte è la manovrablità.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Può portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Può trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ciò che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare giù: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e mitragliando a bassa quota potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perché si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nInformazione di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare corpo a corpo contro più avversari può essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z più volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare corpo a corpo contro più nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro più nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilità di lotta corpo a corpo, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*257*/ " Schivando e mitragliando a bassa quota potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*259*/ " Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ " Quando sei sicuro delle tue abilità di lotta corpo a corpo va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*265*/ "La TeleSpia può essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma può causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c'è nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ " Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*275*/ "La TeleSpia non è invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarrà nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma può causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ " Usa i dispositivi mimetici quando non c'è nessuno che possa vederti. Evita di sparare se non strettamente necessario finché non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ " La Falcon 2 è una pistola molto precisa: qualsiasi errori dipende da te. La modalità secondaria è la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa è dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalità secondaria è inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore è eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 è dotata di un'eccezionale potenza di sparo ma non è troppo precisa, soprattuto se usata nella modalità secondaria a tre esplosioni. Il vero svantaggio dell'arma è il caricatore ridotto.\n", + /*287*/ "È una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo può essere caricato in modo da essere devastante. La carica di munizioni superiore è un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola può essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in più e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ " Un fucile mitragliatore affidabile e efficace: è facile capire perché sia il modello più venduto della dataDyne, anche se non è prevista la modalità secondaria. Il sistema di designazione e puntamento è eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non è stato progettato come arma di precisione, anche se vale la pena fare pratica. Può sparare molte pallottole in poco tempo ed è quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilità Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalità secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocità di fuoco è ridotta nella modalità secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocità e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento è stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e può essere usata come sentinella in modalità secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo è il modello che la dataDyne ha fornito all'esercito USA, anche se non è ancora stato adottato ufficialmente. Poiché la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimità sotto la canna. Usare la modalità secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalità secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalità secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto ~e troppo piccolo. \n", + /*298*/ " Il primo tentativo dell'istituto di creare un'arma di supporto è l'AR34, un semplice fucile d'assalto. La modalità secondaria è uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione più pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimità. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione ~e d'uopo! Ci sono due modalità: esplosione singola o doppia. Il caricatore è piuttosto capiente per una pistola a rotazione, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione è il cecchino. Usa la modalità secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo è inarrestabile e penetra nelle pareti in grande profondità, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra è un colpo narcotico non letale, mentre la seconda annienta all'istante. È un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non è adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo ~e la stessa usata in molti ospedali e laboratori. Può essere caricata sia con piccole quantità di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. È pensata per esseri più forti degli umani, questo è chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalità secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalità secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocità ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar può lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute è superiore a certe cose. Il missile guidato accelera automaticamente, ma può essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. È necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalità primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finché il grilletto è premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno è stata aggiunta una modalità secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimità.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbierà la vista e gli oggetti ti cadranno di mano. Può essere fatta esplodere a impatto o per prossimità. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio può sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalità secondaria è un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimità è metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremità di destinazione della mina di prossimità, usa il rilevatore di minaccia della modalità secondaria per proteggerti. Può sembrare una perdita di tempo, ma può salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalità primaria piazza la mina, mentre la secondaria dà il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - Corpo a corpo 1\n", + /*320*/ "Olog. 5 - Corpo a corpo 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/dish_str_s.c b/src/files/lang/pal-beta/dish_str_s.c new file mode 100644 index 000000000..46321f47c --- /dev/null +++ b/src/files/lang/pal-beta/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visión Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visión Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitúate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexión establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con éxito.\n", + /* 15*/ "Conexión perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y conéctale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la Cámara Espía de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Información y holografíala.\n", + /* 22*/ "Sala del PC de Información holografíada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificación completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Escáner de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Escáner de Infrarrojos ha sido localizado con éxito.\n", + /* 32*/ "Recoge el Escáner de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Escáner de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con éxito.\n", + /* 35*/ "Recoge el Escáner de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla láser.\n", + /* 37*/ "Todas las rejillas láser han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaña a alguien para que te dé el Dispositivo de Ocultación.\n", + /* 40*/ "Dispositivo de Ocultación recuperado con éxito.\n", + /* 41*/ "Rejilla Láser 1 desactivada.\n", + /* 42*/ "Rejilla Láser 2 desactivada.\n", + /* 43*/ "Estoy aquí para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. ¡No engañas a nadie!\n", + /* 45*/ "Aquí lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultación ha sido asegurado con éxito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ¿recuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ¿de dónde has salido?\n", + /* 50*/ "Has sido detectado por la cámara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultación de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultación y localiza a Carrington.\n", + /* 53*/ "¡Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misión completada - ¡Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misión fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botón A.\n", + /* 57*/ "Elegir la Cámara Espía.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Cámara Espía y suelta el Botón A.\n", + /* 58*/ "Elegir la Visión Nocturna.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visión Nocturna y suelta el Botón A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botón A.\n", + /* 60*/ "Elegir el Escáner de Rayos-X.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de Rayos-X y suelta el Botón A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botón A.\n", + /* 62*/ "Elegir el Escáner de Infrarrojos.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de IR y suelta el Botón A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botón A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultación.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botón A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botón A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conduciré a las salas de entrenamiento.\n", + /* 68*/ "El centro de información está tras esta puerta.\n", + /* 69*/ "Aquí tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "Éste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botón B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botón B para soltarla.\n", + /* 75*/ "AEROMOTO\nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botón B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botón B también activará cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botón B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento está en marcha.\n", + /* 81*/ "Has obtenido el Código Interruptor 1.\n", + /* 82*/ "Has obtenido el Código Interruptor 2.\n", + /* 83*/ "Has obtenido el Código Interruptor 3.\n", + /* 84*/ "Has obtenido el Código Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botón C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botón C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con éxito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con éxito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con éxito.\n", + /* 90*/ "El guarda ha sido desarmado con éxito.\n", + /* 91*/ "El guarda ha sido derribado con éxito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mantén el Botón R, entonces pulsa el Botón C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mantén el Botón R, entonces pulsa el Botón C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con éxito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician rápidamente.\n", + /*100*/ "Obtén los códigos de acceso examinando los terminales. \n- Usa los códigos en los terminales del muro.\n", + /*101*/ "El Código 1 ha sido obtenido.\n", + /*102*/ "El Código 2 ha sido obtenido.\n", + /*103*/ "El Código 3 ha sido obtenido.\n", + /*104*/ "El Código 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con éxito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botón Z repetidamente para golpear.\n", + /*108*/ "Ahora inténtalo contra un objetivo en movimiento...\n", + /*109*/ "Y por último contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con éxito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con éxito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botón B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prepárate para la misión.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 años 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reacción excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La más alta puntuación en entrenamiento, lo que llevó a la creación de un nuevo nivel. Es la encarnación del agente ideal del Instituto Carrington, de ahí su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 años 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revólver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuación más alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 años 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal científico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operación desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 años ? meses\n", + /*140*/ "|Análisis -\n\nDirectora de la Corporación dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrúpulos si con ello consigue superarse en su competición con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 años ? meses\n", + /*144*/ "|Análisis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece más una unión de interés. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos más granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporación dataDyne con habilidades de lenguaje y apertura de códigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un académico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 años\n", + /*152*/ "|Perfil -\n\nAlienígena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a petición de Daniel Carrington. Los Protectores están entrenados para dominar una gran variedad de armamento. Elvis es un terrófilo, es decir, está fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 años\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiración en la que Cassandra y Trent están involucrados. Poco más se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyección holográfica de un impresionante humano rubio de unos 30 años. Su unidad de modulación oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulación de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 años\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que está rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la petición de préstamo del Pelagic II a la Corporación dataDyne. La mayoría de comentaristas políticos piensa que es fácil de controlar, lo cual quizás sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de alienígenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todavía debe hacerse un contacto político formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza alienígena guerrera que luchó con los Maian durante siglos y sólo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeñas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religión.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de años, una gigantesca nave alienígena de inmenso poder, creada por una raza alienígena llamada Cetan, se hundió en el Océano Pacífico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople débil', que en teoría puede causar que las cadenas que unen las moléculas fallen. Aunque algunos hubieran creído en la innegable destrucción de la nave, un mensaje-cápsula fue enviado a casa, y partes vitales de los sistemas de navegación fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura alienígena centinela.\n\nOtra raza extraterrestre, los Maian, encontró vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terráquea), y la escaramuza resultante pronto floreció en una guerra total. Sólo tras cientos de años de lucha se logró un tratado de paz, aunque los fanáticos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, también, continuó siendo una causa que concernía a los Maian, los cuales veían con decepción cómo la Tierra sufría más y más crisis debido al crecimiento de la tecnología y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia sólo precipitaría guerras futuras en el planeta, y tranquilamente decidieron continuar en observación hasta que la raza madurara más.\n\nDaniel Carrington se adelantó a todos en el 1985 DC al contactar con una nave Maian en órbita sobre la Tierra. Propuso un plan que podía ayudar a ambas partes, resultando así un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona íntegra, los Maian permitieron a Carrington lanzar su tecnología al dominio público a través de sus grandes empresas de Investigación y Desarrollo.\n\nEntonces, en el 2006 DC, los fanáticos Skedar dieron con la cápsula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localización del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Océano Pacífico; de todos modos, para alcanzarla, necesitarían ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compañías que poseían los recursos para ayudarles a recuperar la nave hundida. En lo más alto de esa lista estaba la Corporación dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnología alienígena para convertirse en la mayor corporación sobre la faz del planeta. Todo lo que dataDyne tenía que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de códigos, que era justo lo que necesitaban. Se comenzó a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostró al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobación Presidencial para el préstamo de una nave de investigación a profundidad, fueron repetidamente rechazados. No existía la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., así que decidieron trazar un plan bastante más siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometía recompensas extra para Trent y Cassandra cuando la operación Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan último de los fanáticos Skedar era probar la 'fuerza nuclear de acople-débil' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, así que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne había creado inconscientemente algo que podía ver demasiado claro el peligro que implicaba una conspiración de tal magnitud: la sabia IA construida para abrir los códigos de acceso de la nave Cetan. Cuando se mostró disconforme con la misión para la que había sido diseñada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperación, y en un movimiento que podría sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adoptó el seudónimo de Dr. Caroll y contactó con el Instituto Carrington con una súplica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asignó una misión relacionada con la 'extracción' de un científico de un área de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Después del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella continua con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su única vía de escape.\n\nEn respuesta a esta incursión, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como rehén dos días después en su villa privada. Demandan la devolución de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya está en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso drástico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunión de los conspiradores en el Edificio G5, una tapadera de la Corporación dataDyne. Es aquí donde averigua que Trent Easton, director de la ANS, y aquellos hombres nórdicos, que parecen tener el control del mortal plan, están involucrados. Cuando Trent revela el plan de usurpar la posición Presidencial, Joanna comunica por radio las novedades a la base, sólo para descubrir que otra tarea todavía más urgente requiere de ella, antes incluso de llevar a cabo cualquier acción contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al Área 51, en Nevada. Con la misión de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio médico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza alienígena comúnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegación Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del séquito Presidencial para acceder a la base aérea donde el Air Force One está ubicado, y consigue colarse con éxito en el avión. Nada más despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna está allí para detenerles. Apresura al Presidente a la cápsula de escape mientras un equipo de hombres de Trent registran detenidamente el avión, en un intento de arrastrar al desgraciado político a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en última instancia Elvis intenta romper el tubo estrellándose contra él a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la cápsula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones están bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: rápidamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballería'. Los planes Skedar han vuelto a ser frustrados, el Presidente está seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aquí no acaba la cosa. Descuidando toda precaución, dataDyne y los Skedar roban el navío de investigación del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacífico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qué se esconde tras el gran plan Skedar. Después de paralizar las operaciones de inmersión del navío y replegar el sumergible, bajan al fondo oceánico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cadáver de un guerrero Skedar... Parece que el equipo de asalto no las tenía todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazón de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apañan para restaurarle la personalidad, después de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nMás tarde, de vuelta en el Instituto Carrington, Joanna está a punto de salir hacia una recepción Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar están descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayoría de los empleados pudieron ponerse a salvo mientras Joanna mantenía la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como única compañía. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distracción necesaria para que Joanna escape. Luchando a través de la nave, logra localizar y desactivar los escudos de la bahía de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en órbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes habían encontrado 'el más sagrado' lugar Skedar en todos los años de Guerra interracial. Si el Templo es destruido, la moral Skedar será abatida, y se logrará una paz verdadera en vez de un inútil 'alto el fuego'. Joanna busca al líder Skedar, el más alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo está devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Está viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los últimos segundos de su intento de escapar. Elvis le entrega rápidamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiración desbaratada, los dos parten a la órbita más cercana.\n", + /*173*/ "Corporación dataDyne\n", + /*174*/ "La monolítica corporación que dataDyne ha llegado a ser comenzó su negocio como programadora de sistemas de IA. Cuando de verdad comenzó a crecer, fue cuando consiguió trabajos como contratista de los militares norteamericanos, y su joven y dinámica gerente Cassandra De Vries empezó a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cuánticos e IAs. Cuando la tercera compañía armamentística fue comprada por dataDyne, los beneficos se tornaron astronómicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporación fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnología anti-gravedad. Las ganancias obtenidas, así como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnología situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnológico actual, por razones que sólo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripción\n- Una pequeña cámara remota para exploración sigilosa. Realiza holografías espectroscópicas. Abre puertas proyectando un impulso de calor del tamaño de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Información.\n\nOperativa\n- El Botón Z toma una holografía. El Botón B abrirá cualquier puerta en el camino. Mantén el Botón R para mirar.\n", + /*178*/ "Descripción\n- Mejora la luz visible para producir una imagen del área circundante. También refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actívalo.\n\nOperativa\n- Selecciona la Visión Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripción\n- Dispositivo para apertura de códigos. Se aplica sobre el panel de control y busca la combinación hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en él hasta que la abras.\n\nOperativa\n- Sitúate cerca del panel de la puerta y pulsa el Botón B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripción\n- Se usa para ver a través de muros sólidos y objetos. Puede ver cosas que la Visión Nocturna y el Escáner de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Escáner de Rayos-X, busca los dos interruptores ocultos y actívalos para apagar la cuadrícula láser.\n\nOperativa\n- Elige el Escáner de Rayos-X de tu inventario para activarlo. Selecciónalo otra vez para desactivarlo.\n", + /*181*/ "Descripción\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultación esperándote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elígelo en tu inventario.\n", + /*182*/ "Descripción\n- Traslada datos termales en imágenes visibles. Puede ser usado en la oscuridad y también revela anomalías como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Escáner de Infrarrojos, encuentra la puerta oculta y ábrela.\n\nOperativa\n- Elige el Escáner de Infrarrojos en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*183*/ "Descripción\n- Localiza un objeto en el mapa radar del visor. Muestra la posición relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la señal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*184*/ "Descripción\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camaleónico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultación y dirígete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultación para activarlo. Reelígelo para desactivarlo.\n", + /*185*/ "Descripción\n- Emite una señal constante que sirve para bloquear cualquier dispositivo de comunicación electrónica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botón Z para lanzar la mina. Mantén el Botón R y mueve el Stick de Control para afinar tu puntería antes de lanzar.\n", + /*186*/ "Descripción\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrónicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo así una puerta secreta.\n\nOperativa\n- Sitúate en la terminal y pulsa el Botón B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botón Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMÁTICA\n Suelta el Botón Z cuando no tengas munición.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botón B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mantén el Botón R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mantén el Botón Z para disparar automáticamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botón C Arriba o el Botón C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mantén el Botón R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RÁPIDO\n Pulsa el Botón Z rápido para disparar más velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Sótano Laboratorio\0|Laboratotios subterráneos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporación dataDyne\n", + /*202*/ "Área 51\0|Cerca del Lago Seco, Nevada\n", + /*203*/ "Base Aérea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avión del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71ºN 118ºO\n", + /*206*/ "Pelagic II\0|Navío especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave alienígena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|Ágil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Antigravedad\n", + /*212*/ "Aeromoto\0|Vehículo aéreo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercóptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor aéreo robótico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave alienígena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes áreas: oficinas y laboratorios, talleres y hangares. Está bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporación dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los técnicos trabajan secretamente para situar a dataDyne en lo más alto.\n", + /*222*/ "Pertenceciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. También tiene un observatorio, su propio generador eléctrico y una amplía bodega.\n", + /*223*/ "Es una sórdida y mugrienta parte de Chicago, ahora cerrada al tráfico. Es aquí donde la Corporación G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabación. Para dataDyne es el lugar más seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta sección de la gigantesca instalación conocida como Área 51 está situada al pie de las colinas del Lago Seco. Helipuertos exteriores y torres de comunicación indican el posible tamaño del complejo subterráneo.\n", + /*226*/ "Una de las muchas bases aéreas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases aéreas están en lugares remotos en regiones inhóspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular está optimizado para climas fríos, siendo muy útil cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Círculo Ártico, descansan los restos de un avión destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condición. Es el único navío de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construcción alienígena que reposa en el fondo oceánico desde hace millones de años.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente árido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeño, rápido, y altamente manejable transporte de agentes ha sido diseñado para uso en áreas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, más su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseñado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajón y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequeña unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las áreas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehículo de patrulla urbana y eliminación, con tripulación de dos hombres, y armado con un cañón en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseñado para guerrilla urbana. Usa una unidad anti-gravedad. Está fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programación de '1° dispara, después pregunta'.\n", + /*239*/ "Variación robótica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 fácilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad más que en el escudo.\n", + /*240*/ "Está diseñada para llevar a un único piloto Maian. Un pasajero se puede sentir atorado: si éste es humano, puede ser aún peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir señales de bloqueo sobre áreas considerables: éstas interrumpen las comunicaciones así como los equipos de detección.\n", + /*242*/ "Descripción\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mirándolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botón C Abajo\n-Mirar abajo: Pulsa el Botón C Arriba\n-Vista Libre: Mantén pulsado el Botón R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripción\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. Sé rápida, ya que cada botón se reiniciará en un tiempo límite.\n\nOperativa\n- Esquivar Izquierda: Botón C Izquierda\n- Esquivar Derecha: Botón C Derecha\n\n", + /*244*/ "Descripción\n- Agacharse puede abrir nuevas áreas de exploración.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obstáculos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mantén el Botón R, y pulsa el Botón C Abajo.\n- Arrastrarse: Una vez agachado, mantén el Botón R, y pulsa el Botón C Abajo.\n- Levantarse: Presiona el Botón R.\n\n", + /*245*/ "Descripción\n- Luchar contra múltiples oponentes en combates mano a mano puede ser difícil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puñetazo: Pulsa el Botón Z repetidamente cuando estés desarmado para lanzar una ráfaga de puñetazos.\n\n", + /*246*/ "Descripción\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mantén el Botón B, entonces pulsa el Botón Z para desarmar al enemigo.\n- Puñetazo KO: Golpea a un enemigo desprevenido por detrás.\n", + /*247*/ "Descripción\n- Lucha contra múltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripción\n- Lucha contra múltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dónde quieres ir antes de intentar la prueba. Establece tu posición en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados sólo si estás segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados sólo si estás seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*264*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*265*/ "La Cámara Espía puede ser difícil de controlar, así que tómate tu tiempo.\n", + /*266*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*268*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al blanco. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*269*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*271*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*274*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*275*/ "La Cámara Espía no es invisible: los enemigos la pueden descubrir, así que ten cuidado cuando entres en un área habitada. Recuerda que la Cámara Espía se quedará donde la dejes hasta que la recojas.\n", + /*276*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*278*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al objetivo. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*279*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*281*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y sólo si estás seguro del éxito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, así que cualquier error será tuyo. El modo secundario es golpear con su culata y es, por lo tanto, inútil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precision de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es inútil durante la prueba de tiro.\n", + /*285*/ "La version con silenciador de la Falcon 2 es una excelente arma, diseñada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precision para asegurarte que nunca derrocharás tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisión, especialmente cuando se usa el modo secundario de ráfaga de 3 tiros. La única desventaja seria es el tamaño limitado de su cargador.\n", + /*287*/ "Esta típica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosión devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta versátil pistola ofrece dos diferentes sistemas de disparo para su munición: un disparo estándar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energía del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cuándo recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy útil si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepción. Las balas son tan especiales como el resto del arma; han sido diseñadas para hacerse añicos en el interior del oponente y así tumbarle rápidamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difícil de encontrar ya que es el arma más vendida de dataDyne en los últimos dos años, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisición de objetivos es excelente, y deberás familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Ciclón fue diseñada específicamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresión.\n", + /*293*/ "La flexibilidad Maian respecto al diseño ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos fácilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir daño en el mecanismo de disparo y en el cañón.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompañada de un ritmo de disparo rápido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultación: el entrenamiento ha sido alterado para reflejar esta característica en particular.\n", + /*295*/ "Este arma no sólo se parece a un ordenador PC portátil, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "Éste es el modelo que dataDyne presentó con éxito a los militares de EE.UU., aunque todavía tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo básico del rifle de asalto lleva una mina de proximidad debajo del cañón. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragón en modo secundario), y armas automáticas. Aunque poderoso, el cartucho de este rifle de asalto es pequeño. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante básico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisión.\n", + /*299*/ "Se trata de la variante pesada del Dragón sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqué... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opción aquí. Hay dos modos, explosión simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniería es un rifle de francotirador con silenciador con un zoom de alta tecnología. Lo único que puede interferir en la precisión de este arma es el zoom de francotirador. Asegúrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las técnicas actuales de ingeniería nos superan, todavía podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La función primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instantánea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy común, pudiendo ser encontrada en laboratorios médicos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante más cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseñada para usuarios bastante más fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algún oponente logra esquivar la lluvia de balas, sus cañones pueden usarse como trituradoras para infringir daño.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnología muy interesante en su interior. El modo secundario activa un campo magnético alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, así que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador portátil de mísiles Skedar puede disparar tanto cohetes sin guía, como por control remoto. A los Skedar les produce una perversa satisfacción cuando la cámara se acerca al objetivo, pero un agente del IC está más allá de esas cosas. Los cohetes guiados aceleran automáticamente, pero pueden ser decelerados para más maniobrabilidad. La detonación ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, está equilibrado para ser lanzado. La práctica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeño pero efectivo láser de muñeca con dos diferentes rayos. El modo primario genera una explosión a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activación a la detonación de la granada de fragmentación antipersonal en el modo básico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotará hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosión, tu visión se volverá borrosa y no podrás agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegúrate de lanzarla cuando estés lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosión no afectará al objetivo, y éste irá detrás tuyo. Mejorar tu habilidad en las pruebas evitará errores críticos. La función secundaria es un detector de trampas idéntico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocación correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si tú mismo no quieres tener problemas, usa el modo secundario de detección de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es así, podrá salvar tu vida.\n", + /*315*/ "La última variedad de minas remotas detonables, es esencialmente igual a las que ya tenías. El modo primario es poner las minas, mientras que el secundario es dar las órdenes de explosión. Si no puedes ver la mina, deberás confiar en el viejo método de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earE.c b/src/files/lang/pal-beta/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-beta/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earJ.c b/src/files/lang/pal-beta/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/pal-beta/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/earP.c b/src/files/lang/pal-beta/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-beta/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_f.c b/src/files/lang/pal-beta/ear_str_f.c new file mode 100644 index 000000000..fc75d226f --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir échantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'être achevés dans les laboratoires voisins du sien. Récupérez les prototypes des trois expériences et rapportez-les à l'Institut Carrington pour une étude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arrêter les expériences\n", + /* 11*/ "Dérouter cycle maintenance\n", + /* 12*/ "Obtenir échantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons mécanisme.\n", + /* 15*/ "Robots de maintenance activés.\n", + /* 16*/ "Robots de maintenance reprogrammés.\n", + /* 17*/ "Portes sécurité déverrouillées.\n", + /* 18*/ "Cycle de maintenance activé.\n", + /* 19*/ "Cycle nettoyage activé.\n", + /* 20*/ "Opération refusée - robots occupés.\n", + /* 21*/ "Robots de maintenance désactivés.\n", + /* 22*/ "Objet crucial détruit.\n", + /* 23*/ "Système robots maintenance désactivé.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui êtes-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des systèmes actifs.\n", + /* 29*/ "Expérience interrompue.\n", + /* 30*/ "Alarme activée.\n", + /* 31*/ "Alarme désactivée.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une bêtise.\n", + /* 36*/ "ACCES REFUSE - code de sécurité requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localisé - dérivation serrure.\n", + /* 40*/ "Contact rompu - rétablissement connexion.\n", + /* 41*/ "Porte de sécurité déjà déverrouillée.\n", + /* 42*/ "Expérience déjà interrompue.\n", + /* 43*/ "Etrange - l'expérience est déjà arrêtée!\n", + /* 44*/ "Quelqu'un a cassé mon PC!\n", + /* 45*/ "Obtenir Vision nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vision nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vision nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir récepteur.\n", + /* 56*/ "\n", + /* 57*/ "Récepteur\n", + /* 58*/ "Un récepteur\n", + /* 59*/ "Récepteur obtenu.\n", + /* 60*/ "Connexion établie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance déjà ouvert.\n", + /* 63*/ "ATTENTION - radioactivité détectée.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous êtes qui, bordel?\n", + /* 67*/ "Arrêtez l'expérience.\n", + /* 68*/ "Eteignez-moi tout ça. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'éteindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes expériences!\n", + /* 74*/ "Voilà. C'est éteint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "Sécurité!\n", + /* 77*/ "J'appelle la sécurité.\n", + /* 78*/ "Oups. Je me suis trompé...\n", + /* 79*/ "Comment s'est arrivé?\n", + /* 80*/ "C'est déjà éteint on dirait.\n", + /* 81*/ "Vous avez joué avec ça, ou quoi?\n", + /* 82*/ "On a tout cassé mon équipement!\n", + /* 83*/ "Qu'est-il arrivé à mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - expériences en cours.\n", + /* 86*/ "Objet expérimental 1 obtenu.\n", + /* 87*/ "Objet expérimental 2 obtenu.\n", + /* 88*/ "Objet expérimental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus protégé - Le Dr. Caroll\ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'énergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! Les niveaux sont trop haut.\nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secrètes ouvert.\n", + /* 99*/ "Ennemi détecté - coffre d'armes fermé.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, êtes-vous ici?\n", + /*102*/ "Tout...tout danger est écarté?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps à perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales à \nrévéler et vous devez me protéger.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_g.c b/src/files/lang/pal-beta/ear_str_g.c new file mode 100644 index 000000000..916ab56e4 --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darüber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu übergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-Hauptquartier befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt.\n", + /* 15*/ "Wartungsroboter aktiviert.\n", + /* 16*/ "Wartungsroboter umprogrammiert.\n", + /* 17*/ "Sicherheitstüren entriegelt.\n", + /* 18*/ "Wartungszyklus aktiviert.\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind beschäftigt.\n", + /* 21*/ "Wartungsroboter deaktiviert.\n", + /* 22*/ "Wichtiges Objekt zerstört.\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmöglich.\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schießen - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unfälle passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstür wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als hätte jemand meinen PC beschädigt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtgerät.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtgerät\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtgerät aufgenommen.\n", + /* 50*/ "Finden Sie den Schildgenerator-Prototyp.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Schildgenerator-Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Schildgenerator-Prototyp aufgenommen.\n", + /* 55*/ "Finden sie das Data Uplink-Gerät.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Gerät\n", + /* 58*/ "Ein Data Uplink-Gerät\n", + /* 59*/ "Data Uplink-Gerät aufgenommen.\n", + /* 60*/ "Verbindung hergestellt.\n", + /* 61*/ "Wartungsklappe wurde geöffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unfälle können passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als wäre es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrüstung zerstört!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstört!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen.\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen.\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen.\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen.\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geöffnet.\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndürfen keine Zeit verlieren! Wir müssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmüssen mich beschützen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_i.c b/src/files/lang/pal-beta/ear_str_i.c new file mode 100644 index 000000000..f2b9b968a --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington - \n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi di sicurezza\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuterò!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti darò una mano.\n", + /* 35*/ "Eh sì! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza già aperta\n", + /* 42*/ "Esperimento già interrotto\n", + /* 43*/ "Strano: l'esperimento è già chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione già aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento è interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamerò la sicurezza!\n", + /* 78*/ "Eh sì! Succede...\n", + /* 79*/ "Com'è potuto succedere?\n", + /* 80*/ "Sembra che sia già spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos'è successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo è il principale settore di sicurezza: \nil Dr. Caroll non può essere lontano.\n", + /* 95*/ "C'è qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti darà una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, è qui dentro?\n", + /*102*/ "Si può uscire? Via libera?\n", + /*103*/ "Sì, nessun problema!\n", + /*104*/ "Che... cosa... lei è...\n", + /*105*/ "Molto professionale, mia cara, ma non c'è \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ear_str_s.c b/src/files/lang/pal-beta/ear_str_s.c new file mode 100644 index 000000000..f880f2042 --- /dev/null +++ b/src/files/lang/pal-beta/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnología Experimental\n\nEl Dr. Caroll nos informó de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios además del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluación.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnológicos\n", + /* 13*/ "Holografiar isótopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operación no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crítico de la misión destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIÓN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "¿Quién eres tú?\n", + /* 26*/ "Bajas de científicos inaceptables.\n", + /* 27*/ "El terminal no está activo.\n", + /* 28*/ "Quitando energía a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudaré.\n", + /* 33*/ "¿Qué demonios estás haciendo en mi laboratorio?\n", + /* 34*/ "Déjame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - código de seguridad requerido.\n", + /* 37*/ "Buscando el código.\n", + /* 38*/ ".", + /* 39*/ "Código localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "¡Qué extraño: el experimento ya está detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obtén Visión Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "Visión Nocturna\n", + /* 48*/ "Maletín de De Vries\n", + /* 49*/ "Visión Nocturna obtenida.\n", + /* 50*/ "Obtén el escudo tecnológico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnológico\n", + /* 53*/ "Maletín de De Vries\n", + /* 54*/ "Escudo tecnológico obtenido.\n", + /* 55*/ "Obtén Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "Conector de Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexión establecida.\n", + /* 61*/ "La rejilla de mantenimiento está abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya está abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "¿Qué estás haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "¿Quién demonios eres?\n", + /* 67*/ "Detén el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagaré.\n", + /* 71*/ "Por favor, no me haga daño.\n", + /* 72*/ "Déjeme ayudarle.\n", + /* 73*/ "¡Mi experimento!\n", + /* 74*/ "Ya, el experimento está detenido.\n", + /* 75*/ "¡Deja este área AHORA!\n", + /* 76*/ "¡Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "¿Cómo pudo ocurrir?\n", + /* 80*/ "Parece que ya está apagado.\n", + /* 81*/ "¿Has estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "¿Qué le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexión perdida: experimentos todavía activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obtén la Cámara Espía.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "Cámara Espía\n", + /* 92*/ "Una Cámara Espía\n", + /* 93*/ "Cámara Espía obtenida.\n", + /* 94*/ "Éste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo está usando mucha energía por aquí.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitirá entrar.\n", + /* 97*/ "¡Sal, Joanna! Los niveles son demasiado altos. \nUsa la Cámara Espía.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "¿Dr. Caroll?\n", + /*101*/ "Dr. Caroll, ¿está usted aquí?\n", + /*102*/ "Pero, ¿es seguro salir?\n", + /*103*/ "Sí, todo despejado.\n", + /*104*/ "¿Qu... qué... eres...?\n", + /*105*/ "¡Muy profesional, querida, pero no hay tiempo \nque perder! ¡Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo información vital, y tú \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldE.c b/src/files/lang/pal-beta/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-beta/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldJ.c b/src/files/lang/pal-beta/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/pal-beta/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eldP.c b/src/files/lang/pal-beta/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-beta/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_f.c b/src/files/lang/pal-beta/eld_str_f.c new file mode 100644 index 000000000..f4e644cf7 --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tenté de pirater les fichiers de l'Institut. Leur tâche sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle opération, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des données vitales pour l'Institut ne sont pas endommagés.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'équipe d'assaut de la dataDyne nous donnerait une idée de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'échapper.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 3: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la négociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'éolienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "Négociatrice abattue.\n", + /* 12*/ "Snipers éliminés.\n", + /* 13*/ "Négociatrice en sécurité.\n", + /* 14*/ "Refroidisseurs activés.\n", + /* 15*/ "Refroidisseurs désactivés.\n", + /* 16*/ "Générateurs activés.\n", + /* 17*/ "Générateurs désactivés.\n", + /* 18*/ "Eolienne réactivée.\n", + /* 19*/ "Eolienne désactivée.\n", + /* 20*/ "Courant rétabli dans la villa.\n", + /* 21*/ "Objet crucial détruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \n la villa! Arrêtez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copié les fichiers vitaux.\n", + /* 24*/ "Hackers éliminés.\n", + /* 25*/ "Carrington sauvé.\n", + /* 26*/ "Objectifs incomplets - mission échouée.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlevé.\n", + /* 30*/ "Obtenir clé de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Clé de porte\n", + /* 33*/ "Clé de porte\n", + /* 34*/ "Clé de porte obtenue.\n", + /* 35*/ "Si je réactive l'éolienne, je pourrai\nrétablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la\nnégociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arrêter les hackers avant de\nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46.\nNous avons reçu un appel de Cassandra de Vries hier soir. \nUne équipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa privée sur la côte, \net épargnera sa vie en échange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll étaient tous deux dans la villa \npour un 'arrangement.' Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arrivée des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la négociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous blessé?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \noù se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais dû \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confié qu'il s'attendait \nà une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succès, \nont discuté alors que je faisais semblant \nd'être inconscient. Ils ont mentionné une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous préparer.\n", + /* 46*/ "Aucun problème, monsieur. Le Dr. Caroll \na-t-il pu vous révéler des informations \nimportantes?\n", + /* 47*/ "En effet, très importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-être encore \nl'aider, même si ces sadiques lui enlèvent \nsa personnalité. Il veulent en garder \nune sauvegarde à l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Opération refusée - éolienne active.\n", + /* 49*/ "Mission échouée - garde ennemi non capturé.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_g.c b/src/files/lang/pal-beta/eld_str_g.c new file mode 100644 index 000000000..e28d149ac --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es würde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen könnten. Sollte dies der Fall sein, müssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht beschädigt werden dürfen, da sonst das Institut Daten der Prioritätsstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tatsächlichen Vorhaben. Sie dürfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Windkraft-Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werdensie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterhändlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschützen!\n", + /* 7*/ "Aktivieren Sie den Windkraft-Generator!\n", + /* 8*/ "Finden und stoppen sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine feindliche Wache gefangen!\n", + /* 11*/ "Die Unterhändlerin wurde verloren.\n", + /* 12*/ "Die Scharfschützen wurden eliminiert.\n", + /* 13*/ "Die Unterhändlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Kühlsysteme wurden aktiviert.\n", + /* 15*/ "Kühlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmühle wurde aktiviert.\n", + /* 19*/ "Windmühle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstört.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie müssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunfähig gemacht.\n", + /* 30*/ "Finden Sie den Schlüssel!\n", + /* 31*/ "Schlüssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlüssel\n", + /* 34*/ "Schlüssel aufgenommen.\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterhändler \nist verloren!\n", + /* 37*/ "Hier müssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, müssen diese Hacker \n gestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Küste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfür die KI schonen werden.\n", + /* 40*/ "Unglücklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als hätte Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterhändler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nüberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne- \nSchläger haben aus mir herausgeprügelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten länger durchgehalten hätte...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich hätte schneller \nsein müssen.\n", + /* 45*/ "Machen Sie sich keine Vorwürfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich wäre \nbewusstlos und haben darüber gesprochen, wohin sie \nihn bringen. Sie erwähnten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch möchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige nützliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schlächter seine Persönlichkeit \nverändern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzulässige Operation - Windmühle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_i.c b/src/files/lang/pal-beta/eld_str_i.c new file mode 100644 index 000000000..3fb73b92f --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto più facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poiché contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderli: colpiscili facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione - \n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa almomento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington - \n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice è stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si è messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricità nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington è stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotrò portare l'elettricità \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c'è solo \nla mia vita in gioco!\n", + /* 42*/ "È ferito, Signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in più...\n", + /* 44*/ "Non è colpa sua, Signore! Avrei \ndovuto fare più in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si è lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia lì, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c'è problema, Signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconterò ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. È proprio ora \ndi contattare alcuni amici perché si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/eld_str_s.c b/src/files/lang/pal-beta/eld_str_s.c new file mode 100644 index 000000000..9df01647b --- /dev/null +++ b/src/files/lang/pal-beta/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos esporádicos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo será mucho más fácil si lo intentan desde la villa, debido a la conexión directa con el Instituto. Si se hace ese intento, necesitarás responder rápidamente. Asegúrate de que los terminales no son dañados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dará una idea de sus intenciones reales. Recuerda no matarles: déjalos inconscientes si puedes, ya que esto nos asegurará que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Tres: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador eólico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeración han sido activados.\n", + /* 15*/ "Los sistemas de refrigeración han sido desactivados.\n", + /* 16*/ "Los sistemas de energía han sido activados.\n", + /* 17*/ "Los sistemas de energía han sido desactivados.\n", + /* 18*/ "La torre eólica ha sido activada.\n", + /* 19*/ "La torre eólica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crítico de la misión destruido.\n", + /* 22*/ "¡Joanna! Grimshaw al habla. ¡Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misión fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle de Francotirador\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obtén la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador eólico, \ntendremos energía en el sótano inferior.\n", + /* 36*/ "¡Tengo que ser rápida, o matarán \nal negociador!\n", + /* 37*/ "Aquí es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misión de la Agente Dark, 1846 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetarán su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo interés'. Parece que Daniel \nencontró un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrón de dataDyne \nirrumpió allí.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dará una oportunidad de sorprender \nal escuadrón de dataDyne. Esta vez no sólo mi \nvida está en juego.\n", + /* 42*/ "Señor, ¿está herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nescondía al Dr. Caroll. Si hubiera aguantado \nunos minutos más...\n", + /* 44*/ "No fue su culpa, señor. Debí ser \nmás rápida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndejó caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunión \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que estés allí, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no será un problema, señor. Así que, \n¿el Dr. Caroll le dio alguna información \nútil para usted?\n", + /* 47*/ "Oh, claro que sí. Ciertamente lo hizo, y \nte haré un breve resumen cuando estés de \ncamino a Chicago. Todavía podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. Él cree que ellos \nguardarán una copia en un lugar seguro. Es \ncuestión de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operación denegada - el molino está activo.\n", + /* 49*/ "Misión no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunE.c b/src/files/lang/pal-beta/gunE.c new file mode 100644 index 000000000..42beea849 --- /dev/null +++ b/src/files/lang/pal-beta/gunE.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunJ.c b/src/files/lang/pal-beta/gunJ.c new file mode 100644 index 000000000..ad51bf13c --- /dev/null +++ b/src/files/lang/pal-beta/gunJ.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gunP.c b/src/files/lang/pal-beta/gunP.c new file mode 100644 index 000000000..42beea849 --- /dev/null +++ b/src/files/lang/pal-beta/gunP.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_f.c b/src/files/lang/pal-beta/gun_str_f.c new file mode 100644 index 000000000..2711dfe4f --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_f.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil à pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "Lance-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbalète\n", + /* 34*/ "Tranquillisant\n", + /* 35*/ "Couteau de combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retardement\n", + /* 39*/ "Mine proximité\n", + /* 40*/ "Mine télécom.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "Roquette tête ch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Spécial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vision nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Décodeur porte\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner rayons X\n", + /* 66*/ "Medkit extraterr.\n", + /* 67*/ "Valise\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "Récepteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette ciblée\n", + /* 93*/ "Roquette filoguidée\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guidés\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "Désarmer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Vider moitié chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer couteau poison\n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantanée\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "Déployer comme sentinelle\n", + /*118*/ "Auto-destruction proximité\n", + /*119*/ "Détecteur danger\n", + /*120*/ "Explosif retardement\n", + /*121*/ "Explosif proximité\n", + /*122*/ "Explosif télécommandé\n", + /*123*/ "Détonation\n", + /*124*/ "Fusible 4 secondes\n", + /*125*/ "Pinball proximité\n", + /*126*/ "Détonation retardement\n", + /*127*/ "Détonation proximité\n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir chargé\n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Tir impulsion\n", + /*133*/ "Courant courte portée\n", + /*134*/ "Détonation impact\n", + /*135*/ "Amplificateur lumière\n", + /*136*/ "Caméra mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue télescopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Même sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou désarmer un ennemi pour lui voler son arme.\n", + /*156*/ "Précis et fiable, c'est l'arme de base des opérations de l'Institut. La visée laser sert à localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 amélioré, bénéficiant d'un silencieux très utile.\n", + /*158*/ "Un Falcon 2 amélioré, bénéficiant d'un scope d'agrandissement x2 pour profiter d'une grande précision.\n", + /*159*/ "Un pistolet de l'armée dernier cri utilisé par les forces de l'ordre. Il possède un léger zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de prédilection de tout Skedar qui se respecte. Un grand chargeur et un canon rayé font de ce pistolet une arme de poing formidable, surtout grâce à son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles possèdent un facteur de pénétration élevé et repoussent la cible de leur poids et leur puissance. Des modèles customisés sont fabriqués pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en possède un plaqué or.\n", + /*162*/ "Le DY357-LX a été conçu à la demande du directeur de la NSA, Trent Easton. En plus de posséder une crosse en peau de tigre, ce pistolet d'or possède un canon rayé et utilise des balles à haute vélocité. C'est une arme meurtrière.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne très répandu. Cette arme automatique tire des rafales de calibre 32 et possède une capacité spéciale: verrouiller une cible. Elle fait du profane un tireur d'élite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une portée et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se déplacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un côté vicieux: lorsque le mode secondaire est activé, il devient une mine de proximité aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutôt qu'un explosif de proximité, il possède un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut possédant un chargeur plus petit et un impact puissant, qui peut détecter les explosifs, les armes sentinelles et autres pièges du même ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Conçu pour les gardes du corps, le Cyclone a été choisi par le service de sécurité du Président grâce à son efficacité en matière de répression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide à 2000 cpm.\n", + /*170*/ "L'arme secrète de l'Institut Carrington. Elle tire à une cadence phénoménale et contient énormément de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme dévastatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du génie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides pénétrant facilement les obstacles vous séparant d'une cible. Seul désavantage du mode secondaire: la cadence de tir est plus lente et la précision est diminuée par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transformé en mitrailleuse. Il peut être utilisé comme PC mais un contrôle minutieux révélera la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriquée par les services de sécurité. Un chargeur de 9 balles est couplé à un mode de tir simple ou double, faisant de cette arme un atout en combat rapproché.\n", + /*174*/ "Conçu pour être manié par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une véritable machine à déchiqueter, très efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais à tête chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue portée fabriqué par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projetée, la bombe se fixe sur un mur ou un plafond. Après quelques secondes, elle se détache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette commandée à distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les éléments solides. Le traceur peut repérer et verrouiller une forme de vie mais ne peut compenser les déplacements rapides d'un ennemi en pleine course.\n", + /*179*/ "Bénéficiant d'un puissant zoom et de balles haute vélocité, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure précision.\n", + /*180*/ "Cette arbalète est une arme de courte portée montée sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu'à 5 carreaux anesthésiants ou mortels.\n", + /*181*/ "Un appareil à tir rapide utilisé en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un sédatif. Les utilisateurs sont informés qu'une dose trop importante peut entraîner la mort.\n", + /*182*/ "Un très long couteau de combat. Il contient un réservoir de poison se brisant à l'impact et tue la cible en moins de 6 secondes. Une arme signée dataDyne.\n", + /*183*/ "Une version améliorée de la grenade. Elle peut être utilisée avec un détonateur de 4 secondes ou en tant que bombe à effet de ricochet.\n", + /*184*/ "Une bombe à neutrons à faible zone d'effet. Elle peut se déclencher à l'impact ou être réglée en mode de proximité.\n", + /*185*/ "Une mine dotée d'un détonateur de courte durée. Elle possède un détecteur et évaluateur à activer en mode secondaire.\n", + /*186*/ "Une mine dotée d'un détonateur de proximité. Elle possède un détecteur de menace activé en mode secondaire.\n", + /*187*/ "Une mine à déclencher à distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil électronique de brouillage, capable d'engendrer une panne électrique sur n'importe quel système sur lequel il est fixé.\n", + /*189*/ "Un laser de poignet meurtrier et ultra précis. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentré à courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorbée, elle permet des réactions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumière ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en matière d'anti-gravité. Il possède un lien audio/vidéo avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte portée pouvant voir à travers toute matière - même le plomb - et produisant une représentation chromatique simplifiée des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modulé par ultrason pour donner une image claire des environs et la position des irrégularités de structure. Il peut aussi localiser les ennemis occultés ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacités d'un cristal extraterrestre pour créer une champs de réfraction de la lumière autour de l'utilisateur. Il ne peut fonctionner si une turbulence cinétique pénètre dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue portée. Le viseur affiche une image composite de deux sources d'entrée. Il possède aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles données et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'établir un lien direct entre eux et le terminal connecté.\n", + /*198*/ "Un pisteur puissant à paramétrer sur les humains, les armes, les objets, ou encore les emplacements géographiques.\n", + /*199*/ "Un scanner médical modifié contenant les dernières données de l'état de santé du Président ainsi qu'un résumé de tous les traitements administrés. Il peut monitorer les fonctions vitales du Président à distance même s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout électronique. Il ouvre les serrures codées en quelques secondes mais un système très élaboré lui prendra plus de temps.\n", + /*201*/ "Une merveille médicale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul défaut: il ne reconnaît et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive couplée à une horloge scellée et impossible à désamorcer, le tout revêtu de shrapnel en téflon.\n", + /*203*/ "Une bombe à fusion directionnelle à placer de telle façon que la charge est pointée vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard à fixer sur tout relais de communication qui permet d'imiter le signal officiel, établissant ainsi le lien entre l'Institut et l'agent même dans une zone de brouillage. Il fait partie intégrante du système de communication local ciblé.\n", + /*205*/ "Le fonctionnement de ce mouchard spécial est tenu secret. Le mécanisme d'auto-destruction couvre la majeure partie de l'appareil. Il est très probable qu'il soit un exemple de communication moléculaire quantique, ceci expliquant son efficacité.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra précises à l'armement en orbite, ceci minimisant les risques de dommages collatéraux. La même technologie est utilisée pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils détaillent les points de navigation et les codes de communication ainsi que les codes et fréquences de l'Air Force One. Les codes de cryptage y sont aussi donnés.\n", + /*208*/ "Toutes les données se rattachant aux recherches océaniques conduites par la dataDyne sur le navire détourné Pelagic II y figurent. Elle contient le relevé sonar, les données géologiques, les données sur les artefacts extraterrestres, les échantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalité de l'IA Dr. Caroll avant conditionnement cérébral. A utiliser pour étude seulement ou projections théoriques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un mélange chimique altérant la perception de la cible. Le bien devient le mal, les méchants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 signé Trent Easton.\n", + /*211*/ "Un uniforme différent du vôtre. Portez-le et jouez la comédie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "Méga Roquette\n", + /*218*/ "Récepteur\n", + /*219*/ "Scanner présidentiel\n", + /*220*/ "Auto-chirurgien\n", + /*221*/ "Bombe skedar\n", + /*222*/ "Déroute-Comms\n", + /*223*/ "Mouchard pisteur\n", + /*224*/ "Amplificateur cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette de recherche\n", + /*227*/ "Disque sauvegarde\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan RayonsX\n", + /*234*/ "Scan Horizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a été remplacé par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantané chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une clé-émetteur ouvrant les portes à courte portée, qui permet l'accès aux zones non-autorisées. Le modèle Mk3 ne fonctionne que si son propriétaire est en vie. Niveau de sécurité AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier protège son utilisateur en détectant les attaques et en générant momentanément un champ de force concentré pour repousser l'attaque. Le bouclier possède une quantité d'énergie limitée. Il ne protège pas l'utilisateur indéfiniment. Les boucliers sont généralement activés lorsqu'ils sont portés, bien que celui-ci soit un prototype inachevé.\n", + /*242*/ "Boosts combat\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_g.c b/src/files/lang/pal-beta/gun_str_g.c new file mode 100644 index 000000000..de65d0ac0 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_g.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Treffer", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Betäubungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitzünder-Mine\n", + /* 39*/ "Annäherungs-Mine\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granatwerfer-Munition\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KlO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Gerät\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tür-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Röntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "Weitsicht\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "Näherungs-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuerstoß\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schüsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "folgt der Zielaufschaltung.\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verstärkung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Waffe der Wachleute\n", + /*118*/ "Selbstzerst. bei Näherung\n", + /*119*/ "Bewegungsmelder\n", + /*120*/ "verzögerte Explosion\n", + /*121*/ "Explosion bei Annäherung\n", + /*122*/ "ferngezündete Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zündung\n", + /*125*/ "Annäherungs-Pinball\n", + /*126*/ "Verzögerte Detonation\n", + /*127*/ "Detonation bei Annäherung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerstöße\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Detonation beim Aufprall\n", + /*135*/ "Restlichtverstärker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Röntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Störsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Verkleidung kann getragen werden\n", + /*144*/ "Sprengsätze müssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalldämpfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein würdiger Gegner. Setzen Sie Ihre Fäuste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschließend können Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schüsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zusätzlich über einen Schalldämpfer verfügt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Präzisions-Fernrohr noch zusätzlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Militär-Pistole, die hauptsächlich von Friedenstruppen eingesetzt wird. Die Waffe verfügt über eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab. Sekundär-Feuermodus.\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein großes Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekundär-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verstärkt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die stärkste Handfeuerwaffe der Welt. Jede Kugel verfügt über einen hohen Penetrations-Faktor und schleudert das Ziel zurück. Modifizierte Modelle werden nur für spezielle Kunden angefertigt. NSA-Chef Trent Easton verfügt angeblich über eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell für Trent Easton angefertigt. Neben einem mit Tigerleder überzogenen Griff verfügt diese Pistole über einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfügt über ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schützen zu einem Profi. Vorausgesetzt natürlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazität aus. Die Sekundär-Funktion ermöglicht es dem Schützen, sich zu bewegen, während er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit Überraschungseffekt. Die Sekundär-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfügt die Waffe über einen kleinen Granat-Werfer. Hervorragend als Unterstützung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkörpern, Selbstschußanlagen und Ähnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell für Bodyguards. Die Cyclone wird auch von der Leibwache des Präsidenten eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhöht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfügt über eine hohe Feuerrate und ein großes Magazin. Die Sekundär-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit größter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schüsse möglich, die Deckungen durchbrechen können. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rückstoßes die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe hält auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfügt aber nur über ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe für die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gefährlichen Nahkampf-Instrument.\n", + /*174*/ "In den Händen von jemandem, der den starken Rückstoß ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend für Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und für sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekundärfunktion umhüllt die Granate mit einer klebrigen Substanz, welche die Haftung an Wänden und Decken ermöglicht. Einige Sekunden später fällt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverständlich, dass sie mit der Sekundär-Funktion ihres Raketenwerfers ein Geschoss fernsteuern können. So können sie sichan den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Röntgen-Scanner und einem Gewehr, das durch feste Objekte schießen kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-Fähigkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmögliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht größer als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Gründen der Geheimhaltung verringert werden. Die Munition umfasst bis zu fünf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr großes Kampfmesser. Es enthält eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzögerter Detonation als auch mit Annäherungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Annäherung erfolgen.\n", + /*185*/ "Eine Mine mit verzögerter Detonation. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezündet werden. Die Sekundär-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Störsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Störung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfügt über perfekte Präzision. Man kann mit ihm entweder Langstrecken-Energiestöße oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation für die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich höhere Reaktionsfähigkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Geräten, das nicht nur Restlicht verstärkt, um eine klarere Wahrnehmung der Umgebung zu ermöglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mögliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Gerät beinhaltet die kleinstmögliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung für spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularitäten zu untersuchen. Der Anwender erhält ein erstaunlich detailliertes Bild der Gegebenheiten. Außerdem durchdringt der Scanner auch jegliche Art von Tarnkappen- Technologie und andere optische Täuschungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Träger unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Störungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Geräts können nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchgerät, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenstände und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Präsidenten anzeigt. Es werden auch ältere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch über größere Entfernungen zu erfassen. Dies ist auch möglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlösser normalerweise innerhalb von Sekunden knackt. Selbstverständlich hängt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Diese Vorrichtung erstellt eine automatische Diagnose und führt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschützt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr böse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwüstet, und der Rest des Gebäudes stürzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Gerät angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurückverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen höchster Bedrängnis hat sich der Einsatz hervorragend bewährt. Ein unverzichtbares Zubehör für jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehütetes Geheimnis. Fest steht, dass der Selbstzerstörungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die phänomenale Verlässlichkeit des Geräts erklären würde.\n", + /*206*/ "Quantenmolekulare Technologie ermöglicht außerordentlich akkurate Zielerfassung für Orbitalwaffen. Dadurch wird der Schadensradius auf den nötigen Umfang beschränkt. \n", + /*207*/ "Detaillierte Flugpläne, Kommunikationscodes und Frequenzen für die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgeführt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persönlichkeit der künstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Löschung und cerebralen Restrukturierung durchgeführt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realitätswahrnehmung der Zielperson umkehrt. Gut wird zu Böse, Böse wird zu gut, Freund und Feind tauschen die Plätze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Presidänten-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilgerät\n", + /*225*/ "Flugpläne\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlüsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "PräsidentScan\n", + /*232*/ "Adr.\n", + /*233*/ "R-Scan.\n", + /*234*/ "H-Scan.\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfügt über ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Annäherungs-Schlüsselkarte, um Sperrzonen betreten zu können. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schützt den Träger, indem er automatisch Gefahren erkennt und ein temporäres Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfügt über einen begrenzten Energievorrat. Die Schutzfunktion kann also nur über eine bestimmte Zeitspanne gewährleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als wäre dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_i.c b/src/files/lang/pal-beta/gun_str_i.c new file mode 100644 index 000000000..cb0fa4a29 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_i.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "Corpo a corpo\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Pistola rotaz.\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina a orologeria\n", + /* 39*/ "Mina di prossimità\n", + /* 40*/ "Mina a distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile di ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore Porta\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner a infrarossi\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "Televista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a scoppio\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a raffica\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "LocalizzaObiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a forte impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Impiega pistola sentinella\n", + /*118*/ "Autodistruzione di prossimità\n", + /*119*/ "Rilevatore di minaccia\n", + /*120*/ "Esplosivo a orologeria\n", + /*121*/ "Esplosivo di prossimità\n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di prossimità\n", + /*126*/ "Detonazione a orologieria\n", + /*127*/ "Detonazione di prossimità\n", + /*128*/ "Triplice scoppio\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a raffica\n", + /*133*/ "Corrente a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa è l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. È dotata di zoom e di modalità secondaria di sparo a triplice scoppio.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne è la pistola più potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX è stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocità e forza.\n", + /*163*/ "È la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne è il fucile mitragliatore più venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocità media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalità secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocità media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalità secondaria diventa una mina di prossimità molto simile ad una pistola. Velocità media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimità è dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocità media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocità media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone è stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocità di fuoco può essere raddoppiata, scaricando il caricatore in un secondo. Velocità media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocità di fuoco fenomenale e straordinaria capacità del caricatore. La modalità secondaria è una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocità media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Può sparare colpi ordinari alla velocità degli altri fucili mitragliatori, ma anche scariche ad alta velocità in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalità secondaria sono la ridotta velocità di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocità media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando è chiuso, non può sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo può essere scoperto: il PC si avvia, ma la sua memoria è solo un quarto del normale.Velocità media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalità di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocità massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno più lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalità secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. È dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalità secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista è un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo può puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocità del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocità, quest'arma del Carrington Institute è uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra è un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si può ripiegare per nasconderla e può sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza può essere usato anche come arma benché progettato come spray dermico per la somministrazione di sedativi. È bene ricordare che scaricare l'intero serbatoio può avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Può essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimità.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Può essere fatta esplodere al momento dell'impatto o con esplosione di prossimità.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*186*/ "Una mina con miccia di prossimità. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione è la sua modalità secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui è applicato.\n", + /*189*/ "Il laser viene portato al polso ed è estremamente preciso. Può emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione più recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine più chiara dell' ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo è il più avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine più chiara dell'area circostante e identificare qualsiasi irregolarità strutturale. Inoltre può localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualità di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilità.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilità.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record più aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. È in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi è in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocità vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio è che funziona solo sui Maian; l'altro è la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sarà inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; è parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice è di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilità del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando così i danni collaterali. La stessa tecnologia è usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalità dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realtà percepita dell'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non è il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScanPresidente\n", + /*232*/ "Booster\n", + /*233*/ "ScannerX\n", + /*234*/ "HorizonScan\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione è stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra è ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. È dotato di riserva energetica limitata, quindi può proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/gun_str_s.c b/src/files/lang/pal-beta/gun_str_s.c new file mode 100644 index 000000000..f228205c3 --- /dev/null +++ b/src/files/lang/pal-beta/gun_str_s.c @@ -0,0 +1,248 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragón\n", + /* 18*/ "SuperDragón\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Ciclón\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "R. Francotirador\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo de combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina de Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "Láser\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visión Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Escáner Rayos-X\n", + /* 66*/ "Paquete Médico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Escáner IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletín\n", + /* 72*/ "Pildora Suicidio\n", + /* 73*/ "Disp. Ocultación\n", + /* 74*/ "Reforzador\n", + /* 75*/ "C. Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo único\n", + /* 86*/ "Fuego rápido\n", + /* 87*/ "Fuego en ráfaga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartucho\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puñetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Descarga Medio Cartucho\n", + /*105*/ "Doble Explosión\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyección Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador de Objetivos\n", + /*112*/ "Muerte Instantánea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultación\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestrucción Proximidad\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonación\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonación temporal\n", + /*127*/ "Detonación Proximidad\n", + /*128*/ "Ráfaga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Descarga de Bajo Alcance\n", + /*134*/ "Detonación por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "Cámara Móvil\n", + /*137*/ "Visión de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescópica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensión de Cartucho\n", + /*148*/ "Mira Láser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puños para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira láser para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja añadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisión de la Falcon.\n", + /*159*/ "Una pistola de tecnología militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de ráfaga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es más que posible que lleve una de éstas. Un amplio cargador y su cañón rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la más poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetración increíble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante bañada en oro.\n", + /*162*/ "La DY357-LX fue diseñada especialmente para el director de la ANS, Trent Easton. Además de tener una atractiva empuñadura de genuina piel de tigre, este arma dorada incluye un cañón optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortífera.\n", + /*163*/ "El arma Maian estándar. Se trata de un arma flexible, una pistola que dispara tiros estándar o tiros explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un clásico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una característica especial: la habilidad de designar y fijar objetivos en la línea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 rpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamaño de su cargador hacen de ella un arma muy útil; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 rpm.\n", + /*166*/ "Un rifle de asalto estándar con un giro diabólico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 rpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragón: en vez de un explosivo de proximidad, es un pequeño lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 rpm.\n", + /*168*/ "Es otra pieza de alta tecnología de dataDyne. Ordinariamente es un rifle de asalto con un cargador más bien pequeño y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 rpm.\n", + /*169*/ "Diseñado para ser usado por guardaespaldas, el Ciclón ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede más que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 rpm. Descarga a 2000 rpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultación que funciona con la munición del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 rpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseño de armas de fuego Maian. Puede disparar tiros estándar tan rápido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar fácilmente en objetos para encontrar al objetivo al otro lado. La única desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisión sufre con la potencia del disparo. Ratio de disparo normal: 950 rpm., (s/f:300 rpm).\n", + /*172*/ "Una ametralladora diseñada para parecer un PC portátil. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 rpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difícil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 rpm.\n", + /*175*/ "Es un arma incómoda. Dispara tanto un cohete estándar como un cohete más lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, ésta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes básico, así pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un híbrido Maian de un dispositivo de escáner de Rayos-Xemparejado con un rifle que puede disparar a través de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan rápido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jamás hechos. Agáchate para una mayor precisión.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la muñeca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los más usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego rápido, que puede ser usado como arma en un caso de emergencia, pero que está diseñado en principio como un inyector dérmico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versión ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace añicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que sólo podía haber sido creada por dataDyne.\n", + /*183*/ "Es una versión mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un área muy pequeña. Puede detonar por impacto o ser fijada en detonación por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activación es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos eléctricos más comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El láser está montado en la muñeca y su precisión es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energía en corto alcance.\n", + /*190*/ "Son estimulantes genéticos diseñados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reacción'.\n", + /*191*/ "Lo último en la línea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicación más pequeña de la tecnología anti-gravedad, esto es lo último en dispositivos para fisgar. Tiene una conexión de audio/vídeo con función de grabación y la posibilidad interna de holografiar espectroscópicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a través de algunos materiales, incluso el acero, produciendo una representación cromática simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasónicos para ofrecer no sólo una imagen clara del área colindante, sino también la ubicación de irregularidades estructurales. También puede localizar enemigos que empleen tecnología de ocultación u otros desconciertos ópticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales alienígenas para crear un campo refractivo alrededor del portador. Funciona mientras sólo existan pequeñas perturbaciones kinéticas en el campo límite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un escáner binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. También cuenta con función zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexión directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de parámetros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un escáner médico modificado que contiene la más moderna información acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo esté en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrónicamente, habitualmente en cuestión de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla médica Maian puede auto-diagnosticar y realizar operaciones quirúrgicas sin necesidad de cortes. Una desventaja es que sólo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequeña carga de explosivo plástico, completada con un temporizador sellado, e incrustada dentro de una capa de teflón con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusión direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasará los laboratorios de investigación de dataDyne y causará que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeño 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la señal oficial, permitiendo la conexión entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propósitos, es parte de la localización de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestrucción. Se especula que esto es un ejemplo de comunicación molecular cuántica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnología de comunicación cuántica para proveer información precisa de los objetivos a las armas orbitales, ayudándolas a minimizar los daños colaterales. La misma tecnología es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los códigos de comunicación y frecuencias del Air Force One: incluso las claves actuales de encriptación.\n", + /*208*/ "Todos los datos relacionados con la investigación en el fondo oceánico desarrollada por dataDyne con el navío de operaciones submarinas Pelagic II. El contenido incluye mapeados de sónar, datos geológicos, datos del artefacto alienígena, muestras del casco, etc.\n", + /*209*/ "Es la última grabación del estado de personalidad de la inteligencia artificial, que se llama a sí misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene sólo proyecciones teóricas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cóctel químico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus lugares. Se trata de otra de las investigaciones 'oscuras' del Área 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Llévalo para pretender no ser tú.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Contr. Comunicaciones\n", + /*223*/ "'Bicho' Rastreador\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigación\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magnética\n", + /*229*/ "Maletín\n", + /*230*/ "Collar\n", + /*231*/ "Escáner Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la Cámara Espía el dispositivo de grabación ha sido reemplazado por un poderoso explosivo plástico.\n", + /*237*/ "Este modelo de la Cámara Espía usa una toxina nerviosa paralizadora para que los blancos queden en estado catatónico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Está equipado con una llave de proximidad que permite el acceso a áreas restringidas. El modelo Mk3 sólo funciona si el propietario está vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando momentáneamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energía limitada, así que sólo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impE.c b/src/files/lang/pal-beta/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-beta/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impJ.c b/src/files/lang/pal-beta/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/pal-beta/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/impP.c b/src/files/lang/pal-beta/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-beta/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_f.c b/src/files/lang/pal-beta/imp_str_f.c new file mode 100644 index 000000000..5890c8005 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ilsdérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 4: - Détruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilisé il y a des années pour briser les codes de communications Maian. Il doit être détruit à tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ilsdérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 4: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 2: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.'\n\n|Objectif 3: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut.La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver les défenses automatiques\n", + /* 6*/ "Libérer les otages\n", + /* 7*/ "Récupérer l'arme expérimentale\n", + /* 8*/ "Détruire les informations sensibles\n", + /* 9*/ "Désactiver la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activés.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauvés.\n", + /* 18*/ "Informations sensibles détruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqués.\n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages.\n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau système de bouclier.\n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut être utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont accès...\n", + /* 27*/ "Allez-y en premier, Joanna, et détruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont placé une bombe.\n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Accès refusé - Echec autorisation.\n", + /* 31*/ "Mesures d'urgences lancées.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La dernière navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial détruit.\n", + /* 35*/ "Les défenses automatiques vont m'aider.\n", + /* 36*/ "Voilà sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages\ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y\nprends mal.\n", + /* 39*/ "La bombe a explosé...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Prête, Joanna? Nous ne pouvons pas faire attendre la délégation maian. Le Président non plus, bien sûr.\n", + /* 42*/ "Moi prête? Pardon? Je suis prête depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Très. J'attends ce moment depuis si longtemps. L'Institut a été fondé pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons à la Maison Blanche... Le rêve deviendra alors réalité...\n", + /* 46*/ "D'où cela venait-il?\n", + /* 47*/ "Du rez-de-chaussée...\n", + /* 48*/ "Il y en a qui ne savent pas s'arrêter. Tout le monde doit évacuer!\n", + /* 49*/ "Mettez-vous à l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'espère juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le récepteur.\n", + /* 52*/ "Connexion établie.\n", + /* 53*/ "Dérivation systèmes de sécurité.\n", + /* 54*/ "Virus téléchargé avec succès.\n", + /* 55*/ "Moteurs du vaisseau activés.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir récepteur.\n", + /* 58*/ "\n", + /* 59*/ "Récepteur\n", + /* 60*/ "Un récepteur\n", + /* 61*/ "Récepteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_g.c b/src/files/lang/pal-beta/imp_str_g.c new file mode 100644 index 000000000..97ed46123 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Büro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kommunikations-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen können. Setzen Sie den Laser ein, um sich den Weg durch die Türzu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-Maschinengewehrs.Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigungsanlagen!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die experimentelle Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen.\n", + /* 15*/ "Selbstschussanlage aktiviert.\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstört.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Büros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nnützlich erweisen könnte.\n", + /* 26*/ "Verdammt! Mein Büro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge überstürzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Gebäude raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstört.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir können die Maianische Delegation nicht warten lassen. Den Präsidenten natürlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug auswählen...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervös?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Für diesen Zweck wurde das Institut gegründet. In wenigen Minuten sind wir im Weißen Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wüsste jemand nicht, wann er genug hat. Wir müssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie können später zurückkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das können.\n", + /* 51*/ "Sie benötigen das Data Uplink-Gerät.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung zum Schiff wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Gerät.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Gerät\n", + /* 60*/ "Ein Data Uplink-Gerät\n", + /* 61*/ "Data Uplink-Gerät aufgenommen.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_i.c b/src/files/lang/pal-beta/imp_str_i.c new file mode 100644 index 000000000..c57fe4024 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso usò per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanandosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington - \n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington è stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione è disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuterà a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Così almeno non saprò se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba è esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero già pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com'è, Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "Sì, molto. Sono anni che aspetto questo momento. L'istituto è stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriverà il grande momento...\n", + /* 46*/ "Da dove sono sbucati?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C'è qualcuno che non capisce quando è ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Può tornare a prendermi più tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus è stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/imp_str_s.c b/src/files/lang/pal-beta/imp_str_s.c new file mode 100644 index 000000000..cbfef1d67 --- /dev/null +++ b/src/files/lang/pal-beta/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Destruir Información Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que usó para descifrar los códigos de comunicación Maian hace unos años. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el láser para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas automáticas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir información sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obtén información sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Información sensible\n", + /* 13*/ "Información sensible\n", + /* 14*/ "Información sensible obtenida.\n", + /* 15*/ "Arma automática activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La información sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y sálvalos.\n", + /* 24*/ "Están usando una nueva forma de tecnología de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodría ser útil.\n", + /* 26*/ "Maldición. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve allí primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encuéntrala y sácala del edificio.\n", + /* 30*/ "Acceso denegado: autorización fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La última nave te está esperando. Deprisa.\n", + /* 34*/ "Objeto crítico de la misión destruido.\n", + /* 35*/ "Las autodefensas me ayudarán de veras.\n", + /* 36*/ "Así que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabré si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "¿Preparada, Joanna? No podemos hacer esperar a la delegación Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "¿Preparada? ¿Qué quieres decir? Llevo preparada desde hace media hora. \n¡Tú nos has entretenido!\n", + /* 43*/ "Pero ya sabes cómo va, Joanna... Tengo que estar seguro de que mi pelo está bien, y también estaba el traje...\n", + /* 44*/ "Deberían alejarte de los espejos. ¿Nervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes años. El contacto, amigable, entre Humanos y Maian es para lo que se fundó el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrirá finalmente...\n", + /* 46*/ "¿De dónde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cuándo retirarse. ¡Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "¡Largo! Les mantendré alejados... ¡Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexión.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con éxito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexión con la nave se ha cortado.\n", + /* 57*/ "Obtén el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "Conector de Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-beta/junE.c b/src/files/lang/pal-beta/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/junJ.c b/src/files/lang/pal-beta/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/junP.c b/src/files/lang/pal-beta/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_f.c b/src/files/lang/pal-beta/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_g.c b/src/files/lang/pal-beta/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_i.c b/src/files/lang/pal-beta/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/jun_str_s.c b/src/files/lang/pal-beta/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamE.c b/src/files/lang/pal-beta/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamJ.c b/src/files/lang/pal-beta/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lamP.c b/src/files/lang/pal-beta/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_f.c b/src/files/lang/pal-beta/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_g.c b/src/files/lang/pal-beta/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_i.c b/src/files/lang/pal-beta/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lam_str_s.c b/src/files/lang/pal-beta/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/leeE.c b/src/files/lang/pal-beta/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-beta/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/leeJ.c b/src/files/lang/pal-beta/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/pal-beta/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/leeP.c b/src/files/lang/pal-beta/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-beta/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_f.c b/src/files/lang/pal-beta/lee_str_f.c new file mode 100644 index 000000000..3e756fe4c --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe système d'accostage est d'habitude contrôlé automatiquement: il a dû être dévié depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 5: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 4: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs Maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez-le boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte Maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le système de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Accéder aux systèmes de navigation\n", + /* 8*/ "Saboter les systèmes de propulsion\n", + /* 9*/ "Contrôler le pont\n", + /* 10*/ "Boucliers du vaisseau baissés.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation récupérées.\n", + /* 14*/ "Ascenseur activé.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers\net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna.\n", + /* 20*/ "Prends ça. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur.\nPrends l'autre.\n", + /* 23*/ "Moteurs coupés.\n", + /* 24*/ "Attention Joanna! Ils sont en colère je crois...\n", + /* 25*/ "Pont capturé.\n", + /* 26*/ "Vas-y, Joanna. Je sécurise le périmètre.\nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer\nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires Skedars.\n", + /* 30*/ "Si nous contrôlons le pont, le vaisseau sera à notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma chère.\n", + /* 34*/ "Vous! Vous ne vous êtes pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars était plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais créer une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout ça, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilisée. Vous êtes ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la première fois que je vois une planète depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "Où vas-tu?\n", + /* 45*/ "Nous devons descendre à la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar fermées - boucliers actifs.\n", + /* 48*/ "Objet crucial détruit.\n", + /* 49*/ "Munitions épuisées - panneaux ne peuvent être détruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_g.c b/src/files/lang/pal-beta/lee_str_g.c new file mode 100644 index 000000000..3c1211581 --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Öffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brücke aus auf manuelle Bedienung umgestellt worden sein. Öffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermöglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zweider Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild außer Betrieb!\n", + /* 6*/ "Öffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brücke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geöffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nkönnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore öffnen, sonst können wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schön dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten.\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brücke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns später.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brücke einnehmen, gehört das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befürchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Schätzchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie wären entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das dürfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Möglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschön!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir müssen die Oberfläche erreichen! Folge mir!\n", + /* 46*/ "Wir müssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstört.\n", + /* 49*/ "Die Konsolen können ohne Munition nicht zerstört werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_i.c b/src/files/lang/pal-beta/lee_str_i.c new file mode 100644 index 000000000..6840bbb1c --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco è normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis è stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncosì potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinché possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sarà utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "È ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sarà nostra.\n", + /* 31*/ "È ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c'è di peggio, immagino! Guarda un po' chi c'è qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. È sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta lì! Se riesco a distrarli, avrai la possibilità di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perché lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilità di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! È la prima volta che vedo un altro pianeta dallo spazio! È fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba è?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Collana di\n", + /* 52*/ "Cassandra De Vries\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lee_str_s.c b/src/files/lang/pal-beta/lee_str_s.c new file mode 100644 index 000000000..cce07ea1e --- /dev/null +++ b/src/files/lang/pal-beta/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma automática: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podrá terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegación\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La información de navegación ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar\npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te veré en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrarás útil...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomaré este ascensor; \ntú toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "¡Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora sólo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta máquina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave será nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferiría no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Sólo mira a quién tienes por compañía.\n", + /* 34*/ "¡Tú! Creía que habías escapado. No encontramos ningún rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me escondía de los Skedar, como tú y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. ¡Espera aquí! Crearé una distracción; te daré la oportunidad de escapar. Úsala o moriremos ambas.\n", + /* 37*/ "¿Por qué haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. Tú eres mi mejor baza para vengarme.\n", + /* 39*/ "¡¡¡Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. Ésta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "¿Hmmmm?\n", + /* 42*/ "No... ¡No puedo creerlo!\n", + /* 43*/ "¿Elvis? ¿Qué pasa?\n", + /* 44*/ "¿Dónde vas?\n", + /* 45*/ "¡Tenemos que bajar a la superficie! ¡Sígueme!\n", + /* 46*/ "¡Tenemos que salir de aquí!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todavía activos.\n", + /* 48*/ "Objeto crítico de la misión destruido.\n", + /* 49*/ "Munición agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obtén el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lenE.c b/src/files/lang/pal-beta/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lenJ.c b/src/files/lang/pal-beta/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lenP.c b/src/files/lang/pal-beta/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_f.c b/src/files/lang/pal-beta/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_g.c b/src/files/lang/pal-beta/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_i.c b/src/files/lang/pal-beta/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/len_str_s.c b/src/files/lang/pal-beta/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/lipE.c b/src/files/lang/pal-beta/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-beta/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lipJ.c b/src/files/lang/pal-beta/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/pal-beta/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lipP.c b/src/files/lang/pal-beta/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-beta/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_f.c b/src/files/lang/pal-beta/lip_str_f.c new file mode 100644 index 000000000..a4a37b296 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Détruire les archives informatiques\n\nToutes informations sur le crash et les éléments récupérés détenue par le Secteur 51 doivent être effacées de leurs fichiers. Le terminal est gardé dans une pièce fermée en haut du couloir principal. Installez un virus grâce au récepteur et détruisez le terminal. Si le virus infecte d'autres terminaux, leur réseau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caisson dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 4: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caisson dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 3: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec nous communiquer l'existence d'un survivant. L'objectif de La mission est de sauver ce rescapé.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 2: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "Détruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Accéder au labo d'autopsie\n", + /* 13*/ "Sauver le rescapé du crash\n", + /* 14*/ "Archives de recherche détruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Accès système contrôle des portes refusé.\n", + /* 21*/ "Accès système contrôle éclairage refusé.\n", + /* 22*/ "Accès système contrôle sécurité refusé.\n", + /* 23*/ "Virus téléchargé dans la console.\n", + /* 24*/ "Obtenir récepteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "Récepteur\n", + /* 27*/ "Récepteur\n", + /* 28*/ "Récepteur obtenu.\n", + /* 29*/ "Accès laboratoire: succès.\n", + /* 30*/ "Récepteur connecté.\n", + /* 31*/ "Connexion récepteur coupée.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui êtes-vous?\n", + /* 38*/ "Hé! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes vêtements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a détecté le costume.\n", + /* 48*/ "Virus déjà téléchargé.\n", + /* 49*/ "Lancement téléchargement virus.\n", + /* 50*/ "Enfin vous voilà.\n", + /* 51*/ "Mais, vous n'êtes pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le répèterai pas: lâchez votre arme!\n", + /* 54*/ "Bon. J'appelle la sécurité.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Accès au labo d'autopsie impossible.\n", + /* 58*/ "Hé! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'opération.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'opération\n", + /* 62*/ "Carte salle d'opération\n", + /* 63*/ "Carte salle d'opération obtenue.\n", + /* 64*/ "Elvis a été abattu.\n", + /* 65*/ "Sortez de là, bon Dieu!!\n", + /* 66*/ "Caisson élevé.\n", + /* 67*/ "Caisson abaissé.\n", + /* 68*/ "Equipement crucial détruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accrochée.\n", + /* 75*/ "ID cible confirmée - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume porté.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un\nde se séparer de son uniforme...\n", + /* 79*/ "La température tombe... La salle de \ncryogénisation est proche.\n", + /* 80*/ "L'air est recyclé par ici... Le labo\n d'autopsie est par là.\n", + /* 81*/ "Le voilà, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'être ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Prévenez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge systèmes d'éclairage.\n", + /* 89*/ "Entrée supplémentaire aux labos créée.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilité reste une cloison \nque j'ai repérée dans une salle après \nl'entrepôt. Essayez de la faire sauter.\n", + /* 91*/ "Pas de problème. Et où sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "Hé hé. Terrible.\n", + /* 94*/ "Au fait, l'entrepôt est bourré de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discrète plutôt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'énerve...\n", + /*100*/ "Levez les mains et écartez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit être scellée! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas répéter, Docteur. Et \néteignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera informé, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amusée dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "Défenses automatiques neutralisées.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_g.c b/src/files/lang/pal-beta/lip_str_g.c new file mode 100644 index 000000000..c767dc5a6 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Löschen Sie die Computeraufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelöscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Geräts einen Virus, zerstören Sie anschließend das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrüstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrüstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Labortechniker-Ausrüstung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den Überlebenden!\n", + /* 14*/ "Aufzeichnungen zerstört.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen.\n", + /* 20*/ "Zugriff auf den Türöffnungsmechanismus verweigert.\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert.\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert.\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Gerät!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Gerät\n", + /* 27*/ "Data Uplink-Gerät\n", + /* 28*/ "Data Uplink-Gerät aufgenommen.\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgeführt.\n", + /* 30*/ "Verbindung hergestellt.\n", + /* 31*/ "Verbindung abgebrochen.\n", + /* 32*/ "Erlangen Sie die Schlüsselkarte für Medlab 2.\n", + /* 33*/ "Medlab 2-Schlüsselkarte\n", + /* 34*/ "der Wache\n", + /* 35*/ "Medlab 2-Schlüsselkarte\n", + /* 36*/ "Medlab 2-Schlüsselkarte aufgenommen.\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrüstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schießen!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrüstung zurück, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja förmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrüstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlüsselkarte zum OP!\n", + /* 60*/ "OP-Schlüsselkarte\n", + /* 61*/ "der Wache\n", + /* 62*/ "OP-Schlüsselkarte\n", + /* 63*/ "OP-Schlüsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrüstung wurde zerstört.\n", + /* 69*/ "Finden Sie den Röntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Röntgen-Scanner\n", + /* 72*/ "Röntgen-Scanner\n", + /* 73*/ "Röntgen-Scanner aufgenommen.\n", + /* 74*/ "Scanner-Ziel erfasst.\n", + /* 75*/ "Ziel-ID bestätigt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen.\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden überzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur fällt... Du musst \nin der Nähe des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu spät!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Dürfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrüger!\n", + /* 88*/ "Beleuchtungssystem überladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen.\n", + /* 90*/ "Das Problem ist, dass es keine Möglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerräumen \neine brüchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkörper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkörper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerräume sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schießt.\n", + /* 99*/ "Großartig! Wenn ich jetzt noch mein Verlangen \nunterdrücken könnte, dich zu verpfeifen...\n", + /*100*/ "Hände hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts über den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird über diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natürlich wird er darüber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_i.c b/src/files/lang/pal-beta/lip_str_i.c new file mode 100644 index 000000000..e11af76f8 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C'è un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus è già stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamerò la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non è Harry! È un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis è stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unità di contenimento.\n", + /* 67*/ "Abbassata unità di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c'è un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sarà troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "È una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema è che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilità è un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov'è l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari è contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercherò di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /*104*/ "Certo che lo verrà a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lip_str_s.c b/src/files/lang/pal-beta/lip_str_s.c new file mode 100644 index 000000000..5670c9992 --- /dev/null +++ b/src/files/lang/pal-beta/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Destruir Registros Científicos del Ordenador\n\nCualquier información y objetos que los técnicos del Área 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal está en una habitación cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producirá efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este area y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "ÁREA 51 - LABORATORIOS MÉDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este area y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de técnico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiración\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros científicos destruidos.\n", + /* 15*/ "Obtén ropas de laboratorio.\n", + /* 16*/ "Técnico:\n", + /* 17*/ "Ropas de laboratorio\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obtén el Conector de Datos.\n", + /* 25*/ "Técnico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con éxito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexión perdida.\n", + /* 32*/ "Obtén llave magnética del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave magnética del lab. 2\n", + /* 35*/ "Llave magnética del lab. 2\n", + /* 36*/ "Llave magnética del lab. 2 obtenida.\n", + /* 37*/ "¿Y tú quién eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "¡Socorro, socorro!\n", + /* 40*/ "¡No me dispares!\n", + /* 41*/ "¡Oh, Dios mío, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... ¡o verás!\n", + /* 44*/ "Vale. ¡Tú lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "¡¡¡No tengo tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "Así que por fin has llegado.\n", + /* 51*/ "Hey, tú no eres... ¡ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aquí. Deja tu arma.\n", + /* 53*/ "No te lo diré de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te están esperando...\n", + /* 56*/ "Ha muerto personal crítico de la misión.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, ése no es Harry. Es un intruso.\n", + /* 59*/ "Obtén llave magnética del quirófano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave magnética del quirófano\n", + /* 62*/ "Llave magnética del quirófano\n", + /* 63*/ "Llave magnética del quirófano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "¡Salgamos de aquí!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crítico de la misión destruido.\n", + /* 69*/ "Obtén Escáner de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Escáner de Rayos-X\n", + /* 72*/ "Escáner de Rayos-X\n", + /* 73*/ "Escáner de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexión del escáner perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura está bajando... Debes de estar \ncerca de la sala de criogenización.\n", + /* 80*/ "El aire está fuertemente reciclado aquí: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "¡Ahí está, Joanna! ¡Deprisa o será tarde!\n", + /* 82*/ "Salga de este área.\n", + /* 83*/ "¿Debe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "¡Es una espía!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "¡Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningún \nmodo de entrar en la sección de desarrollo. \nEl único camino disponible es una parte \ndébil del muro que he marcado en la \nhabitación tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ¿Dónde\nestán esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso sí, los almacenes están repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ¿Alguna otra perla de sabiduría?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "¿Sí?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si sólo pudiera luchar contra \nel impulso de informar de él a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\nalienígena.\n", + /*101*/ "¿Qué demonios te crees que estás haciendo? \n¡Esto se supone que es una sala sellada! \n¿No sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetírselo, Doctor. Y \napague ese láser.\n", + /*103*/ "El Director Easton se enterará de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su alienígena.\n", + /*105*/ "Defensas Automáticas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lueE.c b/src/files/lang/pal-beta/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-beta/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-beta/lueJ.c b/src/files/lang/pal-beta/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/pal-beta/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/lueP.c b/src/files/lang/pal-beta/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-beta/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_f.c b/src/files/lang/pal-beta/lue_str_f.c new file mode 100644 index 000000000..56f6e3d5c --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Désactiver robots Interceptors au sol\n\nUne fois le radar coupé, les robots Interceptors vous poseront un problème. Détruisez un maximum d'unités au sol. Notre dernière photo satellite en révèle deux mais il risque d'y en avoir ,plus.\n\n|Objectif 4: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer Déroute-Comms sur antenne\n", + /* 11*/ "Désactiver robots Interceptors au sol\n", + /* 12*/ "Accéder à l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor désactivé.\n", + /* 20*/ "Tous robots Interceptors désactivés.\n", + /* 21*/ "Obtenir Déroute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "Déroute-Comms\n", + /* 24*/ "Déroute-Comms\n", + /* 25*/ "Déroute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication placé correctement.\n", + /* 27*/ "Mouchard de communication mal placé.\n", + /* 28*/ "Antenne détruite.\n", + /* 29*/ "Antenne levée.\n", + /* 30*/ "Antenne baissée.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Accès ascenseur refusé - carte requise.\n", + /* 37*/ "Carte acceptée - ascenseur opérationnel.\n", + /* 38*/ "Ascenseur opérationnel.\n", + /* 39*/ "Hangar pénétré.\n", + /* 40*/ "Agent de l'IC contacté.\n", + /* 41*/ "Radar d'interception coupé.\n", + /* 42*/ "Objet crucial détruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale fermée.\n", + /* 45*/ "Accès refusé.\n", + /* 46*/ "Explosif placé.\n", + /* 47*/ "Intrus détecté - systèmes sécurité branchés.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrôlé depuis\nce bunker.\n", + /* 54*/ "Voilà l'antenne, mais... Je ne peux pas lancer\nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derrière \ncette grande porte.\n", + /* 56*/ "Attention à ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'accès ascenseur détruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltré \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entrée: un héliport \nabandonné en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derrière ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun Déroute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention à la résistance.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas blessé \nbien qu'il n'ait pas encore repris ses \nesprits. De toute évidence, les chirurgiens \nont presque achevé leurs préparations \net vont bientôt entamer la dissection.\n", + /* 64*/ "Mais qui était...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28.\nJe suis sur le point d'accéder au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voilà, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous étiez mort. Vous devez \navoir une bonne étoile pour être \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-être que ce garde vous \ndescende? Très bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je préviens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet étranger détecté - sécurité alertée.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_g.c b/src/files/lang/pal-beta/lue_str_g.c new file mode 100644 index 000000000..34ed974c4 --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter außer Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Beschädigen Sie so viele Einheiten, wie möglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es können sich noch weitere Roboter am Gelände befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter außer Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen.\n", + /* 19*/ "Abfang-Roboter außer Kraft gesetzt.\n", + /* 20*/ "Alle Abfang-Roboter wurden außer Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen.\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstört.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlüsselkarte für den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlüsselkarte\n", + /* 34*/ "Schlüsselkarte\n", + /* 35*/ "Schlüsselkarte aufgenommen.\n", + /* 36*/ "Zutritt zum Aufzug verweigert. - Schlüsselkarte wird benötigt.\n", + /* 37*/ "Schlüsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstört.\n", + /* 43*/ "Haupttor wurde geöffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert.\n", + /* 46*/ "Sprengkörper wurde platziert.\n", + /* 47*/ "Eindringling erfasst - Überwachungssystem ist online.\n", + /* 48*/ "Erlangen Sie die Sprengsätze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengsätze\n", + /* 51*/ "Sprengsätze\n", + /* 52*/ "Sprengsätze aufgenommen.\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den Überbrücker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervösen Zeigefinger, Agent Dark - \nDu näherst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstört.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren können. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als wäre er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nhätten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drüben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt überlebt hast.\n", + /* 71*/ "Ich musste ja die Löcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Löcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwürdest, wenn er auf dich geschossen hätte. Aber wenn \ndu möchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkörper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_i.c b/src/files/lang/pal-beta/lue_str_i.c new file mode 100644 index 000000000..350663cc4 --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti più possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna è stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore è in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea è \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lassù!\n", + /* 55*/ "L'ascensore dell'hangar è oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 è riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo ~e il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c'è un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No? Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nSecondo le mie valutazioni sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri già fatto scoprire! \nE francamente se questo è il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per più di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicherò all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/pal-beta/lue_str_s.c b/src/files/lang/pal-beta/lue_str_s.c new file mode 100644 index 000000000..23b13d13e --- /dev/null +++ b/src/files/lang/pal-beta/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor aéreo apagado, los propios robots interceptores serán un problema. Destruye tantas unidades en tierra como sea posible; nuestra última foto de satélite muestra dos en tierra, pero quizá haya más.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 1*/ "ÁREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeado de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor aéreo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espía del IC\n", + /* 14*/ "Obtén granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores están desactivados.\n", + /* 21*/ "Obtén controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Contr. comunicaciones\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obtén llave magnética del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave magnética del ascensor\n", + /* 34*/ "Llave magnética del ascensor\n", + /* 35*/ "Llave magnética del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magnética requerida.\n", + /* 37*/ "Llave magnética aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor está completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor aéreo apagado.\n", + /* 42*/ "Objeto crítico de la misión destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obtén explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor aéreo es controlado desde \nese búnker.\n", + /* 54*/ "Ahí está la antena, pero... ¡no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar está al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark - \nlo estás acercando a mi posición.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el Área 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "Éste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro están detrás de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aquí está la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando estés dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "¡Oh, Dios mío!\n", + /* 63*/ "Aquí está nuestro amigo. Parece que no \nestá físicamente dañado, aunque no ha \nrecuperado la consciencia todavía. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzarán \npronto con la disección.\n", + /* 64*/ "¿Pero quién fue...?\n", + /* 65*/ "¿Alguna pregunta? No. Bien. Después \nirás al hangar.\n", + /* 66*/ "Informe de Misión del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el Área 51.\n", + /* 67*/ "¡Agente Dark! ¡Aquí!\n", + /* 68*/ "¡Aquí estás! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "¿Si qué?\n", + /* 70*/ "Si habías sido descubierto ya. Y francamente, \nsi así es como trabajas, estoy asombrada de \nque hayas sobrevivido más de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "¿Mis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que él \nte disparara. Puedo llamar a más guardas \nsi tú quieres...\n", + /* 74*/ "Vale, vale, olvídalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extraño detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/pal-beta/miscE.c b/src/files/lang/pal-beta/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/miscJ.c b/src/files/lang/pal-beta/miscJ.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/miscP.c b/src/files/lang/pal-beta/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-beta/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_f.c b/src/files/lang/pal-beta/misc_str_f.c new file mode 100644 index 000000000..0505e9412 --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succès\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas ça sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Bouclier-Sim", + /* 35*/ "Roquette-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "Lâche-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Vendetta-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Vengeance-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un débutant. Il n'est pas très malin et vise très mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacités de base mais il peut être dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les mêmes capacités que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les mêmes capacités qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour améliorer leurs capacités.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg développé par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et récupère les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sûr lui tirer dessus et il en fera peut-être tomber!\n", + /* 52*/ "Bouclier-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'énergie, Il ira chercher un nouveau bouclier. Cela n'a aucun intérêt s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roquette-Sim: Ce simulant adore tout faire sauter. Il préfère l'armement explosif plutôt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour détruire sa cible. Il est très aggressif et ne garde jamais ses distances - même s'il tient une grenade! Faites attention à quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant déteste les armes mais il est en revanche un adversaire teigneux. Il tentera sans arrêt d'assommer ou de désarmer ses adversaires à mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant préfère attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et désarmés ou encore ceux affaiblis par un combat.\n", + /* 57*/ "Lâche-Sim: Ce simulant ne veut pas combattre et préfère fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inférieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il déteste les méthodes du Proie-Sim. Il essaiera de tuer le joueur en tête pour arrondir les scores.\n", + /* 59*/ "Vendetta-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Vendetta-Sim poursuit un joueur jusqu'à la fin de la partie! Même tué, il reviendra à la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, à moins de connaître un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un générateur de bouclier développé par les scientifiques de la dataDyne. Le générateur projète un bouclier deux fois plus résistant qu'un bouclier normal. Malheureusement, il réduit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil même s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Vengeance-Sim: Ce simulant attaquera toujours le dernier joueur à l'avoir attaqué ou tué. Réfléchissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Mystère skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base aérienne", + /* 89*/ "Base aérienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "Défense Institut", + /* 99*/ "Défense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "Générique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "Défendre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "Télécharger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer boîte\n", + /*122*/ "Tué(e) par", + /*123*/ "Tué", + /*124*/ "Débutant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2ème classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent Spécial:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Vétéran:11\n", + /*135*/ "Professionnel:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Quasi-Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "Déf. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "Décapsuleur\n", + /*153*/ "Protéger\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOSé\n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rinçage bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilisé", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu prédéfini\n", + /*184*/ "Démarrage rapide\n", + /*185*/ "Réglages avancés\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. équipe\n", + /*189*/ "Réglages terminés\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par équipe\n", + /*196*/ "Difficulté des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "Réglages joueur\n", + /*200*/ "Réglages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Prêt!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission précédente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_g.c b/src/files/lang/pal-beta/misc_str_g.c new file mode 100644 index 000000000..8638f7ac3 --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Für diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENÜGEND - Mission abbrechen.\n", + /* 9*/ "Wachgruß.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "KamikazeSim", + /* 37*/ "FaustSim", + /* 38*/ "JägerSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendettaSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend für Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein mäßiger Schütze.\n", + /* 46*/ "LeichtSim: Der Simulant verfügt zwar nur über Basis-Intelligenz und -Fähigkeiten, ist aber trotzdem nicht ungefährlich.\n", + /* 47*/ "NormalSim: Der Simulant verfügt über das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfügt über das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. Äußerst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen Fähigkeiten dadurch ständig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun können.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schießen, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "ShieldSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natürlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenüber Pistolen und Automatik-Gewehren vor. Zu ersteren gehören auch Waffen, die eine 'explosive' Sekundär-Funktion haben.\n", + /* 54*/ "KamikazeSim: Dieser Simulant lässt sich durch nichts aufhalten. Er ist sehr aggressiv und hält keine Distanz zum Gegner. Auch nicht, wenn er eine Granate hält! Seien Sie äußerst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, ähnlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine Fäuste einsetzen. Er wird ständig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "JägerSim: Dieser Simulant jagt bevorzugt schwächere Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, über schwache Bewaffnung verfügen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu kämpfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner über eine schwache Waffe verfügt. Ziehen Sie eine stärkere Waffe, und er wird flüchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des JägerSim. Er wird immer den stärksten Spieler verfolgen, um für einen gleichmäßigen Score zu sorgen.\n", + /* 59*/ "VendettaSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendettaSim verfolgt diesen Spieler, bis das Spiel vorüber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurück.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen überlegen, daher hat es keinen Sinn, vor ihnen zu flüchten. (Es sei denn, Sie kennen eine Abkürzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfügt über eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Träger, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschränkt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrüstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schießen, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tränen", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Stützpunkt", + /* 89*/ "Stützpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zufällig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anfänger:21\n", + /*125*/ "Auszubildender:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Grünschnabel:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spezial-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gefährlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tödlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstörer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Unbezwingbar:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hügel\n", + /*150*/ "Halte Hügel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschütze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht genügend Platz ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_i.c b/src/files/lang/pal-beta/misc_str_i.c new file mode 100644 index 000000000..44ab48cfc --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos'è quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodardo", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendika", + /* 45*/ "RepPappa: È il replicante più facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non è molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: È dotato di abilità e intelligenza elementari, ma può rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilità sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilità sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il più intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacità.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non è umano, quindi potrebbe avere abilità sovrumane!\n", + /* 51*/ "RepPace: È un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli è probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: È sempre alla ricerca del massimo scudo protettivo. Se perde energia, andrà alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo è distruggere l'avversario ad ogni costo. È molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perciò è molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante è contro l'uso delle armi. Tuttavia non è contro la lotta corpo a corpo:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodardo: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapperà!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguirà quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: È agilissimo e velocissimo: corre molto più veloce del giocatore umano, quindi è inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte più potente di uno scudo normale. Questo però lo impedisce nei movimenti, per cui è molto lento. Il RepTarta è dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendika: Sparando o uccidendo un RepVendika, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "CI Operative", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "Quartier Generale dD", + /* 71*/ "Quartier Generale dD X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave d'assalto", + /*101*/ "Astronave d'assalto X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Arma\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Principiante:21\n", + /*125*/ "Addestrato:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Agente di grado:14\n", + /*132*/ "Agente speciale:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Professionista:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulnerabile:3\n", + /*143*/ "Quasi Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis è morto.\n", + /*170*/ "Modalità 1", + /*171*/ "Modalità 2", + /*172*/ "Modalità 3", + /*173*/ "Modalità 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Nome", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficoltà replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/misc_str_s.c b/src/files/lang/pal-beta/misc_str_s.c new file mode 100644 index 000000000..20ea7d41c --- /dev/null +++ b/src/files/lang/pal-beta/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay información para esta misión\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misión.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "¿Qué arma es ésa?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/°", + /* 15*/ "y/°", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy Fácil", + /* 22*/ "Fácil", + /* 23*/ "Normal", + /* 24*/ "Difícil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMFácil", + /* 28*/ "SimFácil", + /* 29*/ "SimNormal", + /* 30*/ "SimDifíci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMFácil: Éste es el simulante más fácil de derrotar, y por lo tanto, la mejor elección para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimFácil: Este simulante tiene inteligencia y habilidades básicas; aún así puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifíci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante más inteligente y habilidoso. La mayoría de jugadores querrán usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibernético desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son científicos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... ¡no les importará soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la máxima protección de escudo. Si este simulante pierde algo de energía de su escudo, irá en busca de uno nuevo. ¡No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas, antes que las convencionales pistolas o automáticas. ¡Esto también se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendrá ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: ¡Incluso cuando lleva una granada! Se muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPacíficos. Aún así, no tiene reservas a la hora de combatir desarmado. Siempre intentará usar sus puños para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los débiles para conseguir muertes fáciles. Buscará jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, así que huirá para intentar sobrevivir. A veces atacará, pero sólo si el oponente tiene un arma inferior. ¡Saca un arma mayor o dispárale, y saldrá corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las tácticas del SimPredador. Siempre intentará matar al jugador que vaya ganando para así igualar los marcadores.\n", + /* 59*/ "SimPelea: ¡Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! ¡Un SimVenganza perseguirá al jugador hasta que se acabe el juego! Aunque muera, seguirá guardándote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. ¡Pueden atrapar fácilmente a un humano, así que no huyas de un SimLeopardo a menos que conozcas algún buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por científicos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, así que se moverá muy despacio. Los SimTortugas llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimRevancha, ya que siempre atacará al último jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Acción dataDyne", + /* 67*/ "Lágrimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigación dD", + /* 73*/ "Investigación dD X", + /* 74*/ "Extracción dD", + /* 75*/ "Extracción dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltración A51", + /* 83*/ "Infiltración A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base Aérea", + /* 89*/ "Base Aérea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Créditos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Función\n", + /*111*/ "Órdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener Maleta\n", + /*121*/ "Marcar Caja\n", + /*122*/ "Te mató", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aficionado:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "A. Estrella:14\n", + /*132*/ "A. Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profesional:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "Élite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "C. Perfecto:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletín\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIÓN NEC.:", + /*160*/ "PRECISIÓN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "¡PREPARADO!\n", + /*163*/ "LÍMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castaño", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafíos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo Rápido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Número de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida Rápida\n", + /*202*/ "¡Preparado!\n", + /*203*/ "Equipo Rápido\n", + /*204*/ "Sólo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misión Previa\n", + /*212*/ "Holografía\n", + /*213*/ "Agresivo\n", + /*214*/ "Pasivo\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigiloso\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mp10E.c b/src/files/lang/pal-beta/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10J.c b/src/files/lang/pal-beta/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10P.c b/src/files/lang/pal-beta/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_f.c b/src/files/lang/pal-beta/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_g.c b/src/files/lang/pal-beta/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_i.c b/src/files/lang/pal-beta/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp10_str_s.c b/src/files/lang/pal-beta/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11E.c b/src/files/lang/pal-beta/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11J.c b/src/files/lang/pal-beta/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11P.c b/src/files/lang/pal-beta/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_f.c b/src/files/lang/pal-beta/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_g.c b/src/files/lang/pal-beta/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_i.c b/src/files/lang/pal-beta/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp11_str_s.c b/src/files/lang/pal-beta/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12E.c b/src/files/lang/pal-beta/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12J.c b/src/files/lang/pal-beta/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12P.c b/src/files/lang/pal-beta/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_f.c b/src/files/lang/pal-beta/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_g.c b/src/files/lang/pal-beta/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_i.c b/src/files/lang/pal-beta/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp12_str_s.c b/src/files/lang/pal-beta/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13E.c b/src/files/lang/pal-beta/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13J.c b/src/files/lang/pal-beta/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13P.c b/src/files/lang/pal-beta/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_f.c b/src/files/lang/pal-beta/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_g.c b/src/files/lang/pal-beta/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_i.c b/src/files/lang/pal-beta/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp13_str_s.c b/src/files/lang/pal-beta/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14E.c b/src/files/lang/pal-beta/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14J.c b/src/files/lang/pal-beta/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14P.c b/src/files/lang/pal-beta/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_f.c b/src/files/lang/pal-beta/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_g.c b/src/files/lang/pal-beta/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_i.c b/src/files/lang/pal-beta/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp14_str_s.c b/src/files/lang/pal-beta/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15E.c b/src/files/lang/pal-beta/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15J.c b/src/files/lang/pal-beta/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15P.c b/src/files/lang/pal-beta/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_f.c b/src/files/lang/pal-beta/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_g.c b/src/files/lang/pal-beta/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_i.c b/src/files/lang/pal-beta/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp15_str_s.c b/src/files/lang/pal-beta/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16E.c b/src/files/lang/pal-beta/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16J.c b/src/files/lang/pal-beta/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16P.c b/src/files/lang/pal-beta/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_f.c b/src/files/lang/pal-beta/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_g.c b/src/files/lang/pal-beta/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_i.c b/src/files/lang/pal-beta/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp16_str_s.c b/src/files/lang/pal-beta/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17E.c b/src/files/lang/pal-beta/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17J.c b/src/files/lang/pal-beta/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17P.c b/src/files/lang/pal-beta/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_f.c b/src/files/lang/pal-beta/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_g.c b/src/files/lang/pal-beta/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_i.c b/src/files/lang/pal-beta/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp17_str_s.c b/src/files/lang/pal-beta/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18E.c b/src/files/lang/pal-beta/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18J.c b/src/files/lang/pal-beta/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18P.c b/src/files/lang/pal-beta/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_f.c b/src/files/lang/pal-beta/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_g.c b/src/files/lang/pal-beta/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_i.c b/src/files/lang/pal-beta/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp18_str_s.c b/src/files/lang/pal-beta/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19E.c b/src/files/lang/pal-beta/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19J.c b/src/files/lang/pal-beta/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19P.c b/src/files/lang/pal-beta/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_f.c b/src/files/lang/pal-beta/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_g.c b/src/files/lang/pal-beta/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_i.c b/src/files/lang/pal-beta/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp19_str_s.c b/src/files/lang/pal-beta/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1E.c b/src/files/lang/pal-beta/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1J.c b/src/files/lang/pal-beta/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1P.c b/src/files/lang/pal-beta/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_f.c b/src/files/lang/pal-beta/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_g.c b/src/files/lang/pal-beta/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_i.c b/src/files/lang/pal-beta/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp1_str_s.c b/src/files/lang/pal-beta/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20E.c b/src/files/lang/pal-beta/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20J.c b/src/files/lang/pal-beta/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20P.c b/src/files/lang/pal-beta/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_f.c b/src/files/lang/pal-beta/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_g.c b/src/files/lang/pal-beta/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_i.c b/src/files/lang/pal-beta/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp20_str_s.c b/src/files/lang/pal-beta/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2E.c b/src/files/lang/pal-beta/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2J.c b/src/files/lang/pal-beta/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2P.c b/src/files/lang/pal-beta/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_f.c b/src/files/lang/pal-beta/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_g.c b/src/files/lang/pal-beta/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_i.c b/src/files/lang/pal-beta/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp2_str_s.c b/src/files/lang/pal-beta/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3E.c b/src/files/lang/pal-beta/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3J.c b/src/files/lang/pal-beta/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3P.c b/src/files/lang/pal-beta/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_f.c b/src/files/lang/pal-beta/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_g.c b/src/files/lang/pal-beta/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_i.c b/src/files/lang/pal-beta/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp3_str_s.c b/src/files/lang/pal-beta/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4E.c b/src/files/lang/pal-beta/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4J.c b/src/files/lang/pal-beta/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4P.c b/src/files/lang/pal-beta/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_f.c b/src/files/lang/pal-beta/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_g.c b/src/files/lang/pal-beta/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_i.c b/src/files/lang/pal-beta/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp4_str_s.c b/src/files/lang/pal-beta/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5E.c b/src/files/lang/pal-beta/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5J.c b/src/files/lang/pal-beta/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5P.c b/src/files/lang/pal-beta/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_f.c b/src/files/lang/pal-beta/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_g.c b/src/files/lang/pal-beta/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_i.c b/src/files/lang/pal-beta/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp5_str_s.c b/src/files/lang/pal-beta/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6E.c b/src/files/lang/pal-beta/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6J.c b/src/files/lang/pal-beta/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6P.c b/src/files/lang/pal-beta/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_f.c b/src/files/lang/pal-beta/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_g.c b/src/files/lang/pal-beta/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_i.c b/src/files/lang/pal-beta/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp6_str_s.c b/src/files/lang/pal-beta/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7E.c b/src/files/lang/pal-beta/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7J.c b/src/files/lang/pal-beta/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7P.c b/src/files/lang/pal-beta/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_f.c b/src/files/lang/pal-beta/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_g.c b/src/files/lang/pal-beta/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_i.c b/src/files/lang/pal-beta/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp7_str_s.c b/src/files/lang/pal-beta/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8E.c b/src/files/lang/pal-beta/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8J.c b/src/files/lang/pal-beta/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8P.c b/src/files/lang/pal-beta/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_f.c b/src/files/lang/pal-beta/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_g.c b/src/files/lang/pal-beta/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_i.c b/src/files/lang/pal-beta/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp8_str_s.c b/src/files/lang/pal-beta/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9E.c b/src/files/lang/pal-beta/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9J.c b/src/files/lang/pal-beta/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9P.c b/src/files/lang/pal-beta/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_f.c b/src/files/lang/pal-beta/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_g.c b/src/files/lang/pal-beta/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_i.c b/src/files/lang/pal-beta/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mp9_str_s.c b/src/files/lang/pal-beta/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/mpmenuE.c b/src/files/lang/pal-beta/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenuJ.c b/src/files/lang/pal-beta/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpmenuP.c b/src/files/lang/pal-beta/mpmenuP.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_f.c b/src/files/lang/pal-beta/mpmenu_str_f.c new file mode 100644 index 000000000..9fa83a5c1 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? Où?\n", + /* 2*/ "Le moins protégé\n", + /* 3*/ "Le mieux protégé\n", + /* 4*/ "Tireur d'élite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus pétochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Durée de vie Mini\n", + /* 13*/ "Duréede vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Paramètres jeu\n", + /* 18*/ "Charger paramètres\n", + /* 19*/ "Scénario\n", + /* 20*/ "Arènes\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauvegarder paramètres\n", + /* 27*/ "Abandonner jeu\n", + /* 28*/ "Paramètres joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Abandonner\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauver copie du joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms équipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Dernier vainqueur\n", + /* 47*/ "Dernier perdant\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\narrêter la partie?\n", + /* 54*/ "Arrêter\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms équipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom équipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. équipe\n", + /* 71*/ "Equipes activées\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux équipes\n", + /* 77*/ "Trois équipes\n", + /* 78*/ "Quatre équipes\n", + /* 79*/ "Maximum équipes\n", + /* 80*/ "Humains contre Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficulté:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants spéciaux\n", + /*105*/ "Prêt!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "Rétablir par défaut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Arènes\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrepôt", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "Félicité", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger paramètres jeu\n", + /*140*/ "%s: Scénario: %s Arène: %s Simulants: %d", + /*141*/ "Présélections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger tête...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tués:\n", + /*147*/ "Morts:\n", + /*148*/ "Précision:\n", + /*149*/ "Tirs tête:\n", + /*150*/ "Mun. utilisées:\n", + /*151*/ "Dégâts infligés:\n", + /*152*/ "Dégâts reçus:\n", + /*153*/ "Parties jouées:\n", + /*154*/ "Parties gagnées:\n", + /*155*/ "Parties perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "Médailles gagnées:\n", + /*159*/ " Précision:\n", + /*160*/ " Tirs tête:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges complétés\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir récup.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir équipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Paramètres armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver paramètres jeu\n", + /*184*/ "Voulez-vous écraser\nvotre fichier original?\n", + /*185*/ "Ecraser fichier original\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer un nom pour votre\nfichier de paramètres:\n", + /*190*/ "Confirmer\n", + /*191*/ "Votre fichier joueur\nest toujours sauvé\nautomatiquement.\n", + /*192*/ "Sauver une copie maintenant?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Abandonner\n", + /*196*/ "Voulez-vous vraiment\nabandonner?\n", + /*197*/ "Abandonner\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. tête\n", + /*204*/ "Visée auto\n", + /*205*/ "Contrôle visée\n", + /*206*/ "Cible à l'écran\n", + /*207*/ "Voir cible\n", + /*208*/ "Portée zoom\n", + /*209*/ "Munit. à l'écran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Maintenu\n", + /*214*/ "Fixe\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options décapsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options boîtes\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher équipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans visée auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir récup.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "Boîtes sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Custom\n", + /*243*/ "Scénario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "Décapsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Toucher la boîte", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "Décaps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "Boîtes", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de prédilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2ème\n", + /*266*/ "3ème\n", + /*267*/ "4ème\n", + /*268*/ "5ème\n", + /*269*/ "6ème\n", + /*270*/ "7ème\n", + /*271*/ "8ème\n", + /*272*/ "9ème\n", + /*273*/ "10ème\n", + /*274*/ "11ème\n", + /*275*/ "12ème\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement équipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tués\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sûr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entraînement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "Véhicules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entraînement\n", + /*424*/ "Temps écoulé:\n", + /*425*/ "Succès!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez éteindre votre ordinateur en toute sécurité.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficulté\n", + /*443*/ "Difficulté:\n", + /*444*/ "Choix difficulté:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entraînement\n", + /*448*/ "Stats entraînement\n", + /*449*/ "Succès!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles détruites:\n", + /*452*/ "Difficulté:\n", + /*453*/ "Temps écoulé:\n", + /*454*/ "Arme:\n", + /*455*/ "Précision:\n", + /*456*/ "Pas échoué\n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop imprécis\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Précision Mini:\n", + /*474*/ "Cibles à détruire:\n", + /*475*/ "Score à atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Terminé\n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activés.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Initializing Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_g.c b/src/files/lang/pal-beta/mpmenu_str_g.c new file mode 100644 index 000000000..8e7e91577 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Der Suizidalste\n", + /* 1*/ "Wer braucht Muni?\n", + /* 2*/ "Am wenigsten beschildet\n", + /* 3*/ "Bestgeschützter\n", + /* 4*/ "Der Treffsicherste\n", + /* 5*/ "Der Professionellste\n", + /* 6*/ "Der Gefährlichste\n", + /* 7*/ "Der Harmloseste\n", + /* 8*/ "Der Feigste\n", + /* 9*/ "Der Verzweifeltste\n", + /* 10*/ "Der Ehrenhafteste\n", + /* 11*/ "Der Unehrenhafteste\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Dreifach-Treffer\n", + /* 16*/ "Vierfach-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Einstellungen laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Einstellungen speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Spieler nochmals speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzter Gewinner\n", + /* 47*/ "Letzter Verlierer\n", + /* 48*/ "zufällig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Sind Sie sicher, dass Sie\ndas Spiel abbrechen möchten?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurück\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurück\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurück\n", + /* 61*/ "Team-Name ändern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Soundtracks\n", + /* 65*/ "Zurück\n", + /* 66*/ "Multiple Soundtracks\n", + /* 67*/ "zufällig\n", + /* 68*/ "Wähle Soundtracks\n", + /* 69*/ "Wähle Soundtrack\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams ermächtigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurück\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Simulanten\n", + /* 81*/ "Menschen-Simulanten Paare\n", + /* 82*/ "Zurück\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufügen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle löschen\n", + /* 94*/ "Zurück\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant löschen\n", + /* 99*/ "Zurück\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufügen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurück\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zufällig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kanäle", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "Dächer", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glückseligkeit", + /*136*/ "Zufällig", + /*137*/ "Spieler laden\n", + /*138*/ "B-Knopf für Abbruch\n", + /*139*/ "Spieleinstellungen laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik für %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Verbrauchte Muni:\n", + /*151*/ "Schaden verursacht:\n", + /*152*/ "Schmerzen ertragen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschütze:\n", + /*162*/ " Überlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurück\n", + /*165*/ "Challenges komplettiert\n", + /*166*/ "Zurück\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurück\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurück\n", + /*183*/ "Einstellungen speichern\n", + /*184*/ "Möchten Sie das \nbestehende File\nüberschreiben?\n", + /*185*/ "Überschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Bestätigen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Sind Sie sicher, dass\nSie abbrechen wollen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurück\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurück\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hügel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht anzeigen\n", + /*229*/ "Items nicht anzeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hügel am Radar zeigen\n", + /*234*/ "Mobiler Hügel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Aktenkoffer anzeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurück\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei für alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Verteidigen Sie den Aktenkoffer", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hügels", + /*251*/ "Schnapp den Koffer", + /*252*/ "Berühr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hügel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik für %s", + /*281*/ "Selber Schuld\n", + /*282*/ "Versuche\n", + /*283*/ "Treffer\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurück\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "Wähle den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo möchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "möchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie können jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. Wählen Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "wählen Sie ihn aus dem Charakter-Menü vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Menü.\n", + /*404*/ "Die gewünschten Köpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie können den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Drücken Sie den B-Knopf, um zurückzukehren.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Geräte-Liste\n", + /*418*/ "Information\n", + /*419*/ "Örtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "benötigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurück\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Drücken Sie den B-Knopf, um zurückzukehren.\n", + /*436*/ "Cheats\n", + /*437*/ "Sie können das Gerät jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "Wählen Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Getroffene Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "benötigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score unerreichbar\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, können Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurück\n", + /*482*/ "Spieler %d: ", + /*483*/ "Drücken Sie START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak wird geprüft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_i.c b/src/files/lang/pal-beta/mpmenu_str_i.c new file mode 100644 index 000000000..3ac5cda70 --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita più breve\n", + /* 13*/ "Vita più lunga\n", + /* 14*/ "Ucciso 2 volte\n", + /* 15*/ "Ucciso 3 volte\n", + /* 16*/ "Ucciso 4 volte\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientazione\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocatore\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincitore\n", + /* 47*/ "Ultimo perdente\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Più brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficoltà:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicità", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statist. per %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore è\nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "Sì\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalità comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "Sì\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma più usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statist. per %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vittime\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo di gioco:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate più macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondità\n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosità\n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima però accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statist. esercitaz.\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Età:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficoltà\n", + /*443*/ "Difficoltà:\n", + /*444*/ "Seleziona difficoltà:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Info esercitaz.\n", + /*448*/ "Statist. esercitaz.\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficoltà:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Totale colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finché i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/pal-beta/mpmenu_str_s.c b/src/files/lang/pal-beta/mpmenu_str_s.c new file mode 100644 index 000000000..f7dcd58bb --- /dev/null +++ b/src/files/lang/pal-beta/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El más Suicida\n", + /* 1*/ "¿Qué es munición?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntería\n", + /* 5*/ "El más Profesional\n", + /* 6*/ "El más Mortífero\n", + /* 7*/ "El más Inofensivo\n", + /* 8*/ "El más Cobarde\n", + /* 9*/ "El más Frenético\n", + /* 10*/ "El más Honorable\n", + /* 11*/ "El más Deshonorable\n", + /* 12*/ "La Vida más Corta\n", + /* 13*/ "La Vida más Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cuádruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Parámetros\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Límites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Parámetros\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "Hándicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones de Jugador\n", + /* 35*/ "Estadísticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia del Jugador\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "Último Ganador\n", + /* 47*/ "Último Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafío\n", + /* 50*/ "Desafíos de Combate\n", + /* 51*/ "Abortar Desafío\n", + /* 52*/ "Abortar\n", + /* 53*/ "¿Estás seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre de Equipo\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Múltiples Melodías\n", + /* 65*/ "Volver\n", + /* 66*/ "Múltiples Melodías\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodías\n", + /* 69*/ "Elegir Melodía\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "Máximo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Añadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Añadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "¡Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Límites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Parámetros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin límite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Clásico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberías", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almacén", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "Área 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botón B para cancelar\n", + /*139*/ "Cargar Parámetros de Juego\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estadísticas de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisión:\n", + /*149*/ "Tiros a la Cabeza:\n", + /*150*/ "Munición Usada:\n", + /*151*/ "Daño Causado:\n", + /*152*/ "Dolor Recibido:\n", + /*153*/ "N° de Juegos:\n", + /*154*/ "Juegos Ganados:\n", + /*155*/ "Juegos Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisión:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Maestro Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Título:\n", + /*164*/ "Volver\n", + /*165*/ "Desafíos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Conf. de Juego\n", + /*184*/ "¿Quieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre el Original\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautomáticamente.\n", + /*192*/ "¿Guardar una copia ahora?\n", + /*193*/ "No\n", + /*194*/ "Sí\n", + /*195*/ "Abandonar\n", + /*196*/ "¿Seguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Munición en Pantalla\n", + /*210*/ "Función del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletín\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "Cámara Lenta\n", + /*224*/ "Movimiento Rápido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jugadores\n", + /*229*/ "Sin Destacar Objetos\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Móvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletín\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "Sí\n", + /*242*/ "Inteligente\n", + /*243*/ "Escenario\n", + /*244*/ "¡Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mantén el Maletín", + /*248*/ "Central Hacker", + /*249*/ "Tú la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura la Caja", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletín", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturas", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Título:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Situación Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situación Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Ac.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "¿Estás seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "¿Dónde querrás usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. Cámara\n", + /*310*/ "Inserta tu cámara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "¡Cámara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reinténtalo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir Cámara\n", + /*322*/ "Más de una cámara detectada.\n", + /*323*/ "Por favor, elige qué cámara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la Cámara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la Cámara\n", + /*331*/ "Elige foto a cargar de la cámara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "¡Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "¿Estás seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "¿Estás seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "¿Quieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendrán en la memoria.\n", + /*388*/ "¿Quieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegúrate de que el Controller Pak\n", + /*397*/ "está insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "¡Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el menú de personajes\n", + /*403*/ "en el menú de parámetros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misión aparecerán en\n", + /*405*/ "cualquier misión que juegues.\n", + /*406*/ "Puedes editar más tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botón B para volver.\n", + /*415*/ "Información del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Información\n", + /*419*/ "Lugares\n", + /*420*/ "Vehículos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Información Adicional\n", + /*423*/ "Estadísticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "¡Completado!\n", + /*426*/ "¡Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botón B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Información de Entrenamiento\n", + /*448*/ "Estadísticas de Entrenamiento\n", + /*449*/ "¡Completado!\n", + /*450*/ "Puntuación:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisión:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Munición\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuación Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "T. Impactos \n", + /*466*/ "Puntuación\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Límite de Munición:\n", + /*472*/ "Límite de Tiempo:\n", + /*473*/ "Precisión Mínima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuación Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, serás\nincapaz de avanzar más en el juego\nmientras ese truco esté activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "¡Pulsa START!\n", + /*484*/ "¡Buscando Cámara!\n", + /*485*/ "Calibrando Cámara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Comprobando Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de Cámara\n", + /*495*/ "Por favor, espera...\n", +}; diff --git a/src/files/lang/pal-beta/mpweaponsE.c b/src/files/lang/pal-beta/mpweaponsE.c new file mode 100644 index 000000000..82bf32092 --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsE.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweaponsJ.c b/src/files/lang/pal-beta/mpweaponsJ.c new file mode 100644 index 000000000..130bf580f --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsJ.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Capture the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Flag\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak Inserted\n", + /* 66*/ "is damaged or inserted\n", + /* 67*/ "incorrectly.\n", + /* 68*/ "Please remove and try again.\n", + /* 69*/ "Full Controller Pak Inserted\n", + /* 70*/ "is too full to save files.\n", + /* 71*/ "Use the Game Notes Editor to\n", + /* 72*/ "free some space (hold START\n", + /* 73*/ "while powering up.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "Superdragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP7\n", + /*111*/ "DD44\n", + /*112*/ "Klobb\n", + /*113*/ "KF7 Soviet\n", + /*114*/ "ZMG (9mm)\n", + /*115*/ "D5K\n", + /*116*/ "AR33\n", + /*117*/ "RC-P90\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak could\nnot be repaired.\n", + /*185*/ "L/R: ", + /*186*/ "C-UP: ", + /*187*/ "C-L/R: ", + /*188*/ "C-DOWN: ", + /*189*/ "A: ", + /*190*/ "B: ", + /*191*/ "STICK: ", + /*192*/ "Z: ", + /*193*/ "D-PAD: ", + /*194*/ "AIM TOGGLE", + /*195*/ "LOOK UP / GET UP", + /*196*/ "STRAFE", + /*197*/ "LOOK DOWN / CROUCH", + /*198*/ "CHANGE GUN / ACTIVEMENU", + /*199*/ "RELOAD / ACTION / SECONDARY FIRE", + /*200*/ "WALK AND TURN", + /*201*/ "FIRE", + /*202*/ "AS C-BUTTONS", + /*203*/ "Turn off all Cheats\n", + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, + /*264*/ NULL, + /*265*/ NULL, + /*266*/ NULL, + /*267*/ NULL, + /*268*/ NULL, + /*269*/ NULL, + /*270*/ NULL, + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweaponsP.c b/src/files/lang/pal-beta/mpweaponsP.c new file mode 100644 index 000000000..82bf32092 --- /dev/null +++ b/src/files/lang/pal-beta/mpweaponsP.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_f.c b/src/files/lang/pal-beta/mpweapons_str_f.c new file mode 100644 index 000000000..e1c69f1e5 --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_f.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%sobtient:\nRécepteur\n", + /* 1*/ "%sobtient:\nMallette\n", + /* 2*/ "%sobtient: %s Mallette\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "%s Mallette obtenu(e)", + /* 5*/ "Vous capturez:\n %sMallette\n", + /* 6*/ "%scapture notre\nMallette\n", + /* 7*/ "%scapture:\n%s Mallette\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien joué!\n", + /* 12*/ "Vous décapsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous êtes la victime!\n", + /* 15*/ "Protégez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "Téléchargement réussi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "Début téléchargement.\n", + /* 20*/ "Il faut utiliser le récepteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa capturé\nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "Lance-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquillisant\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps à corps\n", + /* 46*/ "Mine proximité\n", + /* 47*/ "Lance-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquillisant\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annulé\n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak inséré\n", + /* 66*/ "est endommagé ou mal\n", + /* 67*/ "branché.\n", + /* 68*/ "Tentative réparation\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Continuer sans utiliser\nle Controller Pak\n", + /* 71*/ "Controller Pak inséré\n", + /* 72*/ "n'a pas assez d'espace libre :\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n (maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings Hurricane\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. infinies, pas de rechargement\n", + /* 82*/ "1 joueur ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Visée classique\n", + /* 92*/ "Têtes équipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. infinies - Laptop Gun sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Emplacements cache armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scanner rayons X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Spécial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilité\n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "Désertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficulté:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coopératif\n", + /*134*/ "Triche Contre-Opération\n", + /*135*/ "Déshonoré\n", + /*136*/ "Triché\n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et accédez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Visée à l'écran\n", + /*147*/ "Cible\n", + /*148*/ "Portée zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "Séparation\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna Négociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Impossible effacer fichier:\nutilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score équipe:\n", + /*166*/ "Challenge réussi!\n", + /*167*/ "Challenge échoué!\n", + /*168*/ "Challenge triché!\n", + /*169*/ "Sous-titres ciné\n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enquête dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na été enlevé.\n", + /*176*/ "Tentative réparation\n", + /*177*/ "Voulez-vous tenter\nune réparation de\nce Controller Pak?\n", + /*178*/ "Les données peuvent se perdre!\n", + /*179*/ "Annuler\n", + /*180*/ "Réparer\n", + /*181*/ "Réparation réussie\n", + /*182*/ "Le Controller Pak a\nété réparé.\n", + /*183*/ "Réparation échouée\n", + /*184*/ "Le Controller Pak \nne peut être réparé.\nSauvegarde ou\nchargement impossible\navec ce Controller Pak.\n", + /*185*/ "Handicap joueur\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrôle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de précision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "Désactiver toutes les wtriches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix paramètres:\n", + /*224*/ "Vitesse de réaction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "Dégâts ennemis:\n", + /*227*/ "Précision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient déjà\n", + /*235*/ "un fichier nommé\n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Entrer nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut être effacé.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps spécial:\n", + /*244*/ "Nouvelle triche disponible!:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauvé\na été effacé:\ncorrupu ou\nendommagé.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nVérifier connexions et s'assurer\nque la bonne cartouche est\nutilisée.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a été\n", + /*259*/ "effacée: corrompue\n", + /*260*/ "ou endommagée.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Français\n", + /*265*/ "Deutsch\n", + /*266*/ "Italian\n", + /*267*/ "Español\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_g.c b/src/files/lang/pal-beta/mpweapons_str_g.c new file mode 100644 index 000000000..b08ceef69 --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_g.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat die %s Aktenkoffer\n", + /* 3*/ "%shat unsere\nAktenkoffer\n", + /* 4*/ "Hat die %s Aktenkoffer\n", + /* 5*/ "Sie haben die\n%s Aktenkoffer geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat unsere\n%s Aktenkoffer geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschützen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie müssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHügels!\n", + /* 22*/ "Der Hügel\nist unser!\n", + /* 23*/ "%shat den Hügel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Automatische Waffen\n", + /* 28*/ "Raketenwerfer\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hügels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Schnappen Sie den Aktenkoffer\n", + /* 33*/ "Ein Treffer ist zu viel\n", + /* 34*/ "Schnappen Sie den Koffer\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengsätze im Tempel\n", + /* 37*/ "Slayer\n", + /* 38*/ "Betäubungsgewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drücken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zufällig\n", + /* 44*/ "Fünf Zufällige\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "Annäherungs-Mine\n", + /* 47*/ "Raketenwerfer\n", + /* 48*/ "Granatwerfer\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Goldene Magnum\n", + /* 51*/ "Schwere Waffen\n", + /* 52*/ "Betäubungsgewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Automatische Waffen\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Controller Pak ist beschädigt.\n", + /* 66*/ "ist beschädigt oder nicht \n", + /* 67*/ "korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten benötigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMenü ausreichend Platz. \n(Halte während des Einschaltens \nSTART gedrückt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfügbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Köpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegrenzte Munition für die Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenwerfer\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Röntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen für Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe für Jo im Solo-Modus\n", + /*125*/ "dataDyne Überlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfügbar", + /*138*/ "Komplettierung", + /*139*/ "für den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als", + /*142*/ "oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Menü.", + /*143*/ "Wählen Sie den Cheat für mehr Infos aus.\n", + /*144*/ "Kumpel verfügbar", + /*145*/ "Erlangen Sie Gold am Schießstand, um klassische Waffen anzuwählen.\n", + /*146*/ "Bildschirm-Anzeigen\n", + /*147*/ "Ziel\n", + /*148*/ "Zoombereich anzeigen\n", + /*149*/ "Munition anzeigen\n", + /*150*/ "Waffen-Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Untertitel\n", + /*153*/ "Missionszeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Möchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterhändler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive Files \nkönnen nicht gelöscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Challenge abgeschlossen!\n", + /*167*/ "Challenge fehlgeschlagen!\n", + /*168*/ "Es wurde ein Cheat eingesetzt!\n", + /*169*/ "Zwischensequenzen Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Es könnten Daten verloren gehen!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur fehlgeschlagen\n", + /*184*/ "Das Controller Pak \nkann nicht repariert werden.\nSie können keine \nDaten laden \noder speichern.\n", + /*185*/ "Spieler-Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C-KNOPF OBEN: ", + /*188*/ "C-KNÖPFE LINKS/RECHTS: ", + /*189*/ "C-KNOPF UNEN: ", + /*190*/ "A-KNOPF: ", + /*191*/ "B-KNOPF: ", + /*192*/ "ANALOGER 3D-STICK: ", + /*193*/ "Z-TRIGGER: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "NACH OBEN SCHAUEN", + /*198*/ "NACH UNTEN SCHAUEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "NACH OBEN SCHAUEN", + /*201*/ "VORWÄRTS", + /*202*/ "RÜCKWÄRTS", + /*203*/ "AUSWEICHEN", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSWEICHEN", + /*210*/ "UMSCHAUEN/AUSWEICHEN", + /*211*/ "WIE C-KNÖPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einhändig)", + /*216*/ "(Beidhändig)", + /*217*/ "Halten Sie den Waffen-Knopf gedrückt, um das Quick-Menü aufzurufen.\nHalten Sie den Aktions-Knopf gedrückt, um die Funktion zu ändern.\nAktion+Feuer ändert die Funktion kurzzeitig.\nMit der Zielfunktion können Sie genauer zielen.\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen wählen:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen ändern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelöscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfügbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen bestätigen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von beschädigten Daten \noder Hardware-Schäden \ngelöscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte überprüfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Beschädigung gelöscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "Wählen Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Französisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_i.c b/src/files/lang/pal-beta/mpweapons_str_i.c new file mode 100644 index 000000000..10a28539c --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_i.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha il\nCartella\n", + /* 2*/ "%sha la Cartella di %s\n", + /* 3*/ "%sha la nostra\nCartella\n", + /* 4*/ "Presa la Cartella di %s\n", + /* 5*/ "Hai preso la\nCartella di %s\n", + /* 6*/ "%s ha preso la nostra\nCartella\n", + /* 7*/ "%s ha preso la\nCartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Pistola un colpo micidiale\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "Cinque a caso\n", + /* 45*/ "Lotta ravvicinata\n", + /* 46*/ "Mina di Prossimità\n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagranate\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum d'oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "È danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio (premi START\n all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte armi per miss. indiv.\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalità DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficoltà:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalità\n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Limite tempo:\n", + /*164*/ "Limite punti:\n", + /*165*/ "Limite punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\nè stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\nè stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIÙ: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIÙ", + /*199*/ "GUARDA GIÙ", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalità comandi %s %s\n", + /*215*/ "(a una mano)", + /*216*/ "(a due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare funzioni.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIÙ per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocità reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene già un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon può essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\nè stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati.\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/mpweapons_str_s.c b/src/files/lang/pal-beta/mpweapons_str_s.c new file mode 100644 index 000000000..782579dfe --- /dev/null +++ b/src/files/lang/pal-beta/mpweapons_str_s.c @@ -0,0 +1,276 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el/la\nConector de Datos\n", + /* 1*/ "%stiene el/la\nMaletín\n", + /* 2*/ "%stiene el/la %s Maletín\n", + /* 3*/ "%stiene nuestra\nMaletín\n", + /* 4*/ "Atrapó el/la %s Maletín\n", + /* 5*/ "Has capturado\nel/la %s Maletín\n", + /* 6*/ "%scapturado nuestra\nMaletín\n", + /* 7*/ "%scapturado\nel/la %s Maletín\n", + /* 8*/ "¡Un punto por sobrevivir!\n", + /* 9*/ "¡Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "¡Bien hecho!\n", + /* 12*/ "¡Tú la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "¡Eres la víctima!\n", + /* 15*/ "¡Protege a %s!\n", + /* 16*/ "¡Coge %s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexión perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "¡Rey de\nla Colina!\n", + /* 22*/ "¡Tenemos\nla Colina!\n", + /* 23*/ "¡%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "¡1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Automáticas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mantén el Maletín\n", + /* 33*/ "Pistola mata de Un Tiro\n", + /* 34*/ "Captura la Maleta\n", + /* 35*/ "Ocultación\n", + /* 36*/ "Explosivos del Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "Cámara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco Aleatorias\n", + /* 45*/ "Cuerpo a Cuerpo\n", + /* 46*/ "Minas de Proximidad\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Automáticas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Dañado\n", + /* 66*/ "está dañado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Está demasiado lleno. Se\nnecesitan 1 nota y 28\npáginas para guardar.\n", + /* 73*/ "Entra en el Menú del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puñetazos Huracán\n", + /* 77*/ "Dispositivo de Ocultación\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Munición Ilimitada\n", + /* 81*/ "Munición Ilimitada sin Recargas\n", + /* 82*/ "Un jugador Cámara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Súper Escudo\n", + /* 91*/ "Mirilla Clásica\n", + /* 92*/ "Sólo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Munición Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqués de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Alienígena\n", + /*102*/ "Rastreador/Localización de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Escáner de Rayos-X\n", + /*106*/ "SuperDragón\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversión\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compañeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Clásicas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extracción de dataDyne", + /*127*/ "Infiltración en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Cooperativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el menú", + /*143*/ "Elige truco para más información\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas clásicas.\n", + /*146*/ "Mirilla en Pantalla\n", + /*147*/ "Blanco\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Munición\n", + /*150*/ "Funciones del Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subtítulos\n", + /*153*/ "Tiempo de la Misión\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "¿Quieres interrumpir\nla misión?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar el fichero\nya que se está usando.\n", + /*162*/ "Cancelar\n", + /*163*/ "Límite Tiempo:\n", + /*164*/ "Límite Puntos:\n", + /*165*/ "Límite P. Equipo:\n", + /*166*/ "¡Desafío Completado!\n", + /*167*/ "¡Desafío Fallado!\n", + /*168*/ "¡Desafío Trucado!\n", + /*169*/ "Subtítulos en Escenas\n", + /*170*/ "Subtítulos en el Juego\n", + /*171*/ "Pantalla de Título Alternativa\n", + /*172*/ "Empezar Desafío\n", + /*173*/ "Investigación dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparación\n", + /*177*/ "¿Estás seguro de que quieres\nintentar reparar este\nController Pak?\n", + /*178*/ "¡Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con Éxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparación Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podrás cargar o\nguardar en este\nController Pak.\n", + /*185*/ "Handicaps Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTÓN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTÓN C ABAJO: ", + /*190*/ "BOTÓN A: ", + /*191*/ "BOTÓN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BÓTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRÁS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIÓN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mantén Arma para el menú rápido.\nMantén Acción para cambiar función.\nAcción+Disparo cambia temp. la función.\nApuntar aporta una mayor precisión.\nApuntar + Botón C Abajo te agacha.\nApuntar + Botón C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Velocidad de Reacción Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Daño del Enemigo:\n", + /*227*/ "Precisión del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre de Fichero Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre de Fichero\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que estás copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "¡Nuevo Truco Disponible!:\n", + /*245*/ "Continua\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "¿Guardar Nuevo jugador\ny estadísticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "¡No Gracias!\n", + /*251*/ "Confirmar nombre de jugador:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no dañados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegúrate\nde que estás usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban dañados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Inglés\n", + /*264*/ "Francés\n", + /*265*/ "Alemán\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ NULL, +}; diff --git a/src/files/lang/pal-beta/oatE.c b/src/files/lang/pal-beta/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oatJ.c b/src/files/lang/pal-beta/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oatP.c b/src/files/lang/pal-beta/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_f.c b/src/files/lang/pal-beta/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_g.c b/src/files/lang/pal-beta/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_i.c b/src/files/lang/pal-beta/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oat_str_s.c b/src/files/lang/pal-beta/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldE.c b/src/files/lang/pal-beta/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldJ.c b/src/files/lang/pal-beta/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/oldP.c b/src/files/lang/pal-beta/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_f.c b/src/files/lang/pal-beta/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_g.c b/src/files/lang/pal-beta/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_i.c b/src/files/lang/pal-beta/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/old_str_s.c b/src/files/lang/pal-beta/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/optionsE.c b/src/files/lang/pal-beta/optionsE.c new file mode 100644 index 000000000..c54dedc98 --- /dev/null +++ b/src/files/lang/pal-beta/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 28.7 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/optionsJ.c b/src/files/lang/pal-beta/optionsJ.c new file mode 100644 index 000000000..4ed3c13c7 --- /dev/null +++ b/src/files/lang/pal-beta/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "JAP Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/optionsP.c b/src/files/lang/pal-beta/optionsP.c new file mode 100644 index 000000000..c54dedc98 --- /dev/null +++ b/src/files/lang/pal-beta/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 28.7 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_f.c b/src/files/lang/pal-beta/options_str_f.c new file mode 100644 index 000000000..431d14267 --- /dev/null +++ b/src/files/lang/pal-beta/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succès\n", + /* 1*/ "Inachevé\n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " préhistoire", + /* 7*/ "rare présente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Hôtesse\n", + /* 21*/ "Joanna Plongée\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "Sécurité dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secrétaire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "Négociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femelle\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hôtesse\n", + /* 63*/ "Chef Hôtesse\n", + /* 64*/ "Le président\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "Sécurité Président\n", + /* 67*/ "Clone Président\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branchée dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Développeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Présenté en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre réalité\n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier paramètres simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet éditeur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak à éditer:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coopératif\n", + /*120*/ "Contre-Opération\n", + /*121*/ "Cinéma\n", + /*122*/ "Sélection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions spéciales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- Défection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enquête", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base Aérienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- Défense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vidéo\n", + /*183*/ "Contrôle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrôle\n", + /*193*/ "Contrôle Joueur 2\n", + /*194*/ "Style de contrôle\n", + /*195*/ "Visée inversée\n", + /*196*/ "Regard tête\n", + /*197*/ "Vue tête\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrôle ciblage\n", + /*200*/ "Retour\n", + /*201*/ "Maintenu\n", + /*202*/ "Alterné\n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Visée sur écran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer portée zoom\n", + /*208*/ "Munitions affichées\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vidéo\n", + /*215*/ "Taille écran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "Séparation écran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cinéma\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "Stéréo", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrôle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Sélection Difficulté\n", + /*249*/ "Difficulté\n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Spécial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coopératif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binôme Protégé\n", + /*258*/ "Binôme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Opération\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Opération\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succès\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de prédilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Précision:\n", + /*284*/ "Total de tir:\n", + /*285*/ " Tirs Tête:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membre:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "Décédé\n", + /*291*/ "Actif\n", + /*292*/ "Viré\n", + /*293*/ "Echec\n", + /*294*/ "Terminé\n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entraînement\n", + /*305*/ "Audio / Vidéo\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak non détecté.\n", + /*323*/ "Fichier non sauvegardé.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de mémoire.\n", + /*327*/ "Ce joueur est déjà\nchargé pour cette partie.\n", + /*328*/ "a été enlevé.\n", + /*329*/ "Controller Pak est défectueux ou mal inséré.\n", + /*330*/ "Effacement des notes échoué.\n", + /*331*/ "Erreur de chargement de jeu\n", + /*332*/ "Erreur de sauvegarde de jeu\n", + /*333*/ "Erreur de chargement de joueur\n", + /*334*/ "Erreur de sauvegarde de joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'écriture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- Vérifier que le Controller Pak est\ninséré correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegardé.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauvegarder dans un autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous sauvegarder\nvotre fichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Insérez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Insérez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "Sélectionner emplacement\n", + /*368*/ "Où\n", + /*369*/ "Espaces\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Saturé", + /*373*/ "Copier fichiers\n", + /*374*/ "Sélectionner fichier à copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "Sélectionner fichier à effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sûr de\nvouloir effacer ce fichier?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sûr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilisées: \n", + /*397*/ "Pages utilisées: %d\n", + /*398*/ "Il y a déjà une sauvegarde Perfect Dark sur ce Controller Pak.\n", + /*399*/ "Il y a suffisement de place pour sauvegarder Perfect Dark.\n", + /*400*/ "Le Controller Pak est trop plein pour sauver: 1 note\net 28 pages requises pour sauver.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Spécial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Opération Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas où, toi?\n", + /*456*/ "2:1 Intro - Négocie-moi ça!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauvé\n", + /*459*/ "3:1 Intro - Sombre allée\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Spécial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vidéo\n", + /*465*/ "4:1 Conclusion - A négliger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Spécial - Réveil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - Décollage\n", + /*473*/ "5:2 Intro - Dernière chance\n", + /*474*/ "5:2 Spécial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Spécial - Virus!\n", + /*482*/ "6:2 Conclusion - En arrière!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course liberté\n", + /*485*/ "8:1 Intro - Piqué!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de séquence\n", + /*490*/ "Cinéma\n", + /*491*/ "Occulteur %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_g.c b/src/files/lang/pal-beta/options_str_g.c new file mode 100644 index 000000000..f025aa9ef --- /dev/null +++ b/src/files/lang/pal-beta/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in prähistorischer Zeit", + /* 7*/ "Rare präsentiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchgerät\n", + /* 23*/ "Joanna im arktischen Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Männlicher CI-Labortechniker\n", + /* 34*/ "Weiblicher CI-Labortechniker\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekretärin\n", + /* 42*/ "Bürokleidung\n", + /* 43*/ "lockere Bürokleidung\n", + /* 44*/ "Unterhändlerin\n", + /* 45*/ "dataDyne Scharfschütze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Männlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Präsident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Präsidentenwache\n", + /* 67*/ "Präsident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schließen Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 5.2 beta\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Wähle deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicherstände\n", + /*100*/ "Kopieren:\n", + /*101*/ "Löschen:\n", + /*102*/ "Spielstand wird gelöscht...\n", + /*103*/ "Solo-Missionen Speicherstände\n", + /*104*/ "Kampfsimulator-Einstellung Speicherstände\n", + /*105*/ "Kampfsimulator-Spielerdaten\n", + /*106*/ "PerfectHead-Speicherstände\n", + /*107*/ "Controller Pak Menü\n", + /*108*/ "Dieses Menü dient dazu, Speicherstände von den\n Controller Paks zu löschen.\n", + /*109*/ "Wählen sie das Controller Pak:\n", + /*110*/ "Exit\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menü\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrünnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufklärung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Stützpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die Übernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Möchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfügbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Möchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten vertauschen\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Automatisches anvisieren\n", + /*199*/ "Fadenkreuz-Ausrichtung\n", + /*200*/ "Zurück\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurück\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Größe\n", + /*216*/ "Verhältnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurück\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurück\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhörer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einfach\n", + /*238*/ "Doppelt\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Wähle den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "Überblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Eliminierungen:\n", + /*283*/ "Genauigkeit:\n", + /*284*/ "Abgefeuerte Schüsse:\n", + /*285*/ " Kopftreffer:\n", + /*286*/ " Rumpftreffer:\n", + /*287*/ " Gliedmaßen:\n", + /*288*/ " Andere:\n", + /*289*/ "Drücke START\n", + /*290*/ "Gefallen\n", + /*291*/ "Überlebt\n", + /*292*/ "Mission abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Mission abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "Nächste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drücke START\n", + /*302*/ "Kleines aber feines Menü\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verhältnis\n", + /*312*/ "Zurück\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Köpfe\n", + /*319*/ "Köpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein Controller Pak\nin den Controllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelöscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist beschädigt oder nicht richtig eingelegt.\n", + /*330*/ "Löschvorgang konnte nicht durchgeführt werden.\n", + /*331*/ "Fehler während des Ladens.\n", + /*332*/ "Fehler während des Speicherns.\n", + /*333*/ "Fehler während des Ladens der Spielerdaten.\n", + /*334*/ "Fehler während des Speicherns der Spielerdaten.\n", + /*335*/ "Fehler während des Ladens von PerfectHead.\n", + /*336*/ "Fehler während des Speicherns von PerfectHead.\n", + /*337*/ "Fehler während des Lesevorgangs.\n", + /*338*/ "Fehler während des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Löschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelöscht werden.\n", + /*342*/ "- Überprüfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spielstand wurde gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "Während des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz wählen\n", + /*351*/ "Abbrechen\n", + /*352*/ "Während des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz für den Kopf benötigt.\n", + /*356*/ "Wählen Sie einen Kopf, der überschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Möchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit dem %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern möchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "Wähle den Speicherplatz\n", + /*368*/ "Wo!\n", + /*369*/ "Plätze\n", + /*370*/ "Speicherstände löschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "Wählen Sie den zu kopierenden Spielstand:\n", + /*375*/ "Drücken Sie den B-Knopf, um abzubrechen.\n", + /*376*/ "Spielstand löschen\n", + /*377*/ "Wählen Sie den zu löschenden Spielstand:\n", + /*378*/ "Drücken Sie den B-Knopf, um abzubrechen.\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Möchten Sie diesen Spielstand\nwirklich löschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten löschen\n", + /*384*/ "Möchten Sie diese Spielerdaten\nwirklich löschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten löschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Drücken Sie den B-Knopf, um abzubrechen.\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Plätze: \n", + /*395*/ "Freie Plätze: %d\n", + /*396*/ "Belegte Plätze: \n", + /*397*/ "Belegte Plätze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfügung.\n", + /*400*/ "Das Controller Pak ist zu voll, um\ndas Spiel zu speichern. Es werden 28 freie Plätze benötigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abwärts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin geht´s?\n", + /*456*/ "2:1 Intro - Verhandle DARÜBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwörung\n", + /*463*/ "3:2 Outro - Über die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - Über den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanöver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entführt\n", + /*486*/ "8:1 Outro - Ärger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Treffer\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_i.c b/src/files/lang/pal-beta/options_str_i.c new file mode 100644 index 000000000..98e17edd9 --- /dev/null +++ b/src/files/lang/pal-beta/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Joanna in tuta da lotta\n", + /* 17*/ "Joanna in impermeabile\n", + /* 18*/ "Joanna in abito da sera\n", + /* 19*/ "Joanna in abito strappato\n", + /* 20*/ "Joanna come hostess\n", + /* 21*/ "Joanna in muta da sub\n", + /* 22*/ "Joanna con bombole da sub\n", + /* 23*/ "Joanna in tenuta polare\n", + /* 24*/ "Joanna in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacchè NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "TROVATO", + /* 74*/ "NON TROVATO", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realtà\n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio n°1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco coperto", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr. Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "Sì\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalità comandi\n", + /*195*/ "Invers. punto di vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Comando mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalità suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficoltà\n", + /*249*/ "Difficoltà\n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco solo sui nemici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocatore 1", + /*272*/ "Giocatore 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Decline\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma più usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalità suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore già caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore di caricamento gioco\n", + /*332*/ "Errore di salvataggio gioco\n", + /*333*/ "Errore di caricamento giocatore\n", + /*334*/ "Errore di salvataggio giocatore\n", + /*335*/ "Errore di caricamento testaPerfect\n", + /*336*/ "Errore di salvataggio testaPerfect\n", + /*337*/ "Errore di lettura file\n", + /*338*/ "Errore di scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "Sì\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Scegli file da cancellare:\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "Sì\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene già un gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Cattiverie video\n", + /*465*/ "4:1 Epilogo - Questioni aperte\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - A filo di spada\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Lassù in cielo\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilità\n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - Vicolo cieco\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va là?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora più giù\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libertà\n", + /*485*/ "8:1 Prologo - Rapito\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/options_str_s.c b/src/files/lang/pal-beta/options_str_s.c new file mode 100644 index 000000000..a495489ab --- /dev/null +++ b/src/files/lang/pal-beta/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azul Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrón\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isotérmico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Científica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Técnico Masculino del IC\n", + /* 34*/ "Técnico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa de Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantería de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Traje de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociador\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del Área 51\n", + /* 51*/ "Soldado del Área 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "Técnico Masculino Lab.\n", + /* 56*/ "Técnico Femenino Lab.\n", + /* 57*/ "Técnico del Lab. dataDyne\n", + /* 58*/ "Biotécnico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Menú Controller Pak\n", + /*108*/ "Usa este menú para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menú Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Películas\n", + /*122*/ "Selecciona Misión\n", + /*123*/ "Misión 1\n", + /*124*/ "Misión 2\n", + /*125*/ "Misión 3\n", + /*126*/ "Misión 4\n", + /*127*/ "Misión 5\n", + /*128*/ "Misión 6\n", + /*129*/ "Misión 7\n", + /*130*/ "Misión 8\n", + /*131*/ "Misión 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigación", + /*137*/ "Central dataDyne", + /*138*/ "- Extracción", + /*139*/ "Villa Carrington", + /*140*/ "- Rehén Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "Área 51", + /*146*/ "- Infiltración", + /*147*/ "Área 51", + /*148*/ "- Rescate", + /*149*/ "Área 51", + /*150*/ "- Escape", + /*151*/ "Base Aérea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontación", + /*157*/ "Pelagic II", + /*158*/ "- Exploración", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "¡GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "¡Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "¿Quieres abortar la misión?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vídeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "¿Quieres cargar otro agente?\n", + /*190*/ "Sí\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Munición en Pantalla\n", + /*209*/ "Mostrar Función del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subtítulos\n", + /*212*/ "Mostrar Tiempo de Misión\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vídeo\n", + /*215*/ "Tamaño de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolución\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panorámica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Música\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Estéreo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar Sí\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compañero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar Sí\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visión General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misión:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misión:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisión:\n", + /*284*/ "Total de Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misión", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Menú Pequeño pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vídeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Música\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vacío >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontró\nen ningún mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargará.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado para este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak está dañado o mal insertado.\n", + /*330*/ "Falló el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando Juego\n", + /*332*/ "Error Guardando Juego\n", + /*333*/ "Error Cargando Jugador\n", + /*334*/ "Error Guardando Jugador\n", + /*335*/ "Error Cargando PerfectHead\n", + /*336*/ "Error Guardando PerfectHead\n", + /*337*/ "Error Leyendo Fichero\n", + /*338*/ "Error Escribiendo Fichero\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nestá insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "¡Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "¿Quieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "Sí\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde estés salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Donde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa el Botón B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa el Botón B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "¿Seguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "¿Estás seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "Sí\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "Páginas\n", + /*391*/ "Pulsa el Botón B para salir.\n", + /*392*/ "Vacío\n", + /*393*/ "--\n", + /*394*/ "Páginas Libres: \n", + /*395*/ "Páginas Libres: %d\n", + /*396*/ "Páginas Usadas: \n", + /*397*/ "Páginas Usadas: %d\n", + /*398*/ "Ya existe información de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak está demasiado lleno - 1 nota\ny 28 páginas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misión:", + /*406*/ "Desafío 1", + /*407*/ "Desafío 2", + /*408*/ "Desafío 3", + /*409*/ "Desafío 4", + /*410*/ "Desafío 5", + /*411*/ "Desafío 6", + /*412*/ "Desafío 7", + /*413*/ "Desafío 8", + /*414*/ "Desafío 9", + /*415*/ "Desafío 10", + /*416*/ "Desafío 11", + /*417*/ "Desafío 12", + /*418*/ "Desafío 13", + /*419*/ "Desafío 14", + /*420*/ "Desafío 15", + /*421*/ "Desafío 16", + /*422*/ "Desafío 17", + /*423*/ "Desafío 18", + /*424*/ "Desafío 19", + /*425*/ "Desafío 20", + /*426*/ "Desafío 21", + /*427*/ "Desafío 22", + /*428*/ "Desafío 23", + /*429*/ "Desafío 24", + /*430*/ "Desafío 25", + /*431*/ "Desafío 26", + /*432*/ "Desafío 27", + /*433*/ "Desafío 28", + /*434*/ "Desafío 29", + /*435*/ "Desafío 30", + /*436*/ "Especial\n", + /*437*/ "Introducción\n", + /*438*/ "Misión 1 - Central dataDyne\n", + /*439*/ "Misión 2 - Villa Carrington\n", + /*440*/ "Misión 3 - Edificio G5\n", + /*441*/ "Misión 4 - Área 51\n", + /*442*/ "Misión 5 - Air Force One\n", + /*443*/ "Misión 6 - Pelagic II\n", + /*444*/ "Misión 7 - Instituto Carrington\n", + /*445*/ "Misión 8 - Nave de Ataque Skedar\n", + /*446*/ "Misión 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introducción\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso Rápido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ¿Dónde vas?\n", + /*456*/ "Intro 2:1 - ¡Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Línea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejón Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiración\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vídeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabiduría\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - ¡Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - Última Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Maníaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - Más Profundo\n", + /*481*/ "Especial 6:2 - ¡Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - ¡Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - ¡Te pillé!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Películas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuación\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamE.c b/src/files/lang/pal-beta/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-beta/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamJ.c b/src/files/lang/pal-beta/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/pal-beta/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pamP.c b/src/files/lang/pal-beta/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-beta/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_f.c b/src/files/lang/pal-beta/pam_str_f.c new file mode 100644 index 000000000..c27f4b3eb --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'océan Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alliés contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif Un: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif Trois: - Sécurisez la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif Quatre: - Restaurez la personnalité du Dr. Caroll\n\nC'est la dernière étape du plan d'urgence mis en place par le Dr. Carolldurant le debriefing à la villa. Restaurer sa personnalité à l'I.A. lui permettra de reprendre le contrôle de l'enveloppe douée de raison et d'autres parties du vaisseau.\n\n|Objectif Cinq: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Background - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'océan Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alliés contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif Un: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif Trois: - Sécurisez la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif Quatre: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 3*/ "|Background - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau alien repose au fond de l'océan Pacifique. , Bien que dormant, le vaisseau Cetan est maintenant pris d'assaut parles Skedar et leurs alliés contraints, la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant dormant. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif Un: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif Deux: - Neutralisez la Super-Arme Cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif Trois: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver téléporteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "Sécuriser la Salle de Contrôle\n", + /* 8*/ "Restaurer la personnalité du Dr. Caroll\n", + /* 9*/ "S'échapper du vaisseau Cetan\n", + /* 10*/ "Cela nous aidera à nous déplacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera à nous\nprotéger des défenses automatiques.\n", + /* 12*/ "Voilà le Dr. Caroll. Voyons voir si nous\npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a été tué.\n", + /* 15*/ "Dr. Caroll a été tué.\n", + /* 16*/ "Evacuation du vaisseau Cetan réussie.\n", + /* 17*/ "Elvis a déverrouillé la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars à distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralisée.\n", + /* 21*/ "Salle de Contrôle sécurisée.\n", + /* 22*/ " Personnalité du Dr. Caroll restaurée.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque de sauvegarde\n", + /* 26*/ "Un disque de sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n à ce truc.\n", + /* 29*/ "Il est temps de réactiver ces téléporteurs.\n", + /* 30*/ "Téléporteurs réactivés.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes à feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arrière-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'espère que la dataDyne n'a rien prévu pour empêcher ça...\n", + /* 36*/ "Virus détecté.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrôle? Pouvez-vous arrêter le programme?\n", + /* 40*/ "En effet, me voilà de retour, très chère. Le programme est lancé depuis trop longtemps pour que je puisse l'arrêter. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera terminé, j'aurai le contrôle d'une arme extrêmement puissante. Cette arme ne doit pas exister. Je dois par conséquent détruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous échapper. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a été neutralisée.\n", + /* 44*/ "Munitions épuisées - arme ennemie ne peut être détruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_g.c b/src/files/lang/pal-beta/pam_str_g.c new file mode 100644 index 000000000..87706f16f --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstören Sie alle Kraftknoten innerhalb des Schiffes. Nur so können Sie die Waffe außer Kraft setzen. Einige dieser Knoten könnten sich aber außerhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persönlichkeitsprofil ungestört restaurieren können.Wir wissen nicht, welche Sicherheitsvorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persönlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, über den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persönlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle über den Sapienten, sondern auch über manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls PerSönlichkeitsprofil ungestört restaurieren können.Wir wissen nicht, welche Sicherheitsvorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff.Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für denFall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunfähig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flüchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schützt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir müssen versuchen,\nseine Persönlichkeit wieder herzustellen.\n", + /* 13*/ "Wir müssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstört.\n", + /* 16*/ "Evakuierung erfolgreich.\n", + /* 17*/ "Elvis hat die Tür entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, während ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presönlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage wäre hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhülsen oder Einschusslöcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein großes Mundwerk.\n", + /* 38*/ "Gegenmaßnahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Können Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm läuft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Möglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht länger existieren. Das Cetanische Schiff muss mit mit mir zerstört werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flüchten Sie! Es war mir eine große Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunfähig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_i.c b/src/files/lang/pal-beta/pam_str_i.c new file mode 100644 index 000000000..ec3b5ca8a --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta è l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sarà restituita la facoltà di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione - \n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington - \n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuterà a fare il giro \ndell'astronave più velocemente.\n", + /* 11*/ "Questa immuno-maschera ci proteggerà \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis è stato ucciso.\n", + /* 15*/ "Il Dr. Caroll è stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "È ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non è normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo disé! Riesce a fermare il programma?\n", + /* 40*/ "Sì, sì, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C'è un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avrà finito, sarò ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c'è altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. È stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan è stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pam_str_s.c b/src/files/lang/pal-beta/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/pal-beta/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Depende de ti: destruye los nodos de energía a lo largo de la nave, y el arma dejará de ser operativa. Algunos estarán fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nÉsta es la última fase del plan de contingencia que el Dr. Caroll adelantó durante su informe en la Villa. Restaurar su personalidad a la del creador de códigos de apertura reafirmará su control sobre el caparazón inteligente y aquellas partes de la nave Cetan que como 'rompedor de códigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudará a recorrer la \nnave más rápido.\n", + /* 11*/ "Este disfraz de anticuerpos nos protegerá \nde las defensas automáticas.\n", + /* 12*/ "Ahí está el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "¡Tenemos que salir de aquí!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuación de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aquí. Coge este arma y mantén a los Skedar \nalejados de mí mientras trabajo.\n", + /* 19*/ "Máscara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeño sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aquí.\n", + /* 32*/ "No hay señales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debería haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien más adelante. Cúbreme.\n", + /* 35*/ "Allá vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "¡Qué bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** ¡¡ooOOoh!! *** ¡¡eeEEe!! *** ¡¡aaAhh!! *** ¡¡oOOoh!! *** ¡¡aAArRrgghh!! *** ¡¡YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "¿Dr. Caroll? ¿Tiene el control de nuevo? ¿Puede detener el programa?\n", + /* 40*/ "Sí, estoy de vuelta, cariño. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Sólo existe una manera de acabar con esto...\n", + /* 41*/ "¿Qué quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendré el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. Así que debo destruir la nave Cetan y a mí mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendrás tiempo para escapar. Ha sido un honor trabajar contigo. Adiós, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Munición desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteE.c b/src/files/lang/pal-beta/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-beta/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteJ.c b/src/files/lang/pal-beta/peteJ.c new file mode 100644 index 000000000..dd9f41ca6 --- /dev/null +++ b/src/files/lang/pal-beta/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/peteP.c b/src/files/lang/pal-beta/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-beta/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_f.c b/src/files/lang/pal-beta/pete_str_f.c new file mode 100644 index 000000000..aef69d827 --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arrivée dans la rue principale peu après vous. Toutes les tentatives pour la pister ont échouées, il va falloir faire ça à l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'où elle vient.\n\n|Objectif 3: - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 4: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2 - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 3 - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Récupérer équipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Préparer voie de sortie\n", + /* 12*/ "Acquérir cible de diversion\n", + /* 13*/ "Créer diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionnée.\n", + /* 16*/ "Mine mal positionnée.\n", + /* 17*/ "Virus téléchargé dans le NavComp.\n", + /* 18*/ "Taxi incontrôlable - re-programmation nécessaire.\n", + /* 19*/ "Accès au système de navigation du taxi.\n", + /* 20*/ "Virus téléchargé.\n", + /* 21*/ "Système de navigation taxi re-programmé.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionné.\n", + /* 24*/ "Pisteur mal positionné.\n", + /* 25*/ "Véhicule crucial détruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission échouée - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Accès ascenseur scellé.\n", + /* 34*/ "Hé - Qu'est-ce que vous faites là?\n", + /* 35*/ "Pfff. Même pas peur!\n", + /* 36*/ "Pisteur remarqué.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine télécom.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine télécom\n", + /* 41*/ "Une mine télécom.\n", + /* 42*/ "Mine télécom. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus être ouvertes.\n", + /* 49*/ "Obtenir Re-programmeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Re-programmeur\n", + /* 52*/ "Un re-programmeur\n", + /* 53*/ "Re-programmeur obtenu.\n", + /* 54*/ "Diversion créée.\n", + /* 55*/ "Obtenir mine télécom.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine télécom.\n", + /* 59*/ "Mine télécom.\n", + /* 60*/ "Nous avons caché l'équipement\ndans une bouche d'égout.\n", + /* 61*/ "N'importe laquelle de ces portes bloquée\npeut servir de sortie.\n", + /* 62*/ "Re-programmer ce taxi - c'est un type 2 \nil devrait être compatible.\n", + /* 63*/ "Cet ascenseur à voiture est votre \nseul point d'entrée.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a été créée!\n", + /* 67*/ "Pisteur à été découvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqué dans ce complot. Je pense que \nCassandra de Vries sera là, mais j'ai besoin \nde savoir qui d'autre sera là et de quoi ils \nvont parler. Le temps que vous sortiez de là \nles renforts que j'ai demandé seront arrivés.\n", + /* 69*/ "Une cavalerie va venir me sauver, \nà qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef adoré.\n", + /* 72*/ "Mine télécom. gâchée.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_g.c b/src/files/lang/pal-beta/pete_str_g.c new file mode 100644 index 000000000..c6766d702 --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Befestigen Sie das Peilgerät an der Limousine!\n\nDie Limousine, die auf der Hauptstraße steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilgerät anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilgerät am Wagen, damit wir ihren Weg verfolgen können.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Überwachungszyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Überwachungszyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Truppenmobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrüstung!\n", + /* 10*/ "Befestigen Sie das Peilgerät am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "Wählen Sie ein Objekt für das Ablenkungsmanöver!\n", + /* 13*/ "Sorgen Sie für ein Ablenkungsmanöver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich.\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt.\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstört.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich außer Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste.\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da läuft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verstärkung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegrüßt, Bürger.\n", + /* 38*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "Eine Fernzünder-Mine\n", + /* 42*/ "Fernzünder-Mine aufgenommen.\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen.\n", + /* 48*/ "Aufzugstür kann nicht wieder geöffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen.\n", + /* 54*/ "Ablenkungsmanöver erfolgreich.\n", + /* 55*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernzünder-Mine\n", + /* 59*/ "Fernzünder-Mine aufgenommen.\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrüstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Türen eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt für Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelöscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanöver durchgeführt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung für dataDyne fungiert. Ich weiß, \ndass Cassandra de Vries anwesend sein wird. \naber ich muss wissen, wer außerdem an dem \nTreffen teilnimmt und worüber gesprochen wird. \nWenn Sie das Gebäude verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glück!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernzünder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_i.c b/src/files/lang/pal-beta/pete_str_i.c new file mode 100644 index 000000000..008b6730a --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale è arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisognerà agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington - \n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei tombini di scolo: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus già scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne è riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "È pazza! È pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia è stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina a distanza\n", + /* 41*/ "Mina a distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogrammatore\n", + /* 52*/ "Riprogrammatore\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina a distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui è stato possibile \nnascondere gli strumenti era il tombino.\n", + /* 61*/ "Una di quelle porte bloccate può \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: è un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \nè l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia è stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sarà presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sarà e di che cosa si parlerà. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno già arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. È ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/pete_str_s.c b/src/files/lang/pal-beta/pete_str_s.c new file mode 100644 index 000000000..a33dcac4f --- /dev/null +++ b/src/files/lang/pal-beta/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal llegó poco antes que tú. Todos los intentos de rastrearla han sido inútiles, así que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que así podamos rastrear adónde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distracción\n", + /* 13*/ "Crear distracción móvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramación.\n", + /* 19*/ "Accediendo al sistema de navegación del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegación del taxi reprogramado.\n", + /* 22*/ "Conexión con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehículo crítico de la misión destruido.\n", + /* 26*/ "MISIÓN FALLADA\n", + /* 27*/ "MISIÓN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misión fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. ¡Tiene un arma!\n", + /* 31*/ "¡Hay un maníaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "¡Hey! ¿Qué haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obtén la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obtén el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' Rastreador\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obtén el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogramador\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distracción en marcha.\n", + /* 55*/ "Obtén la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El único lugar donde pudimos asegurar \nel equipo fue en un desagüe.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \núnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "¡Una distracción alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporación G5 es sólo una \ntapadera de dataDyne y que está también \nenvuelta en este complot. Sé que Cassandra \nDe Vries va a estar aquí, pero necesito \nsaber quién más va a venir y sobre qué \nvan a discutir. Una vez salgas, la ayuda \nque solicité estará llegando.\n", + /* 69*/ "¿Pero a qué ayuda te estás \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mantén la radio en silencio. \n¡Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjE.c b/src/files/lang/pal-beta/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-beta/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjJ.c b/src/files/lang/pal-beta/propobjJ.c new file mode 100644 index 000000000..fc459a214 --- /dev/null +++ b/src/files/lang/pal-beta/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "ammo", + /* 3*/ "cartridge", + /* 4*/ "magnum bullet", + /* 5*/ "golden bullet", + /* 6*/ "hand grenade", + /* 7*/ "grenade round", + /* 8*/ "rocket", + /* 9*/ "homing rocket", + /* 10*/ "remote mine", + /* 11*/ "proximity mine", + /* 12*/ "timed mine", + /* 13*/ "combat ", + /* 14*/ "knife", + /* 15*/ "knives", + /* 16*/ "s", + /* 17*/ "dart", + /* 18*/ "n-bomb", + /* 19*/ "drugs", + /* 20*/ "explosive pen", + /* 21*/ "explosive case", + /* 22*/ "flare", + /* 23*/ "piton", + /* 24*/ "of dynamite", + /* 25*/ "stick ", + /* 26*/ "sticks ", + /* 27*/ "bug", + /* 28*/ "micro camera", + /* 29*/ "GoldenEye key", + /* 30*/ "token", + /* 31*/ "plastique", + /* 32*/ "Picked up a key.\n", + /* 33*/ "Picked up a shield.\n", + /* 34*/ "A shield.\n", + /* 35*/ "Picked up something.\n", + /* 36*/ "This door is locked.\n", + /* 37*/ "bolt", + /* 38*/ "orb", + /* 39*/ "Reaper ammo", + /* 40*/ "cloaking device", + /* 41*/ "speed pill", + /* 42*/ "your ", + /* 43*/ "YOUR some ", + /* 44*/ "Some ", + /* 45*/ "a ", + /* 46*/ "A ", + /* 47*/ "an ", + /* 48*/ "An ", + /* 49*/ "the ", + /* 50*/ "The ", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, + /* 68*/ NULL, + /* 69*/ NULL, + /* 70*/ NULL, + /* 71*/ NULL, + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, + /* 76*/ NULL, + /* 77*/ NULL, + /* 78*/ NULL, + /* 79*/ NULL, + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobjP.c b/src/files/lang/pal-beta/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-beta/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_f.c b/src/files/lang/pal-beta/propobj_str_f.c new file mode 100644 index 000000000..db63eb0db --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle de Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette tête cher.", + /* 17*/ "Mine télécommandée", + /* 18*/ "Mine de proximité", + /* 19*/ "Mine à retardement", + /* 20*/ "Couteau de combat", + /* 21*/ "Couteaux de combat", + /* 22*/ "Fléchette", + /* 23*/ "Bombe-N", + /* 24*/ "Sédatif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fusée", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "bâton ", + /* 31*/ "bâtons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Clé GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Clé obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "Elément obtenu.\n", + /* 41*/ "Cette porte est fermée.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munitions pour Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munitions pour Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles de Magnum", + /* 73*/ "golden bullets", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes tête cher.", + /* 78*/ "Mines télécommandées", + /* 79*/ "Mines de proximité", + /* 80*/ "Mines à retardement", + /* 81*/ "Fléchettes", + /* 82*/ "Bombes-N", + /* 83*/ "Sédatifs", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_g.c b/src/files/lang/pal-beta/propobj_str_g.c new file mode 100644 index 000000000..47a3e6658 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen.\n", + /* 1*/ "%s aufgenommen.\n", + /* 2*/ "%s aufgenommen.\n", + /* 3*/ "%s aufgenommen.\n", + /* 4*/ "%s aufgenommen.\n", + /* 5*/ "%s aufgenommen.\n", + /* 6*/ "%s aufgenommen.\n", + /* 7*/ "%s aufgenommen.\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernzünder-Mine", + /* 18*/ "Annäherungs-Mine", + /* 19*/ "Zeitzünder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Betäubungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "of dynamite", + /* 30*/ "Stock ", + /* 31*/ "Stöcke ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlüssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlüssel aufgenommen.\n", + /* 38*/ "Schild aufgenommen.\n", + /* 39*/ "Ein Schild.\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tür ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "Stärkungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "Stärkungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "golden bullets", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Ferntünder-Minen", + /* 79*/ "Annäherungs-Minen", + /* 80*/ "Zeitzünder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Betäubungsgeschosse", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_i.c b/src/files/lang/pal-beta/propobj_str_i.c new file mode 100644 index 000000000..77da5bdd6 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s.\n", + /* 1*/ "Presa %s.\n", + /* 2*/ "Presa %s.\n", + /* 3*/ "Preso %s.\n", + /* 4*/ "Presi %s.\n", + /* 5*/ "Prese %s.\n", + /* 6*/ "Prese %s.\n", + /* 7*/ "Prese %s.\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimità", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "cimice", + /* 33*/ "micro camera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chive.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta è chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Dei ", + /* 51*/ "delle ", + /* 52*/ "Delle ", + /* 53*/ "delle", + /* 54*/ "Delle", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "golden bullets", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimità", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/propobj_str_s.c b/src/files/lang/pal-beta/propobj_str_s.c new file mode 100644 index 000000000..2f5a09012 --- /dev/null +++ b/src/files/lang/pal-beta/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "munición", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitón", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microcámara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Plástico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta está cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "munición Segadora", + /* 45*/ "disp. de ocultación", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "munición Segadora", + /* 68*/ "disp. de ocultación", + /* 69*/ "reforzadores", + /* 70*/ "Algo de munición", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "golden bullets", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/refE.c b/src/files/lang/pal-beta/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/refJ.c b/src/files/lang/pal-beta/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/refP.c b/src/files/lang/pal-beta/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_f.c b/src/files/lang/pal-beta/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_g.c b/src/files/lang/pal-beta/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_i.c b/src/files/lang/pal-beta/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ref_str_s.c b/src/files/lang/pal-beta/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/ritE.c b/src/files/lang/pal-beta/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-beta/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ritJ.c b/src/files/lang/pal-beta/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/pal-beta/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/ritP.c b/src/files/lang/pal-beta/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-beta/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_f.c b/src/files/lang/pal-beta/rit_str_f.c new file mode 100644 index 000000000..a50d78aa5 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité Présidentiel est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connue. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Sécurisez le plan de vol de Air Force One\n\nLes détails du plan de Trent sont encore inconnus, mais nous pensons que l'équipage de l'avion sera en danger. Vous devrez accéder à la cabine de pilotage pour découvrir ce qu'il prépare. Si la situation échappe à votre contrôle, activez l'auto-pilote.\n\n|Objectif 5: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One! La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité Présidentiel est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connue. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One! La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connue. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 2: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One! La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et récupérer équipement\n", + /* 6*/ "Localiser Président\n", + /* 7*/ "Placer Président dans capsule\n", + /* 8*/ "Sécuriser plan de vol de Air Force One\n", + /* 9*/ "Détacher OVNI de Air Force One\n", + /* 10*/ "Obtenir Valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir Arbalète.\n", + /* 16*/ "\n", + /* 17*/ "Arbalète\n", + /* 18*/ "Arbalète\n", + /* 19*/ "Arbalète obtenue.\n", + /* 20*/ "Trop de victimes neutres provoquées.\n", + /* 21*/ "Connexion à l'OVNI détruite.\n", + /* 22*/ "Impossible de détruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclenché.\n", + /* 24*/ "Air Force One stabilisé.\n", + /* 25*/ "Système Auto-pilote détruit.\n", + /* 26*/ "Le Président a été incapacité.\n", + /* 27*/ "Pilotes tués.\n", + /* 28*/ "Pilotes sauvés.\n", + /* 29*/ "Air Force One va s'écraser.\n", + /* 30*/ "Obtenir mine télécom.\n", + /* 31*/ "\n", + /* 32*/ "Mine télécom.\n", + /* 33*/ "Mine télécom.\n", + /* 34*/ "Mine télécom. obtenue.\n", + /* 35*/ "Qui êtes-vous, jeune fille?\n", + /* 36*/ "Securité, SECURITE!!\n", + /* 37*/ "Mr. Le Président, vous êtes en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Comment ça? Qu'est-ce que ça veut dire!\n", + /* 39*/ "Vous devez gagnez sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont très graves.\n", + /* 41*/ "Voici l'enregistrement de la réunion entre\nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois.\nQue fait-on maintenant?\n", + /* 43*/ "Hé, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter à bord?\n", + /* 46*/ "Bien, récupérons les preuves.\n", + /* 47*/ "Le bureau du Président est dans\nce niveau, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez à la cabine de pilotage!\n", + /* 49*/ "Peut-être une mine pourrait détruire la connexion à l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adrénaline\n", + /* 53*/ "Pilule d'adrénaline\n", + /* 54*/ "Pilule d'adrénaline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baissée.\n", + /* 61*/ "Soute levée.\n", + /* 62*/ "Objet crucial détruit.\n", + /* 63*/ "Accès refusé - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Président est attaqué.\n", + /* 73*/ "Avez-vous réfléchi à la proposition que je vous ai présentée, monsieur?\n", + /* 74*/ "Ma réponse est toujours la même: désolé Trent, c'est non. Je ne confierai pas le Pelagic II à la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Amérique a foi en son industrie et que vous êtes prêt à les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre dernière chance. Je ne reviendrai pas sur ma décision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma dernière chance? Ha! Pauvre fou. C'était plutôt la tienne, crétin!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas à détacher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, ça va secouer!\n", + /* 84*/ "Les pilotes ont stabilisé Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_g.c b/src/files/lang/pal-beta/rit_str_g.c new file mode 100644 index 000000000..8c47bbfe5 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidentenvorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie demPräsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen über Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in höchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall müssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidentenvorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie demPräsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidentenvorlegen.\n\n|1. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie demPräsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|3. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrüstung!\n", + /* 6*/ "Finden Sie den Präsidenten!\n", + /* 7*/ "Bringen Sie den Präsidenten zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lösen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen.\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen.\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstört.\n", + /* 22*/ "Verankerung kann nicht gelöst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstört.\n", + /* 26*/ "Der Präsident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustürzen.\n", + /* 30*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernzünder-Mine\n", + /* 33*/ "Fernzünder-Mine\n", + /* 34*/ "Fernzünder-Mine aufgenommen.\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hölle, war das?\n", + /* 39*/ "Rasch! Wir müssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie können solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwörern.\n", + /* 42*/ "Das ist mehr als überzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Büro des Präsidenten befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie müssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelöst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlüsselkarte\n", + /* 58*/ "Schlüsselkarte\n", + /* 59*/ "Schlüsselkarte aufgenommen.\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstört.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen.\n", + /* 69*/ "Die Zeitzünder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Präsident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals über meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unverändert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Können wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das wäre die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht ändern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschläge erteilt. Hören Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wünschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lösen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhören und schießen?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_i.c b/src/files/lang/pal-beta/rit_str_i.c new file mode 100644 index 000000000..20f4d8933 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se è accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington - \n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Va col Presidente alla capsula d'emergenza\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Va col Presidente alla capsula d'emergenza\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One è stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente è stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina a distanza\n", + /* 33*/ "Mina a distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei è in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Come sarebbe a dire?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non può mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa è una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non è...\n", + /* 44*/ "È un'intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "È ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente è su \nquesto piano, Joanna!\n", + /* 48*/ "C'è qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si può staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria è stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi più salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha più pensato alla proposta che le ho fatto, Signore?\n", + /* 74*/ "La mia risposta è sempre la stessa, Trent! No, mi dispiace! Non metterò il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa è un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed è NO! Non mi farà cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si può propriodire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa è la sua ultima possibilità, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilità? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/rit_str_s.c b/src/files/lang/pal-beta/rit_str_s.c new file mode 100644 index 000000000..40e064de7 --- /dev/null +++ b/src/files/lang/pal-beta/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deberás sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles específicos del plan de Trent, pero se cree que la tripulación está en peligro. Llega hasta la cabina y asegúrate de su bienestar. Si ocurre lo peor, activa el piloto automático.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la cápsula\n", + /* 8*/ "Asegurar trayectoría del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obtén la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexión del OVNI dañado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Automático ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Automático ha sido destruido.\n", + /* 26*/ "El Presidente ha sido incapacitado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One está a punto de estrellarse.\n", + /* 30*/ "Obtén la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "¿Quién es usted, jovencita?\n", + /* 36*/ "¡¡Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, está usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "¡Qué demonios es eso!\n", + /* 39*/ "Debemos llevarle a la cápsula de escape. \nSígame.\n", + /* 40*/ "No puede hacer acusaciones como ésa sin evidencias.\n ¿Asumo que tendrá alguna?\n", + /* 41*/ "Esta es una grabación de una reunión entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \n¿Qué hacemos ahora?\n", + /* 43*/ "Hey, eso no es...\n", + /* 44*/ "Es un intruso...\n", + /* 45*/ "¿Cómo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitación del Presidente está en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... ¡Debes llegar a la cabina!\n", + /* 49*/ "Quizá una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pastilla de Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magnética\n", + /* 58*/ "Llave magnética \n", + /* 59*/ "Llave magnética obtenida.\n", + /* 60*/ "La bahía de carga ha sido bajada.\n", + /* 61*/ "La bahía de carga ha sido subida.\n", + /* 62*/ "Objeto crítico de la misión destruido.\n", + /* 63*/ "Acceso denegado: llave magnética del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave magnética del ascensor\n", + /* 67*/ "Llave magnética del ascensor \n", + /* 68*/ "Llave magnética del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podrás salvarle.\n", + /* 72*/ "Están atacando al Presidente.\n", + /* 73*/ "¿Ha reconsiderado algo más la propuesta que le hice, señor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ¿podemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero esta es una oportunidad de oro para demostrar que América tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "¡Maldición! ¡He dicho no y significa no! ¡No pienso cambiar de opinión! Necesito que mis asesores sean imparciales, y ahora no me estás dando la imparcialidad que necesito. Déjalo, y no hablemos más de ello. Es tu última oportunidad.\n", + /* 77*/ "Como quiera, señor.\n", + /* 78*/ "¿Mi última oportunidad? ¡Ja! Idiota. Fue la tuya...\n", + /* 79*/ "¡Elvis! ¡Elvis! ¡No puedo soltar ese tubo del fuselaje! ¿Puedes hacerlo tú?\n", + /* 80*/ "Pan comido, Joanna. ¡Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "¿Mirar, qué? ¿Quieres dejar de juguetear? ¡Dispara!\n", + /* 83*/ "No hay más opciones... ¡Joanna, prepárate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/runE.c b/src/files/lang/pal-beta/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/runJ.c b/src/files/lang/pal-beta/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/runP.c b/src/files/lang/pal-beta/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_f.c b/src/files/lang/pal-beta/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_g.c b/src/files/lang/pal-beta/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_i.c b/src/files/lang/pal-beta/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/run_str_s.c b/src/files/lang/pal-beta/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevE.c b/src/files/lang/pal-beta/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-beta/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevJ.c b/src/files/lang/pal-beta/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/pal-beta/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevP.c b/src/files/lang/pal-beta/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-beta/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_f.c b/src/files/lang/pal-beta/sev_str_f.c new file mode 100644 index 000000000..9fff9ccaa --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Détruire le vaisseau maian capturé\n\nMon dernier objectif sera de détruire les restes du vaisseau avec lequel je suis arrivé sur Terre. Si quelqu'un découvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alliés seront en danger et j'aurai échoué dans ma mission.\n\n|Objectif 3: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur Maian UN (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "Détruire vaisseau maian capturé\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Labo de tests saboté.\n", + /* 8*/ "Vaisseau maian capturé détruit.\n", + /* 9*/ "Signal de détresse activé.\n", + /* 10*/ "Objet crucial détruit.\n", + /* 11*/ "Mission échouée - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activée.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_g.c b/src/files/lang/pal-beta/sev_str_g.c new file mode 100644 index 000000000..7a92d4f8f --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibenden Ausrüstungsgegenstände, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Zerstören Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfüllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstören. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts ähnlich ist, geraten unsere Verbündeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibenden Ausrüstungsgegenstände, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Aufzeichnung aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibenden Ausrüstungsgegenstände, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstören Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstört.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstört.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr möglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_i.c b/src/files/lang/pal-beta/sev_str_i.c new file mode 100644 index 000000000..94e0f0719 --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sarà quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione è simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stesso.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico è stato sabotato.\n", + /* 8*/ "La navicella Maian è stata distrutta.\n", + /* 9*/ "Il segnale di pericolo è stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sev_str_s.c b/src/files/lang/pal-beta/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/pal-beta/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi último acto y mi deber será destruir lo que queda del vehículo en el que llegué a la Tierra. Si alguien descubre que su tecnología es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrícolas estarán en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 1*/ "ÁREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento médico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "El experimento médico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La señal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crítico de la misión ha sido destruido.\n", + /* 11*/ "Misión fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbE.c b/src/files/lang/pal-beta/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbJ.c b/src/files/lang/pal-beta/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevbP.c b/src/files/lang/pal-beta/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_f.c b/src/files/lang/pal-beta/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_g.c b/src/files/lang/pal-beta/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_i.c b/src/files/lang/pal-beta/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevb_str_s.c b/src/files/lang/pal-beta/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-beta/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sevxE.c b/src/files/lang/pal-beta/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxJ.c b/src/files/lang/pal-beta/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxP.c b/src/files/lang/pal-beta/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_f.c b/src/files/lang/pal-beta/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_g.c b/src/files/lang/pal-beta/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_i.c b/src/files/lang/pal-beta/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevx_str_s.c b/src/files/lang/pal-beta/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbE.c b/src/files/lang/pal-beta/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbJ.c b/src/files/lang/pal-beta/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxbP.c b/src/files/lang/pal-beta/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_f.c b/src/files/lang/pal-beta/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_g.c b/src/files/lang/pal-beta/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_i.c b/src/files/lang/pal-beta/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/sevxb_str_s.c b/src/files/lang/pal-beta/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/shoE.c b/src/files/lang/pal-beta/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-beta/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/shoJ.c b/src/files/lang/pal-beta/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/pal-beta/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/shoP.c b/src/files/lang/pal-beta/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-beta/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_f.c b/src/files/lang/pal-beta/sho_str_f.c new file mode 100644 index 000000000..a8a666c2d --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion Skedar. Il se trouve sur une planète désertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous posiez des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, nous pouvons seulement garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au Centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu va certainement te heurter à une résistance acharnée. Tu va te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'armée Skedar\n\nLe haut commandement Maian pense que des soldats Skedars sont gardés dans des champs de stase à l'intérieur de cette installation. Si cela est vrai, il faudra les détruire. La dernière chose dont nous avons besoin c'est une armée de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion Skedar. Il se trouve sur une planète désertique. Le chef des terroristes skedars se cache dans un Temple de la guerre placé à la surface de la planète. La destruction du Temple et l'élimination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous marquiez des parties du Temple pour guider un bombardement stratégique. De plus je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement vous garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter à une résistance acharnée. Tu vas te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion Skedar. Il se trouve sur une planète désertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna - Je veux que vous marquiez des parties du temple pour guider un bombardement stratégique. De plus je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlacez une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilisez un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement vous garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Accéder au centre du sanctuaire\n", + /* 8*/ "Détruire l'armée secrète Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vision nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vision nocturne\n", + /* 13*/ "Vision nocturne\n", + /* 14*/ "Vison nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Amplificateur cible.\n", + /* 21*/ "\n", + /* 22*/ "Amplificateur cible\n", + /* 23*/ "Amplificateur cible\n", + /* 24*/ "Amplificateur cible obtenu.\n", + /* 25*/ "Amplificateur cible positionné correctement.\n", + /* 26*/ "Amplificateur cible mal positionné.\n", + /* 27*/ "Générateur activé.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Armée secrète Skedar détruite.\n", + /* 30*/ "Ca ressemble à un des piliers que je suis censée trouver.\n", + /* 31*/ "Cette zone est plus stable.\nLe sanctuaire doit être proche.\n", + /* 32*/ "OH, NON!!! Une armée Skedar en animation suspendue!\n", + /* 33*/ "Très bien, il faut trancher la tête...le reste périra lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette planète est sacrée. L'Autel de Bataille est le lieu le plus vénéré de cette planète.\n", + /* 35*/ "Je vois. Cet endroit est sacré pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la clé de la victoire. Nous avons combattu jusqu'à obtenir un cessez-le-feu, mais nous avons toujours été sur nos gardes. La destruction de cet endroit pourra enfin donner une chance à la paix.\n", + /* 37*/ "Nous devons être certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu prépare l'armada maian pour pulvériser ce satané temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le détail.\n", + /* 39*/ "Je ne compte pas vraiment m'éterniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de problème. Attrape mon bras. On va te sortir de là.\n", + /* 44*/ "Non, vite! Donne-moi une arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai réussi à retarder le bombardement, la flotte est en attente. Ils vont commencer dès que nous serons partis.\n", + /* 47*/ "Je m'en serais tirée si ce gros lourdaud ne m'avait pas attrapé le pied.\n", + /* 48*/ "J'en suis sûr, Joanna, j'en suis sûr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes prières au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre accès au Temple créé.\n", + /* 54*/ "Où es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_g.c b/src/files/lang/pal-beta/sho_str_g.c new file mode 100644 index 000000000..16de7b3b2 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine große Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. DerSchrein könnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstört werden. Das Letzte, was wir jetzt brauchen können, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt habe, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brücke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anführer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtgerät\n", + /* 13*/ "Nachtsichtgerät\n", + /* 14*/ "Nachtsichtgerät aufgenommen.\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen.\n", + /* 20*/ "Erlangen Sie das Peilgerät!\n", + /* 21*/ "\n", + /* 22*/ "Peilgerät\n", + /* 23*/ "Peilgerät\n", + /* 24*/ "Peilgerät aufgenommen.\n", + /* 25*/ "Peilgerät wurde korrekt platziert.\n", + /* 26*/ "Peilgerät wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei Säulen zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter.\nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tatsächlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Körper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Landzu sein. Der Schrein befindet sich amheiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resümieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gekämpft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden würde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstörung des Schreins wäre eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also müssen wir dafür sorgen, dass kein Skedar überlebt. Ich gehe rein und kümmere mich um den Anführer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort ver- schwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drüben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich hätte es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt hätte.\n", + /* 48*/ "Natürlich, Joanna, natürlich.\n", + /* 49*/ "Ich hätte es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmöglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_i.c b/src/files/lang/pal-beta/sho_str_i.c new file mode 100644 index 000000000..82a8bc767 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che è stato danneggiato ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perciò lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora è un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regnerà la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione - \n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che è stato danneggiato ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington - Irreperibile.\n\n|Elvis - \n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi, che è stato danneggiato ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore è stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra più costante. \nIl Santuario Interno non può essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morirà!\n", + /* 34*/ "Questo è il luogo più SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte più SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora è SACRO! Però c'è anche dell'altro, vero?\n", + /* 36*/ "Sì! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finché non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicherà una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai più possibilità di salvezza!\n", + /* 39*/ "È un errore che intendo evitare!\n", + /* 40*/ "Proprio così...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "Sì, sì, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/sho_str_s.c b/src/files/lang/pal-beta/sho_str_s.c new file mode 100644 index 000000000..7aed90ab8 --- /dev/null +++ b/src/files/lang/pal-beta/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a través del laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ejército Secreto Skedar\n\nEl Alto Comando Maian sospecha que más guerreros Skedar están en estado de hibernación en lugares desconocidos. Éste puede ser uno de esos lugares. Si así es, destrúyelos. La última cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicóticos.\n\n|Objetivo Cinco: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos del templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ejército secreto Skedar\n", + /* 9*/ "Eliminar al líder Skedar\n", + /* 10*/ "Obtén la Visión Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "Visión Nocturna\n", + /* 13*/ "Visión Nocturna\n", + /* 14*/ "Visión Nocturna obtenida.\n", + /* 15*/ "Obtén el Escáner.\n", + /* 16*/ "\n", + /* 17*/ "Escáner\n", + /* 18*/ "Escáner\n", + /* 19*/ "Escáner obtenido.\n", + /* 20*/ "Obtén el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ejército secreto Skedar ha sido derrotado.\n", + /* 30*/ "Éste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energía es más constante en este área. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "¡¡¡OH, NO!!! ¡Un ejército Skedar en animación suspendida!\n", + /* 33*/ "Vale, entonces... Cortémosle la cabeza y el \ncuerpo perecerá.\n", + /* 34*/ "Éste es el lugar más sagrado de los fanáticos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla está situado en la parte más sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ¿no? Pero hay bastante más que eso, ¿no es así?\n", + /* 36*/ "Sí. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabíamos que hasta que no fuera destruido, la guerra no terminaría. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destrucción de este lugar puede significar una paz verdadera.\n", + /* 37*/ "Así que tenemos que asegurarnos de que ningún fanático sobreviva. Entraré a por el líder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si estás en tierra cuando la flota llegue aquí, no tendrás ninguna oportunidad.\n", + /* 39*/ "Ése es un error que no pienso cometer.\n", + /* 40*/ "Siiii...\n", + /* 41*/ "¡Joanna! ¡Joanna! \n", + /* 42*/ "¡Elvis! ¡Elvis! Aquí.\n", + /* 43*/ "Ningún problema. Agárrate a mis brazos. Te sacaré enseguida.\n", + /* 44*/ "¡No, rápido! ¡Dame tu arma!\n", + /* 45*/ "¡Quieres! ¡Soltarme! ¡De! ¡Una! ¡Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezarán de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "¿Dónde estás? ¿Estás herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-beta/siloE.c b/src/files/lang/pal-beta/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/siloJ.c b/src/files/lang/pal-beta/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/siloP.c b/src/files/lang/pal-beta/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_f.c b/src/files/lang/pal-beta/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_g.c b/src/files/lang/pal-beta/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_i.c b/src/files/lang/pal-beta/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/silo_str_s.c b/src/files/lang/pal-beta/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/statE.c b/src/files/lang/pal-beta/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-beta/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/statJ.c b/src/files/lang/pal-beta/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/pal-beta/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/statP.c b/src/files/lang/pal-beta/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-beta/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_f.c b/src/files/lang/pal-beta/stat_str_f.c new file mode 100644 index 000000000..798cdc560 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi Skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois Skedar. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\n|Objectif 3: - Régicide Acte trois\n\nPardon, désolé, Il y a un troisième Roi. Nos détecteurs n'ont pu le repérer auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux préparé que les deux autres, il est impératif qu'il soit éliminé dans les plus brefs délais. Dépêchez-vous, il ne faut pas qu'il rassemble ses armées.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi Skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois Skedar. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi Skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi Skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'armée Skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi Skedar\n", + /* 5*/ "Tuer Roi Skedar 2\n", + /* 6*/ "Tuer Roi Skedar 3\n", + /* 7*/ "Le Dirigeant maian a été tué.\n", + /* 8*/ "Le Roi Skedar a été tué.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_g.c b/src/files/lang/pal-beta/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\n|3. Ziel: - Königsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als gäbe es noch einen dritten König. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser König konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gefährlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch größer.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-König!\n", + /* 5*/ "Vernichten Sie den Skedar-König 2!\n", + /* 6*/ "Vernichten Sie den Skedar-König 3!\n", + /* 7*/ "Der Maianische Anführer wurde eliminiert.\n", + /* 8*/ "Der Skedar-König wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_i.c b/src/files/lang/pal-beta/stat_str_i.c new file mode 100644 index 000000000..b15bb9ff6 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non sussisterà più.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficoltà nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re è più pericoloso degli altri due! È pertanto di vitale importanza che venga soppresso al più presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non al più presto.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al più presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2° re degli Skedar\n", + /* 6*/ "Uccidi il 3° re degli Skedar\n", + /* 7*/ "Il capo dei Maian è stato ucciso.\n", + /* 8*/ "Il re degli Skedar è stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/stat_str_s.c b/src/files/lang/pal-beta/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/pal-beta/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdón, perdón... Parece que existe un tercer Rey. Nuestros escáneres han tenido problemas de detección debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey está más preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El líder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleE.c b/src/files/lang/pal-beta/titleE.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/pal-beta/titleE.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleJ.c b/src/files/lang/pal-beta/titleJ.c new file mode 100644 index 000000000..a796fe944 --- /dev/null +++ b/src/files/lang/pal-beta/titleJ.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons animator\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "(is watching)\n", + /* 15*/ "b jones\n", + /* 16*/ "(unknown purpose)\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "code janitor\n", + /* 21*/ "russell irwin\n", + /* 22*/ "pak man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "pad jockey\n", + /* 25*/ "ross bury\n", + /* 26*/ "pixel pusher\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonsz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "development tools\n", + /* 57*/ "richard gale\n", + /* 58*/ "mark green\n", + /* 59*/ "mark wilson\n", + /* 60*/ "hardware support\n", + /* 61*/ "pete cox\n", + /* 62*/ "paul mikell\n", + /* 63*/ "doug crouch\n", + /* 64*/ "thanks\n", + /* 65*/ "neil gallagher\n", + /* 66*/ "jonathon o'conner\n", + /* 67*/ "gareth glover\n", + /* 68*/ "motion capture\n", + /* 69*/ "alan tipper\n", + /* 70*/ "des easen\n", + /* 71*/ "jim ballard\n", + /* 72*/ "michelle tipper\n", + /* 73*/ "testing (rare)\n", + /* 74*/ "huw ward\n", + /* 75*/ "david wong\n", + /* 76*/ "adam munton\n", + /* 77*/ "luke munton\n", + /* 78*/ "garry phelps\n", + /* 79*/ "jon silke\n", + /* 80*/ "matthew carter\n", + /* 81*/ "gavin price\n", + /* 82*/ "gareth stevenson\n", + /* 83*/ "joe stamper\n", + /* 84*/ "stephen stamper\n", + /* 85*/ "testing (noa)\n", + /* 86*/ "nintendo guy\n", + /* 87*/ "nintendo gal\n", + /* 88*/ "rare miami\n", + /* 89*/ "eileen hochberg\n", + /* 90*/ "joel hochberg\n", + /* 91*/ "rare twycross\n", + /* 92*/ "chris stamper\n", + /* 93*/ "tim stamper\n", + /* 94*/ "nintendo\n", + /* 95*/ "ken lobb\n", + /* 96*/ "howard lincoln\n", + /* 97*/ "mr arrakawa\n", + /* 98*/ "mr yamauchi\n", + /* 99*/ "copyright rare 2000\n", + /*100*/ "perfect dark, the pd device and\n", + /*101*/ "perfecthead are trademarks\n", + /*102*/ "rare\n", + /*103*/ "designs on the future\n", + /*104*/ "t&a support\n", + /*105*/ "emma scully\n", + /*106*/ "claire phelan\n", + /*107*/ "joanna dark is forever\n", + /*108*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, + /*112*/ NULL, + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/titleP.c b/src/files/lang/pal-beta/titleP.c new file mode 100644 index 000000000..561257e86 --- /dev/null +++ b/src/files/lang/pal-beta/titleP.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_f.c b/src/files/lang/pal-beta/title_str_f.c new file mode 100644 index 000000000..669348998 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_f.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "attitude adjuster\n", + /* 15*/ "b jones\n", + /* 16*/ "textured guru\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "ben cullum\n", + /* 57*/ "louise tilston\n", + /* 58*/ "alistair lindsay\n", + /* 59*/ "development tools\n", + /* 60*/ "richard gale\n", + /* 61*/ "mark green\n", + /* 62*/ "mark wilson\n", + /* 63*/ "hardware support\n", + /* 64*/ "pete cox\n", + /* 65*/ "paul mikell\n", + /* 66*/ "doug crouch\n", + /* 67*/ "thanks\n", + /* 68*/ "neil gallagher\n", + /* 69*/ "jonathon o'conner\n", + /* 70*/ "gareth glover\n", + /* 71*/ "motion capture\n", + /* 72*/ "alan tipper\n", + /* 73*/ "des easen\n", + /* 74*/ "jim ballard\n", + /* 75*/ "michelle tipper\n", + /* 76*/ "sue fell\n", + /* 77*/ "testing (rare)\n", + /* 78*/ "huw ward\n", + /* 79*/ "david wong\n", + /* 80*/ "adam munton\n", + /* 81*/ "luke munton\n", + /* 82*/ "gary phelps\n", + /* 83*/ "jon silke\n", + /* 84*/ "matthew carter\n", + /* 85*/ "gavin price\n", + /* 86*/ "gareth stevenson\n", + /* 87*/ "bushbaby\n", + /* 88*/ "stephen stamper\n", + /* 89*/ "ross bullimore\n", + /* 90*/ "justin cook\n", + /* 91*/ "dale murchie\n", + /* 92*/ "testing (noa)\n", + /* 93*/ "nintendo guy\n", + /* 94*/ "nintendo gal\n", + /* 95*/ "rare miami\n", + /* 96*/ "eileen hochberg\n", + /* 97*/ "joel hochberg\n", + /* 98*/ "rare twycross\n", + /* 99*/ "chris stamper\n", + /*100*/ "wombat\n", + /*101*/ "nintendo\n", + /*102*/ "ken lobb\n", + /*103*/ "howard lincoln\n", + /*104*/ "mr arakawa\n", + /*105*/ "mr yamauchi\n", + /*106*/ "copyright rare 2000\n", + /*107*/ "perfect dark, the pd device and\n", + /*108*/ "perfecthead are trademarks\n", + /*109*/ "rare\n", + /*110*/ "designs on the future\n", + /*111*/ "Joanna Dark est éternelle\n", + /*112*/ "Perfect Dark 2 est prêt, il sortira le...\n", + /*113*/ NULL, + /*114*/ NULL, + /*115*/ NULL, + /*116*/ NULL, + /*117*/ NULL, + /*118*/ NULL, + /*119*/ NULL, + /*120*/ NULL, + /*121*/ NULL, + /*122*/ NULL, + /*123*/ NULL, + /*124*/ NULL, + /*125*/ NULL, + /*126*/ NULL, + /*127*/ NULL, + /*128*/ NULL, + /*129*/ NULL, + /*130*/ NULL, + /*131*/ NULL, + /*132*/ NULL, + /*133*/ NULL, + /*134*/ NULL, + /*135*/ NULL, + /*136*/ NULL, + /*137*/ NULL, + /*138*/ NULL, + /*139*/ NULL, + /*140*/ NULL, + /*141*/ NULL, + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_g.c b/src/files/lang/pal-beta/title_str_g.c new file mode 100644 index 000000000..02519b400 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_g.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle höhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschütterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergründe\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "jon silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark für immer\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_i.c b/src/files/lang/pal-beta/title_str_i.c new file mode 100644 index 000000000..f935d0916 --- /dev/null +++ b/src/files/lang/pal-beta/title_str_i.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer Galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci nell'oscurità\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "commandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare al luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-più buio di te!\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect \n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/title_str_s.c b/src/files/lang/pal-beta/title_str_s.c new file mode 100644 index 000000000..85e50b19f --- /dev/null +++ b/src/files/lang/pal-beta/title_str_s.c @@ -0,0 +1,156 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animación\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseños futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "maníaco diseñador galés\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios biónicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "tío del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "técnicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el núcleo perfecto\n", + /*129*/ "- más oscuro que tú -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseñando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traE.c b/src/files/lang/pal-beta/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-beta/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traJ.c b/src/files/lang/pal-beta/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/pal-beta/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/traP.c b/src/files/lang/pal-beta/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-beta/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_f.c b/src/files/lang/pal-beta/tra_str_f.c new file mode 100644 index 000000000..c7ac116d1 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash on ététransférés dans le secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans levaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux Maian sont équipés d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de ranimer votre compagnon. Ces appareils sont réglés sur la physiologie Maian. Vous trouverez ce dispositif dans l'épave ou dans les restes du vaisseau transférés aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 3: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu pénétrer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar où nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objectif 4: - Ranimer le Garde du Corps Maian\n\nRanimez le Maian avant de vous enfuire - une civière anti-grave pourrait se révélé assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau Maian hors du secteur 51.\n\n|Objecti 5: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivés auparavant.\n\nFIN\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash on ététransférés dans le secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans levaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 2: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu pénétrer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar où nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objectif 3: - Ranimer le Garde du Corps Maian\n\nRanimez le Maian avant de vous enfuire - une civière anti-grave pourrait se révélé assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau Maian hors du secteur 51.\n\n|Objecti 4: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivés auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash on ététransférés dans le secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans levaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objective 2: - Entrer dans le Hangar Secret\n\nNotre agent n'a pas pu pénétrer dans le Hangar auparavant, cela aurait griller sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan pendant qu'il essaiera d'ouvrir la porte du hangar où nous pensons qu'il se trouve un vaisseau Maian.\n\n|Objecti 3: - Quitter le secteur 51\n\nAmenez le garde du corps Maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivés auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "Ranimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous êtes en grave danger.\n", + /* 15*/ "Ils ont inondé cette zone avec du gaz empoisonné.\n", + /* 16*/ "Allez dans le labo où se trouve notre ami.\nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent méfiants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. Dépêchez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit extraterr.\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derrière.\n", + /* 29*/ "Jonathan a été tué.\n", + /* 30*/ "Elvis a été tué.\n", + /* 31*/ "Le hangar secret a été découvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activé.\n", + /* 34*/ "Opération Medkit annulée.\n", + /* 35*/ "Medkit administré.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Ouverture porte extérieure hangar.\n", + /* 38*/ "Fermeture porte extérieure hangar.\n", + /* 39*/ "Ouverture porte intérieure hangar.\n", + /* 40*/ "fermeture porte intérieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul à pouvoir piloter, Elvis alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derrière.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arrière pour\nouvire le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi\nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc médical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-là.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne\nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai senti dans\nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir\navant la fermeture des portes.\n", + /* 59*/ "Quelle horreur cette trottinette! En plus il n'y a\n", + /* 60*/ "qu'un siège. Il n'y de la place que pour deux\n", + /* 61*/ "Aucun style, c'est déprimant.\n", + /* 62*/ "Ce spécimen est la propriété du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera à deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas ça qui était prévu!\n", + /* 66*/ "Non, arrêter! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais être mort comme les autres. Vous êtes de l'Institut? Je vous reconnais. Vous m'avez aidé. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante déduction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au crâne. Chez nous c'est assez douloureux, nous avons une grosse tête.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Très bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est débranchée.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pièce est censée être scellée! \nVous ne connaissez pas les procédures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre ça! Ca appartient au \nGouvernement! C'est intolérable! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les procédures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_g.c b/src/files/lang/pal-beta/tra_str_g.c new file mode 100644 index 000000000..f802acac3 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Gerät ausgestattet, das man als automatischen Chirurgen bezeichnen könnte. Da dieses Gerät auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Gerät befindet sich entweder unter den Trümmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Hintergrundinformationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das extraterrestrische Medipack!\n", + /* 10*/ "Treffen Sie sich mit unserem Agenten!\n", + /* 11*/ "Wiederbeleben Sie den Maianischen Bodyguard!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flüchten Sie aus der Area 51\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor.\nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glück!\n", + /* 18*/ "Gute Arbeit, Jo. Wir müssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors geföffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen.\n", + /* 25*/ "Joanna! Hier drüben.\n", + /* 26*/ "Wir müssen zu unserem Freund zurück.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurück!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert.\n", + /* 34*/ "Medipack-Atkivität unterbrochen.\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Äußeres Hangartor wird geöffnet.\n", + /* 38*/ "Äußeres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geöffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir können dich nicht zurücklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu öffnen.\n", + /* 46*/ "Ich flüchte mit dem Hoverbike. Gebt mir Deckung, \nwährend ich die Tore öffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kümmere mich um die Konsolen.\n", + /* 48*/ "Es ist gefährlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kümmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Türen zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten gerät.\n", + /* 57*/ "Dieser Geruch... Öl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausgänge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur für EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das war´s dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du weißt, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie dieser selbstgefällige Dieb mit Nervengas klarkommt. Sie wird es sich in Zukunft überlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das für ein Geräusch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhören! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir müssen raus hier.\n", + /* 68*/ "Keuchen, röcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich würde so wie die anderen auseinandergenommen. Sie müssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Größe will das was heißen.\n", + /* 76*/ "Können Sie gehen? Wir müssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie heißen Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hölle machen Sie hier? \nDieser Raum ist nur für autorisiertes Personal! \nWissen Sie den gar nichts über die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darüber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie dürfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe für Vorschriften nicht viel übrig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_i.c b/src/files/lang/pal-beta/tra_str_i.c new file mode 100644 index 000000000..544a23c1f --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso è il modo più veloce e sicuro per svegliare un Maian dal momento che è progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione - \n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington - \n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi di questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, questo è Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. Lì c'è un nascondiglio.\n", + /* 17*/ "Mi metterò di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan è stato ucciso!\n", + /* 30*/ "Elvis è stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Trovato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "È l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimane indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andrò io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "È pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho già sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. È una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di più!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare è proprietà governativa e non può assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penserà due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos'è quel rumore? Non può... È gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota! Fuori dai piedi!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Attento... è pericolosa!\n", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c'è niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "Sì, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /* 83*/ "Non può prendere quello! È proprietà governativa! \nÈ intollerabile! È... è... \nè inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/tra_str_s.c b/src/files/lang/pal-beta/tra_str_s.c new file mode 100644 index 000000000..e9aa94dd1 --- /dev/null +++ b/src/files/lang/pal-beta/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Alienígena de AutoCirugía\n\nTodas las naves Maian llevan un dispositivo de AutoCirugía. Utilizarlo es el método más rápido y seguro de despertarle, ya que ha sido diseñado para la fisiología Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cinco: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "ÁREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cuatro: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete médico alienígena\n", + /* 10*/ "Encontrar al espía del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del Área 51\n", + /* 14*/ "¿Joanna? Jonathan al habla. Estás en peligro de muerte.\n", + /* 15*/ "Han inundado el área con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contención. \nAllí hay un lugar secreto.\n", + /* 17*/ "Contactaré contigo cuando estés allí. ¡Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Están \nsospechando de mí.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contención. Deprisa.\n", + /* 20*/ "Obtén el paquete médico alienígena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paquete médico alienígena\n", + /* 23*/ "", + /* 24*/ "Paquete médico alienígena obtenido.\n", + /* 25*/ "Joanna. Aquí.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cúbreme, Joanna...\n", + /* 28*/ "Vale. Apártate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete médico alienígena activado.\n", + /* 34*/ "Operación del paquete médico abortada.\n", + /* 35*/ "El paquete médico alienígena ha sido administrado.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el único camino para salir de aquí.\n", + /* 42*/ "Eres el único que puede pilotarlo, Elvis, así que entra.\n", + /* 43*/ "Pero no podemos dejarte atrás.\n", + /* 44*/ "Tiene que haber un camino para salir de aquí.\n", + /* 45*/ "Uno de nosotros debe quedarse atrás para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldré en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocuparé de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Créeme.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldición, Joanna... ¡cúbreme!\n", + /* 52*/ "Cubriré las escaleras. Tú toma la rampa.\n", + /* 53*/ "Las puertas del hangar están abiertas.\n", + /* 54*/ "Puertas de contención médica abiertas.\n", + /* 55*/ "El paquete médico debería estar por aquí.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en más problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los\notros hangares.\n", + /* 58*/ "La aeromoto me sacará de aquí antes de que \ncierren la base.\n", + /* 59*/ "¡Oh, no! Tenemos un problema. ¡Es monoplaza!\n", + /* 60*/ "Cabrían dos, pero ninguno más.\n", + /* 61*/ "Además, no tiene estilo. ¿Sabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese espécimen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qué tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. ¡Se lo pensará dos veces antes de jorobarme otra vez!\n", + /* 64*/ "¿Qué es ese ruido? No puede ser... ¡Gas!\n", + /* 65*/ "¡Noooo, esto no debía ocurrir!\n", + /* 66*/ "¡Por favor, para! Se supone que no debo morir. Ella... ¡Arggghhh!\n", + /* 67*/ "¡Idiota! Será mejor que salgamos de aquí.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***¡Aahh...! ¡Aahaa...! ¡Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que había caído como los otros. Eres del Instituto, ¿no es así? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "Tú... ¿Tú hablas nuestro idioma?\n", + /* 72*/ "Mírala... qué lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "¿Qué pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como ésta, no es cuestión de broma.\n", + /* 76*/ "¿Puedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que sí. ¿Cómo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero tú puedes llamarme... ¡Elvis!\n", + /* 80*/ "La consola no está activa.\n", + /* 81*/ "¿Qué demonios se supone que haces? \n¡Se supone que esto es una habitación sellada! \n¿No sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "¡No puedes coger eso! ¡Es propiedad del gobierno! \n¡Esto es intolerable! ¡No es... ¡No es... \n...profesional!!\n", + /* 84*/ "¡No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-beta/uffE.c b/src/files/lang/pal-beta/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uffJ.c b/src/files/lang/pal-beta/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uffP.c b/src/files/lang/pal-beta/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_f.c b/src/files/lang/pal-beta/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_g.c b/src/files/lang/pal-beta/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_i.c b/src/files/lang/pal-beta/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/uff_str_s.c b/src/files/lang/pal-beta/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-beta/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-beta/waxE.c b/src/files/lang/pal-beta/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-beta/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/waxJ.c b/src/files/lang/pal-beta/waxJ.c new file mode 100644 index 000000000..f130240d2 --- /dev/null +++ b/src/files/lang/pal-beta/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/waxP.c b/src/files/lang/pal-beta/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-beta/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_f.c b/src/files/lang/pal-beta/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette créature pour annuler toute possibilité de représailles contre les Skedars par des éléments résiduels de cette corporation infidèle. L'idée d'humains réussissant à menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries à Héliport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef sécurité dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu'à l'héliport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me déranger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Immédiatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a été immobilisée.\n", + /* 15*/ "Cassandra a été capturée.\n", + /* 16*/ "Le chef de la Sécurité a été éliminé.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a été placée correctement.\n", + /* 23*/ "La Bombe skedar a explosé.\n", + /* 24*/ "Porte d'ascenseur verrouillée - La bombe ne peut être placée.\n", + /* 25*/ "Ascenseur désactivé.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_g.c b/src/files/lang/pal-beta/wax_str_g.c new file mode 100644 index 000000000..430eeb2b0 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsergebnisse und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den dataDyne-Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrünnigen Firma gegen die Skedar von vorneherein auszuschließen. So lachhaft die Vorstellung, dass die Menschen die Skedar auslöschen könnten, auch sein mag, man darf die Macht einer Vendetta nicht unterschätzen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen \n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsergebnisse und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nEND\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz im Aufzug!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Büro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schießen!\n", + /* 10*/ "Wie können Sie es wagen, mich zu stören?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie wäre, würde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schießen!\n", + /* 14*/ "Cassandra ist bewusstlos.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Der Sicherheitschef wurde eliminiert.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen.\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstüren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Der Aufzug wurde außer Kraft gesetzt.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_i.c b/src/files/lang/pal-beta/wax_str_i.c new file mode 100644 index 000000000..8447ff579 --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa distruggere la razza, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione - \n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra è immobilizzata!\n", + /* 15*/ "Cassandra è stata catturata!\n", + /* 16*/ "Il capo della sicurezza è stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar è in posizione corretta.\n", + /* 23*/ "La bomba Skedar è esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore è stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-beta/wax_str_s.c b/src/files/lang/pal-beta/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/pal-beta/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Eliminar al Capitán de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporación. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capitán de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "¡No me dispararás!\n", + /* 10*/ "¡Cómo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusión, chica.\n", + /* 12*/ "Si yo fuera tú, me marcharía... ¡AHORA!\n", + /* 13*/ "¡No me dispararás!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con éxito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con éxito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameE.c b/src/files/lang/pal-final/ameE.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-final/ameE.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameJ.c b/src/files/lang/pal-final/ameJ.c new file mode 100644 index 000000000..3a47eb0a0 --- /dev/null +++ b/src/files/lang/pal-final/ameJ.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the Communication blackout by placing another ECM mine on the equipment in the Security room at the base of the building, this will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "02:30am 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable Internal Security Hub\n", + /* 17*/ "Obtain Keycode Necklace\n", + /* 18*/ "Download Project Files\n", + /* 19*/ "Disable External Comms Hub\n", + /* 20*/ "Gain Entrance to Laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Lets see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Dont kill me!\n", + /* 27*/ "If I were you, I'd leave.... NOW!\n", + /* 28*/ "Badly placed ECM mine\n", + /* 29*/ "ECM mine placed correctly\n", + /* 30*/ "MISSION FAILED - Objectives Incomplete\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer Executive Erased\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye Dr Caroll\n", + /* 43*/ "You've written your last bug traitor\n", + /* 44*/ "File Download Initiated\n", + /* 45*/ "File Download Completed\n", + /* 46*/ "ACCESS DENIED - Password Needed\n", + /* 47*/ "Door Unlocked\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to Download - Data Uplink Needed\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr Caroll Conversation...\n", + /* 53*/ "Don't Shoot, Don't Shoot!\n", + /* 54*/ "Critical Mission Object Destroyed \n", + /* 55*/ "Unacceptable civilian casualties\n", + /* 56*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 57*/ "Critical Mission Personnel Killed \n", + /* 58*/ "Obtain ECM Mines\n", + /* 59*/ "Dr Carolls\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine\n", + /* 63*/ "Obtain Data Uplink\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move It!\n", + /* 72*/ "I've got a password problem and you're\nthe man to help me with it\n", + /* 73*/ "Don't Shoot, Dont Shoot!\n", + /* 74*/ "Datalink Broken - Connection Terminated\n", + /* 75*/ "Datalink Error - Incomplete File Download\n", + /* 76*/ "Internal Security System Temporarily Disabled\n", + /* 77*/ "External Communications Hub Disabled\n", + /* 78*/ "Laboratory Lift Located\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine Needed To Disable Security Hub\n", + /* 81*/ "ECM Mine Needed To Disable Comms Hub\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl\n", + /* 85*/ "If I were you I'd leave....NOW!\n", + /* 86*/ "Please don't kill me\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain Eye Spy\n", + /* 89*/ "Dr Carolls\n", + /* 90*/ "Eye Spy\n", + /* 91*/ "An Eye Spy\n", + /* 92*/ "Picked up an Eye Spy\n", + /* 93*/ "We're getting a positive reading -\nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the\nsecurity room.\n", + /* 96*/ "The basement elevator must be around\nthere somewhere.\n", + /* 97*/ "Security System Has Been Brought Back Online\n", + /* 98*/ "You Vandal, You've Broken It!\n", + /* 99*/ "2023 AD, 22:14 Lucerne Tower - Datadyne HQ\n", + /*100*/ "Why the big hurry?", + /*101*/ "If Dr. Caroll is not extracted tonight, dataDyne will put him through mind conditioning, and we'll lose our best chance of finding out what dataDyne are up to.", + /*102*/ "Are they all expendable?", + /*103*/ "Don't joke! You have to be careful, Joanna. Code keys will only operate while the owner is alive; if you kill them, the key is useless. Armed guards are a different matter, of course.", + /*104*/ "What's the target location?", + /*105*/ "Work your way down the building to the ground level. Dr. Caroll will be in a research lab somewhere in the underground facility.", + /*106*/ "How will I recognise him?", + /*107*/ "We don't have an image record, and we can't find any official files. all we have is the name. Good luck, Perfect Dark.", + /*108*/ NULL, + /*109*/ NULL, + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ameP.c b/src/files/lang/pal-final/ameP.c new file mode 100644 index 000000000..ea4667452 --- /dev/null +++ b/src/files/lang/pal-final/ameP.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Access Executive Computer Files\n\nDr. Caroll's future is being decided in a meeting on one of the office floors. The Executive in charge of Dr. Caroll's project is present at the meeting. Follow him to his office and gain access to his project files, then download them to us using your Data Uplink device.\n\n|Objective Four: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Five: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Jam the Internal Security Comms Hub\n\nThis is located in one of the top floors of the building, away from ground traffic interference. Use an ECM Mine to jam the hub and black out the security cameras. The mine must be attached to the hub to be effective. Be quick, though, as the mine will only last for about a minute or so.\n\n|Objective Two: - Obtain De Vries' Necklace/Key\n\nCassandra De Vries carries her Access Key for restricted areas of the building on her necklace. It is linked to her personal health monitor and will cease to be active if her life signs fail. If you take the Necklace/Key from her, you must render her unconscious, not kill her.\n\n|Objective Three: - Jam the External Security Comms Link\n\nComplete the communication blackout by placing another ECM Mine on the equipment in the Security Room at the base of the building. This will jam any automatic calls for outside help.\n\n|Objective Four: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nThis is your first mission, Joanna, and it could hardly be more vital to us. We need to get Dr. Caroll out of there before anything happens to him, and we also need to know about dataDyne's future plans. Our standard rules of engagement apply: do not kill unarmed civilians. Remember, the code keys only work if their owners are alive.\n\n|Objective One: - Secure the Secret Lift\n\nLocate the secure lift to the Basement Laboratory where Dr. Caroll is incarcerated. The exact location is unknown, but it should be found somewhere on the foyer level.\n\nEND\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCentral Divisional HQ Chicago IL USA.", + /* 10*/ "0230 Hours 15 AUG 2023\n", + /* 11*/ "Obtain De Vries' necklace.\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Necklace\n", + /* 14*/ "De Vries' necklace\n", + /* 15*/ "Picked up De Vries' necklace.\n", + /* 16*/ "Disable internal security hub\n", + /* 17*/ "Obtain keycode necklace\n", + /* 18*/ "Download project files\n", + /* 19*/ "Disable external comms hub\n", + /* 20*/ "Gain entrance to laboratory\n", + /* 21*/ "Who are you and what are you doing here?\n", + /* 22*/ "Look out! She's got a gun.\n", + /* 23*/ "You won't shoot me, foolish child!\n", + /* 24*/ "Don't you know who I am?\n", + /* 25*/ "Let's see how you deal with security.\n", + /* 26*/ "PLEASE!!!! Don't kill me!\n", + /* 27*/ "If I were you, I'd leave... NOW!\n", + /* 28*/ "Badly placed ECM Mine.\n", + /* 29*/ "ECM Mine placed correctly.\n", + /* 30*/ "MISSION FAILED - objectives incomplete.\n", + /* 31*/ " MISSION SUCCESSFUL \n", + /* 32*/ "CANNOT complete all objectives.\n", + /* 33*/ "Time to erase those files.\n", + /* 34*/ "Computer executive erased.\n", + /* 35*/ "I'll do what you want!\n", + /* 36*/ "HELP - Intruder!\n", + /* 37*/ "You talk too much.\n", + /* 38*/ "HELP, HELP!\n", + /* 39*/ "I'll do what you want...\n", + /* 40*/ "Logging on now...\n", + /* 41*/ "Okay, I'm in...\n", + /* 42*/ "Goodbye, Dr. Caroll.\n", + /* 43*/ "You've written your last bug, traitor!\n", + /* 44*/ "File download initiated.\n", + /* 45*/ "File download completed.\n", + /* 46*/ "ACCESS DENIED - password needed.\n", + /* 47*/ "Door unlocked.\n", + /* 48*/ "DOH!\n", + /* 49*/ "Unable to download - Data Uplink needed.\n", + /* 50*/ "LIGHTS NOW ON\n", + /* 51*/ "LIGHTS NOW OFF\n", + /* 52*/ "Erase Dr. Caroll conversation...\n", + /* 53*/ "Don't shoot, don't shoot!\n", + /* 54*/ "Critical mission object destroyed.\n", + /* 55*/ "Unacceptable civilian casualties.\n", + /* 56*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 57*/ "Critical mission personnel killed.\n", + /* 58*/ "Obtain ECM Mines.\n", + /* 59*/ "Dr. Caroll's\n", + /* 60*/ "ECM Mine\n", + /* 61*/ "An ECM Mine\n", + /* 62*/ "Picked up an ECM Mine.\n", + /* 63*/ "Obtain Data Uplink.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "A Data Uplink\n", + /* 67*/ "Picked up a Data Uplink.\n", + /* 68*/ "Yes, yes, I agree. Personality is expendable\n in this case.\n", + /* 69*/ "No, I can start the process from my office\n terminal and delete the necessary files\n at the same time.\n", + /* 70*/ "I'll begin at once. Goodbye.\n", + /* 71*/ "Move it!\n", + /* 72*/ "I've got a password problem, and you're \nthe man to help me with it.\n", + /* 73*/ "Don't shoot, don't shoot!\n", + /* 74*/ "Datalink broken - connection terminated.\n", + /* 75*/ "Datalink error - incomplete file download.\n", + /* 76*/ "Internal security system temporarily disabled.\n", + /* 77*/ "External communications hub disabled.\n", + /* 78*/ "Laboratory lift located.\n", + /* 79*/ "Security... Help me!\n", + /* 80*/ "ECM Mine needed to disable security hub.\n", + /* 81*/ "ECM Mine needed to disable comms hub.\n", + /* 82*/ "Dummy\n", + /* 83*/ "How dare you disturb me!\n", + /* 84*/ "You will regret this intrusion, girl!\n", + /* 85*/ "If I were you, I'd leave...NOW!\n", + /* 86*/ "Please don't kill me!\n", + /* 87*/ "Don't shoot!\n", + /* 88*/ "Obtain CamSpy.\n", + /* 89*/ "Dr. Caroll's\n", + /* 90*/ "CamSpy\n", + /* 91*/ "A CamSpy\n", + /* 92*/ "Picked up a CamSpy.\n", + /* 93*/ "We're getting a positive reading - \nthe internal comms hub is nearby.\n", + /* 94*/ "You're on the same floor as \nCassandra's office.\n", + /* 95*/ "The other hub has got to be in the \nSecurity Room.\n", + /* 96*/ "The basement elevator must be around \nthere somewhere.\n", + /* 97*/ "Security system is now back online.\n", + /* 98*/ "You vandal, you've broken it!\n", + /* 99*/ "2023 AD, 2214 Hours Lucerne Tower - dataDyne HQ\n", + /*100*/ "Why the big hurry?\n", + /*101*/ "If Dr. Caroll is not extracted tonight, \ndataDyne will put him through mind \nconditioning, and we'll lose our best \nchance of finding out what dataDyne \nare up to.\n", + /*102*/ "Are they all expendable?\n", + /*103*/ "Don't joke! You have to be careful, Joanna. \nCode keys will only operate while the owner \nis alive... If you kill them, the key is \nuseless. Armed guards are a different matter, \nof course.\n", + /*104*/ "What's the target location?\n", + /*105*/ "Work your way down the building to the ground \nlevel. Dr. Caroll will be in a research lab \nsomewhere in the underground facility.\n", + /*106*/ "How will I recognize him?\n", + /*107*/ "We don't have an image record, and we can't \nfind any official files. All we have is the \nname. Good luck, Perfect Dark.\n", + /*108*/ "Right, I'm in...\n", + /*109*/ "I...I'm logging on now.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_f.c b/src/files/lang/pal-final/ame_str_f.c new file mode 100644 index 000000000..adefe2c1c --- /dev/null +++ b/src/files/lang/pal-final/ame_str_f.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être fixé sur le relais pour fonctionner. Faites vite, l'effet ne dure qu' une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte la clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Accéder aux fichiers ordi dirigeant\n\nLe sort du Dr. Caroll est à l'ordre du jour d'une réunion, dans l'un des bureaux. Le dirigeant chargé du projet du Dr. Caroll sera présent. Suivez-le jusqu'à son bureau et accédez à ses fichiers, puis téléchargez-les grâce à votre récepteur.\n\n|Objectif 4: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 5: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, et elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Brouiller le relais de communications\n\nIl est situé sur l'un des toits de l'immeuble, loin des interférences du trafic au sol. Utilisez une mine CME sur le relais pour brouiller les caméras de surveillance. La mine doit être appliquée sur le relais pour fonctionner. Faites vite, l'effet ne dure qu'une minute environ.\n\n|Objectif 2: - Trouver le collier-clé de De Vries\n\nCassandra De Vries porte sa clé d'accès aux zones interdites de l'immeuble sur son collier. Il est connecté à ses pulsations et cessera de fonctionner si elle vient à mourir. Prenez le collier et neutralisez-la sans la tuer.\n\n|Objectif 3: - Brouiller les communications extérieures\n\nAchevez le brouillage des communications en plaçant une autre mine CME sur le matériel de la salle de surveillance à la base de l'immeuble. Ils ne pourront ainsi appeler des renforts extérieurs.\n\n|Objectif 4: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Il affirme avoir critiqué les implications morales du dernier projet de la dataDyne et celle-ci compte le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nVoici votre première mission, Joanna, elle est d'une haute importance. Il nous faut récupérer le Dr. Caroll avant qu'il ne soit en danger et en apprendre plus sur les projets de la dataDyne. Notre protocole d'action: épargner les civils désarmés. Souvenez-vous: les clés codées ne fonctionnent que si leurs détenteurs sont en vie.\n\n|Objectif 1: - Trouver l'ascenseur secret\n\nAtteignez l'ascenseur de sécurité menant au laboratoire souterrain où le Dr. Caroll est détenu. Sa position exacte est inconnue, mais il doit se situer non loin du hall.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne:\nQG central Chicago IL USA.", + /* 10*/ "Heure: 02:30 15 AOUT 2023\n", + /* 11*/ "Obtenir collier de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collier\n", + /* 14*/ "Collier de De Vries\n", + /* 15*/ "Collier de De Vries obtenu.\n", + /* 16*/ "Neutraliser relais intérieur\n", + /* 17*/ "Obtenir collier-clé\n", + /* 18*/ "Télécharger fichiers\n", + /* 19*/ "Neutraliser relais extérieur\n", + /* 20*/ "Accéder au laboratoire\n", + /* 21*/ "Qui êtes-vous? Que faites-vous là?\n", + /* 22*/ "Attention! Elle est armée!\n", + /* 23*/ "Vous n'oserez pas... Jeune sotte!\n", + /* 24*/ "Savez-vous qui je suis?\n", + /* 25*/ "J'appelle la sécurité.\n", + /* 26*/ "PITIE!!!! Ne me tuez pas!\n", + /* 27*/ "Un conseil: partez, MAINTENANT!\n", + /* 28*/ "Mine CME mal placée.\n", + /* 29*/ "Mine CME placée correctement.\n", + /* 30*/ "MISSION ECHOUEE - objectifs incomplets.\n", + /* 31*/ " MISSION ACCOMPLIE \n", + /* 32*/ "Objectifs inatteignables.\n", + /* 33*/ "Il est temps d'effacer les fichiers.\n", + /* 34*/ "Ordinateur dirigeant effacé.\n", + /* 35*/ "Je ferai ce que vous voulez!\n", + /* 36*/ "A L'AIDE - Intrus!\n", + /* 37*/ "Vous parlez trop.\n", + /* 38*/ "AU SECOURS! A MOI!\n", + /* 39*/ "Je ferai ce que vous voulez...\n", + /* 40*/ "Je me connecte...\n", + /* 41*/ "OK. Connexion terminée...\n", + /* 42*/ "Adieu, Dr. Caroll.\n", + /* 43*/ "La fin est proche, sale traître!\n", + /* 44*/ "Téléchargement en cours.\n", + /* 45*/ "Téléchargement complet.\n", + /* 46*/ "ACCES REFUSE - mot de passe requis.\n", + /* 47*/ "Porte déverrouillée.\n", + /* 48*/ "HEIN?!\n", + /* 49*/ "Erreur télécharg. - Récepteur absent.\n", + /* 50*/ "LUMIERES ON\n", + /* 51*/ "LUMIERES OFF\n", + /* 52*/ "Effacez la conversation du Dr. Caroll.\n", + /* 53*/ "Ne...ne tirez pas!\n", + /* 54*/ "Objet crucial détruit.\n", + /* 55*/ "Pertes civiles inacceptables.\n", + /* 56*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 57*/ "Personnel crucial tué.\n", + /* 58*/ "Obtenir mines CME.\n", + /* 59*/ "Dr. Caroll: \n", + /* 60*/ "Mine CME\n", + /* 61*/ "Une Mine CME\n", + /* 62*/ "Mine CME obtenue.\n", + /* 63*/ "Obtenir récepteur.\n", + /* 64*/ "\n", + /* 65*/ "Récepteur\n", + /* 66*/ "Un récepteur\n", + /* 67*/ "Récepteur obtenu.\n", + /* 68*/ "Oui, oui, je suis d'accord. On peut se passer\n de sa personnalité.\n", + /* 69*/ "Non, je peux y travailler depuis mon ordinateur\n de bureau et effacer les fichiers\n en même temps.\n", + /* 70*/ "Je m'y mets tout de suite. Au revoir.\n", + /* 71*/ "Au pied!\n", + /* 72*/ "J'ai un problème de mot de passe, et vous \nallez le résoudre.\n", + /* 73*/ "Ne tirez pas! Ne tirez pas!\n", + /* 74*/ "Transfert interrompu - connexion perdue.\n", + /* 75*/ "Erreur transfert - téléchargement incomplet.\n", + /* 76*/ "Système de sécurité temporairement annulé.\n", + /* 77*/ "Communications extérieures coupées.\n", + /* 78*/ "Ascenseur du laboratoire localisé.\n", + /* 79*/ "Sécurité!!! A l'aide!\n", + /* 80*/ "Mine CME requise pour brouiller sécurité.\n", + /* 81*/ "Mine CME requise pour brouiller coms.\n", + /* 82*/ "Leurre\n", + /* 83*/ "Vous osez me déranger?\n", + /* 84*/ "Vous allez le regretter, jeune fille!\n", + /* 85*/ "Un conseil: partez...MAINTENANT!\n", + /* 86*/ "Ne me tuez pas!\n", + /* 87*/ "Pitié!\n", + /* 88*/ "Obtenir CamSpy.\n", + /* 89*/ "La CamSpy du\n", + /* 90*/ "Dr. Caroll\n", + /* 91*/ "Une CamSpy\n", + /* 92*/ "CamSpy obtenue.\n", + /* 93*/ "Signal positif - \nle relais de com intérieur est proche.\n", + /* 94*/ "Le bureau de Cassandra est à \ncet étage.\n", + /* 95*/ "L'autre relais doit être dans la \nsalle de surveillance.\n", + /* 96*/ "L'ascenseur souterrain doit être dans \nle coin.\n", + /* 97*/ "Système de sécurité opérationnel.\n", + /* 98*/ "Bravo...ça ne marche plus!\n", + /* 99*/ "2023, H: 22:14 Tour Lucerne - QG dataDyne\n", + /*100*/ "Pourquoi agir si vite?\n", + /*101*/ "Si le Dr. Caroll n'est pas sauvé ce soir, \nses supérieurs conditionneront son \nesprit et nous ne pourrons découvrir \nles plans de la dataDyne. \n", + /*102*/ "Peut-on les éliminer?\n", + /*103*/ "Pas de bêtises: une clé de sécurité ne \nfonctionne que si le détenteur est \nen vie. Ne tuez donc pas n'importe \nqui. Vous pouvez vous occuper des \ngardes armés...\n", + /*104*/ "Où se trouve la cible?\n", + /*105*/ "Descendez l'immeuble jusqu'aux niveaux \ninférieurs. Le Dr. Caroll se trouve \ndans un laboratoire souterrain.\n", + /*106*/ "Comment le reconnaître?\n", + /*107*/ "Nous n'avons aucune photo, ni document \nd'archive. Nous ne connaissons que \nson nom. Bonne chance, Perfect Dark.\n", + /*108*/ "OK. J'y suis...\n", + /*109*/ "Je...Je me connecte.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_g.c b/src/files/lang/pal-final/ame_str_g.c new file mode 100644 index 000000000..239a44f97 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_g.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Erlangen Sie Zugang zu den geheimen Daten!\n\nZur Stunde wird über Dr. Carolls Zukunft verhandelt. Das Meeting, bei dem der Manager, der für Dr. Carolls Projekt verantwortlich zeichnet anwesend ist, findet in einem der Bürotrakte statt. Folgen Sie ihm in sein Büro, greifen Sie auf die Projektdaten zu und übertragen Sie sie an uns mit Hilfe Ihres Data Uplink-Gerätes.\n\n|4. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|5. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Blockieren Sie das interne Sicherheitssystem!\n\nDer Schaltblock ist in einem der oberen Stockwerke untergebracht, wo er vor Interferenzen geschützt ist. Setzen Sie eine ECM-Mine ein, um Funksignale zu blockieren und die Kameras auszuschalten. Die Mine muss direkt am Schaltblock angebracht werden, um effektiv arbeiten zu können. Sie müssen rasch agieren, da die Mine nur eine Minute lang aktiv ist.\n\n|2. Ziel: - Bringen Sie De Vries' Halskette in Ihren Besitz!\n\nCassandra De Vries trägt den Codeschlüssel für Sperrzonen innerhalb des Gebäudes an ihrer Halskette. Der Schlüssel steht in Verbindung mit ihrem persönlichen Gesundheitsstatus Überwachungsgerät. Sobald kein Lebenszeichen mehr übertragen wird, verliert der Schlüssel seinen Nutzen. Wenn Sie die Kette an sich nehmen, sorgen Sie dafür, dass De Vries nur bewusstlos ist.\n\n|3. Ziel: - Blockieren Sie das externe Sicherheitssystem!\n\nKomplettieren Sie den Ausfall der Funkverbindungen, indem Sie eine weitere ECM-Mine am Schaltblock im Security-Raum nahe des Fundaments des Gebäudes anbringen. Dadurch werden sämtliche automatisch generierten SOS-Rufe nach draußen blockiert.\n\n|4. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Caroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bitte lautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wieder bereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nJoanna, dies ist Ihre erste Mission und gleichzeitig die wichtigste für unsere Organisation. Wir müssen Dr. Caroll in Sicherheit bringen, bevor ihm etwas zustößt. Außerdem müssen wir unbedingt Einsicht in die zukünftigen Aktivitäten von dataDyne bekommen. Für diesen Einsatz gelten unsere Standardregeln: Neutralisieren Sie keine unbewaffneten Zivilisten, und vergessen Sie nicht, dass Codeschlüssel nur funktionieren, solange ihre Besitzer am Leben sind.\n\n|1. Ziel: - Finden Sie den geheimen Aufzug!\n\nOrten Sie den geheimen Aufzug zum Labor im Keller, wo Dr. Caroll gefangengehalten wird. Die exakte Position des Aufzugs ist unbekannt, aber er sollte sich nahe des Foyers befinden.\n\nENDE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\n Abteilungshauptquartier Chicago IL USA.", + /* 10*/ "0230 Uhr 15 AUG 2023\n", + /* 11*/ "Bringen Sie die De Vries' Halskette in Ihren Besitz!\n", + /* 12*/ "Cassandra De Vries'\n", + /* 13*/ "Halskette\n", + /* 14*/ "De Vries' Halskette\n", + /* 15*/ "De Vries' Halskette aufgenommen\n", + /* 16*/ "Blockieren Sie das Sicherheitssystem!\n", + /* 17*/ "Finden Sie den Schlüssel!\n", + /* 18*/ "Kopieren Sie die Projektdaten!\n", + /* 19*/ "Blockieren Sie die externe Sicherheit!\n", + /* 20*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 21*/ "Wer sind Sie, und was haben Sie hier verloren?\n", + /* 22*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 23*/ "Du wirst nicht auf mich schießen, dummes Kind!\n", + /* 24*/ "Du weißt wohl nicht, wer ich bin.\n", + /* 25*/ "Mal sehen, wie du mit der Security klarkommst.\n", + /* 26*/ "BITTE!!!! Tun Sie mir nichts!\n", + /* 27*/ "Wäre ich du, würde ich verschwinden... und zwar JETZT!\n", + /* 28*/ "ECM-Mine wurde nicht korrekt platziert.\n", + /* 29*/ "ECM-Mine wurde korrekt platziert.\n", + /* 30*/ "MISSION FEHLGESCHLAGEN - Zielerreichung unvollständig.\n", + /* 31*/ " MISSION ERFOLGREICH \n", + /* 32*/ "Erreichung aller Ziele UNMÖGLICH.\n", + /* 33*/ "Es ist an der Zeit, diese Daten zu löschen.\n", + /* 34*/ "Festplatte gelöscht\n", + /* 35*/ "Ich tue alles, was Sie verlangen!\n", + /* 36*/ "HILFE - Ein Eindringling!\n", + /* 37*/ "Du sprichst zuviel.\n", + /* 38*/ "HILFE, HILFE!\n", + /* 39*/ "Ich tue alles, was Sie verlangen...\n", + /* 40*/ "Ich logge mich jetzt ein...\n", + /* 41*/ "Okay, ich bin drin...\n", + /* 42*/ "Auf Wiedersehen, Dr. Caroll.\n", + /* 43*/ "Du hast deinen letzten Virus geschrieben, Verräter!\n", + /* 44*/ "Kopiervorgang gestartet\n", + /* 45*/ "Kopiervorgang abgeschlossen\n", + /* 46*/ "ZUGRIFF VERWEIGERT - Passwort erforderlich\n", + /* 47*/ "Türverriegelung aufgehoben\n", + /* 48*/ "HÄH!\n", + /* 49*/ "Kopiervorgang kann nicht gestartet werden - Data Uplink erforderlich.\n", + /* 50*/ "BELEUCHTUNG AKTIVIERT\n", + /* 51*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 52*/ "Löschen Sie die Konversation mit Dr. Caroll...\n", + /* 53*/ "Nicht schießen, nicht schießen!\n", + /* 54*/ "Wichtiges Objekt zerstört\n", + /* 55*/ "Anzahl der zivilen Opfer ist unakzeptabel.\n", + /* 56*/ "MISSION FEHLGESCHLAGEN \n - Gesamtzielerreichung unmöglich\n", + /* 57*/ "Wichtige Person neutralisiert\n", + /* 58*/ "Erlangen Sie ECM-Minen.\n", + /* 59*/ "Dr. Carolls\n", + /* 60*/ "ECM-Mine\n", + /* 61*/ "Eine ECM-Mine\n", + /* 62*/ "ECM-Mine aufgenommen\n", + /* 63*/ "Erlangen Sie das Data Uplink-Gerät.\n", + /* 64*/ "\n", + /* 65*/ "Data Uplink\n", + /* 66*/ "Ein Data Uplink\n", + /* 67*/ "Data Uplink aufgenommen\n", + /* 68*/ "Ja, ja, dem stimme ich zu. Personen sind in diesem\nFall entbehrlich.\n", + /* 69*/ "Nein, ich kann den Vorgang von meinem Büro\naus initiieren und die entsprechenden Files löschen.\nJa, das erfolgt gleichzeitig.\n", + /* 70*/ "Ich fange sofort an. Wiederhören.\n", + /* 71*/ "Beweg dich!\n", + /* 72*/ "Ich habe ein Passwort-Problem, und du bist\nderjenige, der mir aus der Patsche helfen wird.\n", + /* 73*/ "Nicht schießen, nicht schießen!\n", + /* 74*/ "Datalink defekt - Verbindung terminiert\n", + /* 75*/ "Datalink Error - Kopiervorgang unvollständig\n", + /* 76*/ "Internes Sicherheitssystem temporär außer Kraft gesetzt.\n", + /* 77*/ "Externe Kommunikationssysteme außer Kraft gesetzt.\n", + /* 78*/ "Aufzug zum Labor geortet.\n", + /* 79*/ "Security... Hilfe!\n", + /* 80*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n", + /* 81*/ "Um den Schaltblock zu deaktivieren, wird eine ECM-Mine benötigt.\n", + /* 82*/ "Dummy\n", + /* 83*/ "Wie kannst du es wagen, mich zu stören?\n", + /* 84*/ "Du wirst dieses Eindringen bereuen, Kleine!\n", + /* 85*/ "Wäre ich du, würde ich verschwinden,... und zwar JETZT!\n", + /* 86*/ "Bitte tun Sie mir nichts!\n", + /* 87*/ "Nicht schießen!\n", + /* 88*/ "Erlangen Sie den CamSpy.\n", + /* 89*/ "Dr. Carolls\n", + /* 90*/ "CamSpy\n", + /* 91*/ "Ein CamSpy\n", + /* 92*/ "CamSpy aufgenommen\n", + /* 93*/ "Wir empfangen ein deutliches Signal - \nder Schaltblock für die internen Sicherheitssysteme muss in der Nähe sein.\n", + /* 94*/ "Sie befinden sich im gleichen Stockwerk wie\nCassandras Büro.\n", + /* 95*/ "Der andere Schaltblock muss im \nSecurity Raum sein.\n", + /* 96*/ "Der Aufzug zum Keller muss hier \nirgendwo sein.\n", + /* 97*/ "Das Sicherheitssystem ist wieder online.\n", + /* 98*/ "Du Vandale, du hast es zerstört!\n", + /* 99*/ "2023 AD, 2214 Uhr Lucerne Tower - dataDyne HQ\n", + /*100*/ "Warum die Hektik?\n", + /*101*/ "Wenn Dr. Caroll heute nicht gerettet wird, \nwird er von dataDyne einer gedanklichen \nKonditionierung unterzogen. So würden wir \nunsere beste Chance verlieren, um herauszufinden, \nwas dataDyne beabsichtigt.\n", + /*102*/ "Sind dort alle Personen entbehrlich?\n", + /*103*/ "Machen Sie keine Witze! Sie müssen vorsichtig sein, Joanna. \nCodeschlüssel nützen nur, solange ihre Besitzer \nam Leben sind; wenn Sie sie ausschalten, verliert der \nSchlüssel seinen Wert. Bewaffnete Wachen sind natürlich \nein anderes Thema...\n", + /*104*/ "Wie lautet der Zielbereich?\n", + /*105*/ "Arbeiten Sie sich von oben vor, bis Sie das unterste Stockwerk \nerreichen. Dr. Caroll befindet sich irgendwo in einem der \nLabors in den unterirdischen Trakten.\n", + /*106*/ "Woran erkenne ich ihn?\n", + /*107*/ "Wir verfügen über kein Bildmaterial, und wir können \nauch keine offiziellen Akten finden. Alles was wir haben, \nist sein Name. Viel Glück, Perfect Dark.\n", + /*108*/ "Ich bin jetzt drin...\n", + /*109*/ "Ich...Ich logge mich jetzt ein.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_i.c b/src/files/lang/pal-final/ame_str_i.c new file mode 100644 index 000000000..9d8f54ff5 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_i.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\nSi trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Trova i file nel PC del direttore\n\nIn uno dei piani dell'edificio principale si tiene una riunione per decidere del futuro del Dr. Caroll, vi partecipa anche il direttore responsabile del suo progetto. Seguilo nel suo ufficio e trova i file di tale progetto, scaricali sulla nostra rete usando il tuo Connettore Dati.\n\n|Obiettivo 4: - Disattiva sistema di sicurezza esterno\n\nMetti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 5: - Trova l'ascensore segreto\n\nTrova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Disattiva sistema di sicurezza interno\n\n Si trova in uno dei piani superiori dell'edificio lontano dalle interferenze del traffico stradale. Usa una mina ECM per mandare in tilt la centralina e le telecamere di sicurezza. Devi attaccare la mina alla centralina perché abbia effetto. Fa presto! La mina dura solamente un minuto circa.\n\n|Obiettivo 2: - Prendi la collana-chiave di De Vries\n\nCassandra De Vries tiene al collo la chiave d'accesso alle aree di sicurezza dell'edificio. La collana è connessa ad un sensore del suo stato di salute e si disattiverà in caso di morte. Se vuoi prenderle la collana dovrai tramortirla senza ucciderla.\n\n|Obiettivo 3: - Disattiva sistema di sicurezza esterno\n\n Metti un'altra mina ECM sulla strumentazione nella Stanza di Sicurezza al piano terra: questo manderà in tilt la richiesta automatica d'aiuto esterno, mettendo così totalmente fuori uso il sistema di sicurezza.\n\n|Obiettivo 4: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nJoanna, questa è la tua prima missione ed è di vitale importanza per noi. Dobbiamo salvare il Dr. Caroll prima che gli succeda qualcosa e dobbiamo scoprire di più sui piani futuri della dataDyne. Attieniti alle nostre regole standard: non uccidere civili disarmati. Ricorda che le chiavi magnetiche funzionano solo se i loro possessori sono in vita.\n\n|Obiettivo 1: - Trova l'ascensore segreto\n\n Trova l'ascensore segreto per il laboratorio sotterraneo dov'è rinchiuso il Dr. Caroll. La sua posizione esatta è sconosciuta ma dovrebbe essere sul piano dell'atrio.\n\nFINE\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nQG Div. Centrale Chicago IL USA.", + /* 10*/ "Ore 0230 15 AGO 2023\n", + /* 11*/ "Prendi collana di De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collana\n", + /* 14*/ "Collana di De Vries\n", + /* 15*/ "Presa collana di De Vries.\n", + /* 16*/ "Disattiva sistema di sicurezza interno\n", + /* 17*/ "Prendi collana-chiave\n", + /* 18*/ "Scarica file del progetto\n", + /* 19*/ "Disattiva sistema di sicurezza esterno\n", + /* 20*/ "Cerca di entrare nel laboratorio\n", + /* 21*/ "Chi sei e che ci fai qui?\n", + /* 22*/ "Attenzione! È armata.\n", + /* 23*/ "Non lo farei se fossi in te!\n", + /* 24*/ "Tu non sai chi sono io!\n", + /* 25*/ "Vediamo come fai con la sicurezza.\n", + /* 26*/ "TI PREGO!!! Non sparare!\n", + /* 27*/ "Se fossi in te girerei i tacchi!\n", + /* 28*/ "Mina in posizione errata\n", + /* 29*/ "Mina piazzata correttamente\n", + /* 30*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 31*/ " MISSIONE COMPIUTA \n", + /* 32*/ "IMPOSSIBILE completare obiettivi!\n", + /* 33*/ "È ora di cancellare i file.\n", + /* 34*/ "Cancellato PC direttore.\n", + /* 35*/ "Farò quel che vuoi!\n", + /* 36*/ "ALLARME - Intrusione!\n", + /* 37*/ "Tu parli troppo!\n", + /* 38*/ "AIUTO! AIUTO!\n", + /* 39*/ "Farò quel che vuoi...\n", + /* 40*/ "Connessione in corso...\n", + /* 41*/ "Bene, ci sono...\n", + /* 42*/ "Arrivederci, Dr. Caroll.\n", + /* 43*/ "Comincia a pregare, verme!\n", + /* 44*/ "Scaricamento in corso\n", + /* 45*/ "Scaricamento completato\n", + /* 46*/ "ACCESSO NEGATO: inserire password\n", + /* 47*/ "Aperta la porta!\n", + /* 48*/ "TOH!\n", + /* 49*/ "Impossibile scaricare: serve Connettore Dati\n", + /* 50*/ "LUCI ACCESE\n", + /* 51*/ "LUCI SPENTE\n", + /* 52*/ "Cancellare conversazione con Dr. Caroll\n", + /* 53*/ "Non sparare! Non sparare!\n", + /* 54*/ "Distrutto strumento essenziale alla missione\n", + /* 55*/ "Vittime civili inaccettabili\n", + /* 56*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 57*/ "Ucciso personale essenziale alla missione\n", + /* 58*/ "Procurati mina ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Mina ECM\n", + /* 62*/ "Presa mina ECM\n", + /* 63*/ "Procurati Connettore Dati.\n", + /* 64*/ "\n", + /* 65*/ "C. Dati\n", + /* 66*/ "Un Connettore Dati\n", + /* 67*/ "Preso Connettore Dati.\n", + /* 68*/ "Sì, sì! Sono d'accordo. Possibili vittime\n sono giustificate.\n", + /* 69*/ "No, posso iniziare dal terminale del mio\n ufficio e cancellare i file necessari\n al tempo stesso.\n", + /* 70*/ "Inizierò subito. A dopo.\n", + /* 71*/ "Muoviti!\n", + /* 72*/ "Ho problemi con la password, e tu sei \nl'unico che può aiutarmi.\n", + /* 73*/ "Non sparare! Non sparare!\n", + /* 74*/ "Errore datalink: connessione terminata\n", + /* 75*/ "Errore datalink: scaricamento incompleto\n", + /* 76*/ "Sistema di sicurezza interno temp. fuori uso.\n", + /* 77*/ "Sistema di sicurezza esterno fuori uso.\n", + /* 78*/ "Ascensore laboratorio localizzato.\n", + /* 79*/ "Sicurezza... Aiuto!\n", + /* 80*/ "Serve mina ECM per disattivare sicurezza interno\n", + /* 81*/ "Serve mina ECM per disattivare sicurezza esterno\n", + /* 82*/ "Idiota\n", + /* 83*/ "Come osi disturbarmi!\n", + /* 84*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 85*/ "Se fossi in te starei alla larga!\n", + /* 86*/ "Ti prego, risparmiami!\n", + /* 87*/ "Non sparare!\n", + /* 88*/ "Procurati TeleSpia.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "TeleSpia\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "Presa la TeleSpia.\n", + /* 93*/ "Siamo sulla pista giusta! Siamo \nvicini al sistema di sicurezza\n interno.\n", + /* 94*/ "Sei sul piano dell'ufficio di \nCassandra.\n", + /* 95*/ "L'altra centralina dev'essere \nnella Stanza di Sicurezza.\n", + /* 96*/ "L'ascensore dev'essere qui da \nqualche parte.\n", + /* 97*/ "Il sistema di sicurezza funziona ora.\n", + /* 98*/ "L'hai rotto, maledizione!\n", + /* 99*/ "AD 2023, ore 2214 Lucerne Tower - QG dataDyne\n", + /*100*/ "Cos'è tutta 'sta fretta?\n", + /*101*/ "Se non salviamo il Dr. Caroll stanotte, \ndataDyne gli farà il lavaggio del \ncervello e noi non sapremo mai \nquali sono i loro piani. \n\n", + /*102*/ "Posso fare piazza pulita?\n", + /*103*/ "Attenta, Joanna! Qui non si scherza! \nLa chiave funziona solo se chi la porta è \nancora vivo; altrimenti si disattiverà. \nCerto, con le guardie armate \nè tutta un'altra storia! \n", + /*104*/ "Dove si trova l'obiettivo?\n", + /*105*/ "Fatti strada fino al piano terra: il \nDr. Caroll si trova nel laboratorio \nal piano sotterraneo dell'edificio.\n", + /*106*/ "Come faccio a riconoscerlo?\n", + /*107*/ "Non abbiamo né sue foto, né file \nufficiali. Tutto ciò che abbiamo è il \nsuo nome. Buona fortuna, Perfect Dark.\n", + /*108*/ "Ok, ci sono...\n", + /*109*/ "Sto... sto entrando!\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/ame_str_s.c b/src/files/lang/pal-final/ame_str_s.c new file mode 100644 index 000000000..ecadad960 --- /dev/null +++ b/src/files/lang/pal-final/ame_str_s.c @@ -0,0 +1,116 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Acceder a los Ficheros del Ordenador del Ejecutivo\n\nEl futuro del Dr. Caroll está siendo decidido en una reunión en uno de los pisos de oficinas. El Ejecutivo a cargo del proyecto del Dr. Caroll está allí presente. Síguele a su oficina y accede a los ficheros de su proyecto, entonces mándanoslos usando el Conector de Datos.\n\n|Objetivo Cuatro: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cinco: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Bloquear el Puerto Interno de Comunicaciones de Seguridad\n\nÉste está localizado en uno de los pisos superiores del edificio, lejos de las interferencias del tráfico. Usa una Mina ECM para bloquear el puerto y 'oscurecer' las cámaras de seguridad. La mina debe ser ubicada en el puerto para ser efectiva. Actúa rápido ya que la mina durará más o menos un minuto.\n\n|Objetivo Dos: - Obtener el Collar/Llave de De Vries\n\nCassandra De Vries lleva su Llave de Acceso para las áreas restringidas del edificio en su collar. Está conectado con su monitor personal de corazón y dejará de estar activo si fallan sus constantes vitales. Si le quitas su Collar/Llave, debes dejarla inconsciente, pero no matarla.\n\n|Objetivo Tres: - Bloquear la Conexión Externa de Comunicaciones de Seguridad\n\nCompleta el 'apagón' de comunicaciones colocando otra Mina ECM en el equipo de la Sala de Seguridad sita en la base del edificio. Esto bloqueará cualquier llamada automática para buscar ayuda exterior.\n\n|Objetivo Cuatro: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne mañana por la noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual pero, en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nÉsta es tu primera misión, Joanna, y no podría ser más crucial para nosotros. Necesitamos sacar al Dr. Caroll de allí antes de que le ocurra algo, y además necesitamos conocer los futuros planes de dataDyne. Se aplicará, como siempre, la política de la organización: no matar civiles desarmados. Recuerda, las llaves de código sólo funcionan si sus propietarios están vivos.\n\n|Objetivo Uno: - Alcanzar el Ascensor Secreto\n\nLocaliza el ascensor de seguridad que va al Laboratorio del Sótano donde el Dr. Caroll está encarcelado. Se desconoce el lugar exacto, pero debe encontrarse en algún lugar del nivel del vestíbulo.\n\nFIN\n", + /* 4*/ " NULL3", + /* 5*/ " NULL4", + /* 6*/ " NULL5", + /* 7*/ " NULL6", + /* 8*/ " NULL7", + /* 9*/ "dataDyne\nCG División Central Chicago IL EE.UU.", + /* 10*/ "0230 Horas 15 AGO 2023\n", + /* 11*/ "Obtén el collar de De Vries.\n", + /* 12*/ "Cassandra De Vries:\n", + /* 13*/ "Collar\n", + /* 14*/ "Collar de De Vries\n", + /* 15*/ "Collar de De Vries obtenido.\n", + /* 16*/ "Desactivar puerto interno de seguridad\n", + /* 17*/ "Obtener el collar-código\n", + /* 18*/ "Descargar los ficheros del proyecto\n", + /* 19*/ "Desactivar puerto de com. externas\n", + /* 20*/ "Entrar en el laboratorio\n", + /* 21*/ "¿Quién eres tú y qué estás haciendo aquí?\n", + /* 22*/ "¡Cuidado! Tiene un arma.\n", + /* 23*/ "¡No me dispararás, tonta criatura!\n", + /* 24*/ "¿No sabes quién soy?\n", + /* 25*/ "Veamos cómo te las apañas con seguridad.\n", + /* 26*/ "¡¡¡¡POR FAVOR!!!! ¡No me mates!\n", + /* 27*/ "Si fuera tú, me marcharía... ¡AHORA!\n", + /* 28*/ "Mina ECM mal colocada.\n", + /* 29*/ "Mina ECM colocada correctamente.\n", + /* 30*/ "MISIÓN FALLADA: objetivos incompletos.\n", + /* 31*/ " MISIÓN CONSEGUIDA \n", + /* 32*/ "NO PUEDES completar todos los objetivos.\n", + /* 33*/ "Es hora de borrar esos ficheros.\n", + /* 34*/ "Ordenador del ejecutivo borrado.\n", + /* 35*/ "¡Haré lo que tú quieras!\n", + /* 36*/ "AYUDA. ¡Intruso!\n", + /* 37*/ "Hablas demasiado.\n", + /* 38*/ "¡AYUDA, AYUDA!\n", + /* 39*/ "¡Haré lo que tú quieras!\n", + /* 40*/ "Conectando ahora...\n", + /* 41*/ "Vale, estoy dentro...\n", + /* 42*/ "Adiós, Dr. Caroll.\n", + /* 43*/ "¡Has procesado tu último error, traidor!\n", + /* 44*/ "Descarga del fichero iniciada.\n", + /* 45*/ "Descarga del fichero completada.\n", + /* 46*/ "ACCESO DENEGADO. Necesitas la contraseña.\n", + /* 47*/ "Puerta desbloqueada.\n", + /* 48*/ "¡OH!\n", + /* 49*/ "Imposible descargar. Necesitas un Conector de Datos.\n", + /* 50*/ "LUCES ENCENDIDAS\n", + /* 51*/ "LUCES APAGADAS\n", + /* 52*/ "Borra la conversación del Dr. Caroll...\n", + /* 53*/ "¡No dispares, no dispares!\n", + /* 54*/ "Objeto crítico de la misión destruido.\n", + /* 55*/ "Bajas civiles inaceptables.\n", + /* 56*/ "MISIÓN FALLADA:\n los objetivos no pueden ser completados.\n", + /* 57*/ "Ha muerto una persona crítica para la misión.\n", + /* 58*/ "Obtén las Minas ECM.\n", + /* 59*/ "Dr. Caroll:\n", + /* 60*/ "Mina ECM\n", + /* 61*/ "Una Mina ECM\n", + /* 62*/ "Mina ECM obtenida.\n", + /* 63*/ "Obtén el Conector de Datos.\n", + /* 64*/ "\n", + /* 65*/ "C. Datos\n", + /* 66*/ "Un Conector de Datos\n", + /* 67*/ "Conector de Datos obtenido.\n", + /* 68*/ "Sí, sí, estoy de acuerdo. La personalidad es prescindible\n en este caso.\n", + /* 69*/ "No, puedo empezar el proceso desde el terminal\n de mi oficina y borrar los ficheros necesarios\n al mismo tiempo.\n", + /* 70*/ "Empezaré enseguida. Adiós.\n", + /* 71*/ "¡En marcha!\n", + /* 72*/ "Tengo un problema de contraseñas, y tú \neres el hombre que puede ayudarme con ello.\n", + /* 73*/ "¡No dispares, no dispares!\n", + /* 74*/ "Enlace de Datos perdido - conexión terminada.\n", + /* 75*/ "Error en el Enlace de Datos - descarga de fichero incompleta.\n", + /* 76*/ "Sistema de seguridad interno temporalmente desactivado.\n", + /* 77*/ "Puerto de comunicaciones externas desactivado.\n", + /* 78*/ "Ascensor del laboratorio localizado.\n", + /* 79*/ "Seguridad... ¡Ayúdenme!\n", + /* 80*/ "Mina ECM requerida para desactivar el puerto de seguridad.\n", + /* 81*/ "Mina ECM requerida para desactivar el puerto de comunicaciones.\n", + /* 82*/ "Tonto\n", + /* 83*/ "¡Cómo te atreves a molestarme!\n", + /* 84*/ "¡Te vas a arrepentir de esta intrusión, chica!\n", + /* 85*/ "Si yo fuera tú, me iría... ¡YA!\n", + /* 86*/ "¡Por favor, no me mates!\n", + /* 87*/ "¡No dispares!\n", + /* 88*/ "Obtén la Cámara Espía.\n", + /* 89*/ "Dr. Caroll:\n", + /* 90*/ "Cámara Espía\n", + /* 91*/ "Una Cámara Espía\n", + /* 92*/ "Cámara Espía obtenida.\n", + /* 93*/ "Estamos obteniendo una lectura positiva. \nEl puerto de comunicaciones interno está cerca.\n", + /* 94*/ "Estás en la misma planta que \nla oficina de Cassandra.\n", + /* 95*/ "El otro puerto debe estar en la \nSala de Seguridad.\n", + /* 96*/ "El ascensor del sótano debe de estar por \naquí en algún lugar.\n", + /* 97*/ "El sistema de seguridad está activo de nuevo.\n", + /* 98*/ "¡Vándalo! ¡Lo has roto!\n", + /* 99*/ "2023 d.C., 2214 Horas Edificio Lucerne - CG dataDyne\n", + /*100*/ "¿Por qué tanta prisa?\n", + /*101*/ "Si no sacamos al Dr. Caroll esta noche, \ndataDyne le lavará el cerebro, y \nperderemos nuestra mejor oportunidad \nde descubrir las intenciones de \ndataDyne.\n", + /*102*/ "¿Son todos prescindibles?\n", + /*103*/ "¡No bromees! Tienes que ser cuidadosa, Joanna. \nLas llaves código sólo funcionan cuando el \npropietario está vivo... Si les matas, la llave \nes inútil. Los guardas armados son otra cosa, \npor supuesto.\n", + /*104*/ "¿Dónde se encuentra el objetivo?\n", + /*105*/ "Debes bajar todo el edificio hasta la planta \nbaja. El Dr. Caroll estará en el laboratorio de \ninvestigación en algún lugar del subsuelo.\n", + /*106*/ "¿Cómo le reconoceré?\n", + /*107*/ "No tenemos ninguna imagen grabada, y no hemos \nencontrado ficheros oficiales. Todo lo que tenemos \nes su nombre. Buena suerte, Perfect Dark.\n", + /*108*/ "Bien, estoy dentro...\n", + /*109*/ "Estoy... estoy entrando ahora.\n", + /*110*/ NULL, + /*111*/ NULL, +}; diff --git a/src/files/lang/pal-final/archE.c b/src/files/lang/pal-final/archE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/archJ.c b/src/files/lang/pal-final/archJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/archP.c b/src/files/lang/pal-final/archP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/archP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_f.c b/src/files/lang/pal-final/arch_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_g.c b/src/files/lang/pal-final/arch_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_i.c b/src/files/lang/pal-final/arch_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arch_str_s.c b/src/files/lang/pal-final/arch_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arch_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecE.c b/src/files/lang/pal-final/arecE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecJ.c b/src/files/lang/pal-final/arecJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arecP.c b/src/files/lang/pal-final/arecP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arecP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_f.c b/src/files/lang/pal-final/arec_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_g.c b/src/files/lang/pal-final/arec_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_i.c b/src/files/lang/pal-final/arec_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arec_str_s.c b/src/files/lang/pal-final/arec_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/arec_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/arkE.c b/src/files/lang/pal-final/arkE.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-final/arkE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/arkJ.c b/src/files/lang/pal-final/arkJ.c new file mode 100644 index 000000000..fb399374c --- /dev/null +++ b/src/files/lang/pal-final/arkJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return To Helipad For Evac\n\nGet to the Helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access Foyer Elevator\n", + /* 10*/ "Reactivate Office Elevator\n", + /* 11*/ "Destroy Datadyne Hovercopter\n", + /* 12*/ "Defeat Cassandras Bodyguards\n", + /* 13*/ "Rendezvous at Helipad\n", + /* 14*/ "Accessing elevator controls....\n", + /* 15*/ "LIGHTS ARE NOW ON !\n", + /* 16*/ "Dr Caroll has been killed\n", + /* 17*/ "Dr Caroll is under attack!\n", + /* 18*/ "Dr Caroll has been damaged\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance..\n", + /* 21*/ "Goodnight Ms Dark\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here\n", + /* 27*/ "Obtain Night Sight\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Night Sight\n", + /* 31*/ "Picked up Night Sight\n", + /* 32*/ "We meet again girl!\n", + /* 33*/ "Foyer Elevator Accessed\n", + /* 34*/ "Office Elevator Door Has Been Unlocked\n", + /* 35*/ "Datadyne Hovercopter Eliminated\n", + /* 36*/ "Cassandras Bodyguards Have Been Defeated\n", + /* 37*/ "That's not how it goes\n", + /* 38*/ "Yes it is\n", + /* 39*/ "Give it to me, you're doing it wrong\n", + /* 40*/ "Stop annoying me\n", + /* 41*/ "Will you just hurry up\n", + /* 42*/ "Oh No....Too Late\n", + /* 43*/ "She's Here...\n", + /* 44*/ "Get Her\n", + /* 45*/ "Critical Mission Object Destroyed \n", + /* 46*/ "Obtain Eye Spy\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Eye Spy\n", + /* 49*/ "An Eye Spy\n", + /* 50*/ "Picked up an Eye Spy\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the Jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain Alpha Keycard\n", + /* 56*/ "Guards\n", + /* 57*/ "Office Keycard\n", + /* 58*/ "Office Keycard\n", + /* 59*/ "Picked up Cassandra's Office Keycard.\n", + /* 60*/ "Sound the alarm, she's here!", + /* 61*/ "Lights out!", + /* 62*/ "What the...?", + /* 63*/ "Going somewhere?", + /* 64*/ "Something I can do for you, old woman?", + /* 65*/ "Return our sapient immediately! You don't know what you're doing.", + /* 66*/ "Yes I do, I'm leaving.", + /* 67*/ "One more chance! Give it back, and you could come and work for me.", + /* 68*/ "Sorry! Gotta shoot.", + /* 69*/ "You must get the sapient back. We cannot proceed without it.", + /* 70*/ "I know that!", + /* 71*/ "I also know who to talk to... Mr. Carrington.", + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/arkP.c b/src/files/lang/pal-final/arkP.c new file mode 100644 index 000000000..81f4d5b3d --- /dev/null +++ b/src/files/lang/pal-final/arkP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Reactivate Elevator\n\nWe traced an order to shut down the only accessible elevator to a PC on the lowest floor of offices. You have to find that PC and change the order to get the elevator going again.\n\n|Objective Three: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Four: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Five: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Destroy dataDyne Gunship\n\nThere is a dataDyne security gunship circling the building which outguns your jumpship and will shoot you out of the sky. Terminate it with extreme prejudice, since it will be trying to do the same thing to you.\n\n|Objective Three: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Four: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 3*/ "|Background - \n\nThe alarm has been given, and there are dataDyne shock troops ready for you throughout the building. Exit via the foyer is impossible due to the number of ground troops present. The transport will collect you and Dr. Caroll from the helipad.\n\n|Carrington - \n\nI don't have to remind you to protect Dr. Caroll at all costs, Joanna. Cassandra and dataDyne are going to be throwing all the obstacles they can in your path to prevent you from getting Dr. Caroll out. Good luck.\n\n|Objective One: - Gain Access to Upper Floors\n\nFight your way around the foyer until you can get access to one of the lifts that will take you and Dr. Caroll to the upper floors of the building.\n\n|Objective Two: - Defeat Cassandra's Bodyguards\n\nWe suspect that Cassandra has deployed her bodyguards to block the route to the helipad. It is almost certain that you'll be unable to avoid them, so expect serious resistance when you encounter them.\n\n|Objective Three: - Return to Helipad for Evacuation\n\nGet to the helipad where your dropship will be waiting. And don't forget Dr. Caroll.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Access foyer elevator\n", + /* 10*/ "Reactivate office elevator\n", + /* 11*/ "Destroy dataDyne hovercopter\n", + /* 12*/ "Defeat Cassandra's bodyguards\n", + /* 13*/ "Rendezvous at helipad\n", + /* 14*/ "Accessing elevator controls...\n", + /* 15*/ "LIGHTS ARE NOW ON!\n", + /* 16*/ "Dr. Caroll has been killed!\n", + /* 17*/ "Dr. Caroll is under attack!\n", + /* 18*/ "Dr. Caroll has been damaged!\n", + /* 19*/ "Too late! She's here...\n", + /* 20*/ "You've become quite an annoyance...\n", + /* 21*/ "Good night, Ms. Dark.\n", + /* 22*/ "LIGHTS NOW ON\n", + /* 23*/ "LIGHTS NOW OFF\n", + /* 24*/ "MISSION FAILED\n", + /* 25*/ "MISSION SUCCESSFUL\n", + /* 26*/ "Helichopper warning goes here.\n", + /* 27*/ "Obtain Night Vision.\n", + /* 28*/ "Cassandra De Vries'\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Night Vision\n", + /* 31*/ "Picked up Night Vision.\n", + /* 32*/ "We meet again, girl!\n", + /* 33*/ "Foyer elevator accessed.\n", + /* 34*/ "Office elevator door has been unlocked.\n", + /* 35*/ "DataDyne Hovercopter eliminated.\n", + /* 36*/ "Cassandra's bodyguards have been defeated.\n", + /* 37*/ "That's not how it goes.\n", + /* 38*/ "Yes, it is.\n", + /* 39*/ "Give it to me - you're doing it wrong.\n", + /* 40*/ "Stop annoying me.\n", + /* 41*/ "Will you just hurry up!\n", + /* 42*/ "Oh, no...too late.\n", + /* 43*/ "She's here...\n", + /* 44*/ "Get her!\n", + /* 45*/ "Critical mission object destroyed. \n", + /* 46*/ "Obtain CamSpy.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "CamSpy\n", + /* 49*/ "A CamSpy\n", + /* 50*/ "Picked up a CamSpy.\n", + /* 51*/ "They've locked down the ground floor - \nget to the elevator!\n", + /* 52*/ "That copter needs to be taken out, or \nthe jumpship'll get shot down!\n", + /* 53*/ "I can't leave any bodyguards standing.\n", + /* 54*/ "Don't keep the jumpship waiting - \nget back to the landing pad.\n", + /* 55*/ "Obtain alpha key card.\n", + /* 56*/ "Guard's\n", + /* 57*/ "Office key card\n", + /* 58*/ "Office key card\n", + /* 59*/ "Picked up Cassandra's office key card.\n", + /* 60*/ "Sound the alarm - she's here!\n", + /* 61*/ "Lights out!\n", + /* 62*/ "What the...?\n", + /* 63*/ "Going somewhere?\n", + /* 64*/ "Something I can do for you, old woman?\n", + /* 65*/ "Return our sapient immediately! You don't \nknow what you're doing.\n", + /* 66*/ "Yes I do. I'm leaving.\n", + /* 67*/ "One more chance! Give it back, and you \ncould come and work for me.\n", + /* 68*/ "Sorry! Gotta shoot.\n", + /* 69*/ "You must get the sapient back. We cannot \nproceed without it.\n", + /* 70*/ "I know that!\n", + /* 71*/ "I also know who to talk to... \nMr. Carrington.\n", + /* 72*/ "Elevator door is inactive on this floor.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_f.c b/src/files/lang/pal-final/ark_str_f.c new file mode 100644 index 000000000..6451563d5 --- /dev/null +++ b/src/files/lang/pal-final/ark_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Réactiver l'ascenseur\n\nNous avons détecté la commande d'arrêt de fonctionnement de l'ascenseur donnée par un PC des bureaux inférieurs. Trouvez ce terminal et modifiez la commande pour réactiver l'ascenseur.\n\n|Objectif 3: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 4: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous interdire l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 5: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Détruire l'hélico de combat dataDyne\n\nUn hélico de combat de la dataDyne fait sa ronde autour de l'immeuble et risque de descendre votre transport. Abattez-le sans les coups de semonce d'usage. C'est lui ou vous.\n\n|Objectif 3: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 4: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nL'alarme a été donnée et les troupes d'intervention de la dataDyne sont à vos trousses dans l'immeuble. Une éventuelle fuite par le hall est impossible à cause du nombre de gardes présents. Rejoignez l'héliport avec le Dr. Caroll pour vous enfuir.\n\n|Carrington - \n\nJe n'ai pas besoin de vous rappeler de protéger le Dr. Caroll à tout prix. Cassandra et la dataDyne feront tout pour vous barrer la route et garder le Dr. Caroll. Bonne Chance.\n\n|Objectif 1: - Accéder aux niveaux supérieurs\n\nFrayez-vous un chemin autour du hall jusqu'à accéder à l'un des ascenseurs vous menant vous et le Dr. Caroll aux niveaux supérieurs du bâtiment.\n\n|Objectif 2: - Abattre la garde de Cassandra\n\nNous suspectons Cassandra d'avoir déployé ses gardes du corps pour vous barrer l'accès à l'héliport. Vous ne pourrez les semer, alors préparez-vous à un combat acharné.\n\n|Objectif 3: - Retour à l'héliport pour évacuation\n\nAccédez à l'héliport où votre appareil attendra. N'oubliez pas le Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Accéder à l'ascenseur du hall\n", + /* 10*/ "Réactiver l'ascenseur du bureau\n", + /* 11*/ "Détruire l'hovercopter dataDyne\n", + /* 12*/ "Battre les gardes de Cassandra\n", + /* 13*/ "Retour à l'héliport avec Dr. Caroll\n", + /* 14*/ "Accès paramètres ascenseur...\n", + /* 15*/ "LUMIERES ON\n", + /* 16*/ "Dr. Caroll abattu!\n", + /* 17*/ "Dr. Caroll sous feu ennemi!\n", + /* 18*/ "Dr. Caroll endommagé!\n", + /* 19*/ "Trop tard! La voici...\n", + /* 20*/ "Vous êtes une sacrée peste, vous...\n", + /* 21*/ "Bonne nuit, Miss Dark.\n", + /* 22*/ "LUMIERES ON\n", + /* 23*/ "LUMIERES OFF\n", + /* 24*/ "MISSION ECHOUEE\n", + /* 25*/ "MISSION ACCOMPLIE\n", + /* 26*/ "Emplacement pour warning hélico.\n", + /* 27*/ "Obtenir Vue nocturne.\n", + /* 28*/ "Cassandra De Vries: \n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne\n", + /* 31*/ "Vue nocturne obtenue.\n", + /* 32*/ "Re-bonjour, jeune fille!\n", + /* 33*/ "Ascenseur hall atteint.\n", + /* 34*/ "Porte ascenseur bureau ouverte.\n", + /* 35*/ "Hovercopter dataDyne éliminé.\n", + /* 36*/ "Gardes de Cassandra vaincus.\n", + /* 37*/ "Mais...pas comme ça!\n", + /* 38*/ "Mais si.\n", + /* 39*/ "Vous faites n'importe quoi!\n", + /* 40*/ "Silence.\n", + /* 41*/ "Mais dépêchez-vous!\n", + /* 42*/ "Oh, non...trop tard.\n", + /* 43*/ "La voilà...\n", + /* 44*/ "Attrapez-la!\n", + /* 45*/ "Objet crucial détruit. \n", + /* 46*/ "Obtenir CamSpy.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "CamSpy\n", + /* 49*/ "Une CamSpy\n", + /* 50*/ "CamSpy obtenue.\n", + /* 51*/ "Ils ont verrouillé le rez-de-chaussée - \nallez à l'ascenseur!\n", + /* 52*/ "Il faut détruire cet hélico ou le \ntransport sera descendu!\n", + /* 53*/ "Je ne peux laisser un garde du corps vivant.\n", + /* 54*/ "Ne faites attendre le transport - \nretournez à l'héliport.\n", + /* 55*/ "Obtenir la carte alpha.\n", + /* 56*/ "Garde: \n", + /* 57*/ "Carte de bureau\n", + /* 58*/ "Carte du bureau\n", + /* 59*/ "Carte de bureau de Cassandra obtenue.\n", + /* 60*/ "Alerte! Elle est ici!\n", + /* 61*/ "Bonne nuit!\n", + /* 62*/ "Qu'est-ce qu...?\n", + /* 63*/ "On se balade?\n", + /* 64*/ "Qu'est-ce qu'elle veut mère-grand?\n", + /* 65*/ "Remettez-moi le sapiens immédiatement! Vous ne \nsavez pas ce que vous faites...\n", + /* 66*/ "Oh que si. Je rentre chez moi.\n", + /* 67*/ "Pour la dernière fois: rendez ce qui \nm'appartient et je vous offre un poste.\n", + /* 68*/ "Désolée! Je me tire.\n", + /* 69*/ "Il nous faut le sapiens. Le reste de \nl'opération en dépend.\n", + /* 70*/ "J'en suis consciente!\n", + /* 71*/ "Je sais aussi à qui m'adresser...\nMr. Carrington.\n", + /* 72*/ "Porte d'ascenseur inutilisable à cet étage.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_g.c b/src/files/lang/pal-final/ark_str_g.c new file mode 100644 index 000000000..33daba87e --- /dev/null +++ b/src/files/lang/pal-final/ark_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Reaktivieren Sie den Aufzug!\n\nWir konnten herausfinden, dass der einzige erreichbare Aufzug von einem PC aus blockiert wird. Dieser PC befindet sich im tiefstgelegenen Bürotrakt. Sie müssen diesen PC finden, um den Aufzug wieder in Gang zu setzen.\n\n|3. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|4. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|5. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Vernichten Sie das dataDyne-Gunship!\n\nEin dataDyne-Gunship umkreist das Gebäude. Es besteht die Gefahr, dass diese Einheit Ihr Fluchtfahrzeug angreift und vom Himmel holt. Bei der Terminierung dieser Einheit müssen Sie mit äußerster Vorsicht vorgehen, da das Gunship auch das gleiche mit Ihnen versuchen wird.\n\n|3. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|4. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDer Alarm wurde ausgelöst, und dataDyne Einsatztruppen sind im gesamten Gebäude verteilt. Aufgrund der Konzentration im Bereich des Foyers ist es unmöglich, das Gebäude durch den Haupteingang zu verlassen. Der Transporter wird Sie und Dr. Caroll vom Helipad abholen.\n\n|Carrington - \n\nIch muss Sie wohl nicht daran erinnern, Dr. Caroll unter allen Umständen zu beschützen. Cassandra und dataDyne werden alle ihnen zur Verfügung stehenden Mittel einsetzen, um zu verhindern, dass Sie und Dr. Caroll entkommen. Viel Glück.\n\n|1. Ziel: - Erreichen Sie die oberen Stockwerke!\n\nKämpfen Sie sich am Foyer vorbei, bis Sie einen der Aufzüge erreichen, die Sie und Dr. Caroll zu den oberen Stockwerken des Gebäudes bringen.\n\n|2. Ziel: - Neutralisieren Sie Cassandras Bodyguards!\n\nWir vermuten, dass Cassandra ihre Bodyguards ausgesandt hat, um den Weg zum Helipad zu blockieren. Es steht so gut wie fest, dass Sie den Kontakt mit ihnen nicht vermeiden können. Bereiten Sie sich auf ernstzunehmenden Widerstand vor!\n\n|3. Ziel: - Erreichen Sie das Helipad, um zu evakuieren!\n\nKämpfen Sie sich zum Helipad vor, wo Ihr Fluchtschiff auf Sie wartet, und vergessen Sie bloß nicht Dr. Caroll!\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Erlangen Sie Zugang zum Foyer-Aufzug!\n", + /* 10*/ "Reaktivieren Sie den Büro-Aufzug!\n", + /* 11*/ "Zerstören Sie das dataDyne-Gunship!\n", + /* 12*/ "Neutralisieren Sie De Vries' Bodyguards!\n", + /* 13*/ "Erreichen Sie das Helipad!\n", + /* 14*/ "Zugriff auf die Aufzüge erfolgt...\n", + /* 15*/ "BELEUCHTUNG AKTIVIERT!\n", + /* 16*/ "Dr. Caroll wurde zerstört!\n", + /* 17*/ "Dr. Caroll wird angegriffen!\n", + /* 18*/ "Dr. Caroll wurde beschädigt!\n", + /* 19*/ "Zu spät! Sie ist hier...\n", + /* 20*/ "Du wirst langsam richtig lästig...\n", + /* 21*/ "Gute Nacht, Ms. Dark.\n", + /* 22*/ "BELEUCHTUNG AKTIVIERT\n", + /* 23*/ "BELEUCHTUNG DEAKTIVIERT\n", + /* 24*/ "MISSION FEHLGESCHLAGEN\n", + /* 25*/ "MISSION ERFOLGREICH\n", + /* 26*/ "Gunship-Warnung!!!\n", + /* 27*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 28*/ "Cassandra De Vries\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät\n", + /* 31*/ "Nachtsichtgerät aufgenommen\n", + /* 32*/ "So trifft man sich wieder, Kleine!\n", + /* 33*/ "Foyer-Aufzug betreten\n", + /* 34*/ "Tür zum Büro-Aufzug entriegelt\n", + /* 35*/ "dataDyne-Gunship eliminiert\n", + /* 36*/ "Cassandras Bodyguards wurden neutralisiert.\n", + /* 37*/ "So funktioniert das nicht.\n", + /* 38*/ "Doch, tut es.\n", + /* 39*/ "Gib das her - du machst das falsch!\n", + /* 40*/ "Hör auf mich zu nerven.\n", + /* 41*/ "Würdest du dich bitte beeilen?\n", + /* 42*/ "Oh nein, ...zu spät!\n", + /* 43*/ "Sie ist hier...\n", + /* 44*/ "Schnappt sie!\n", + /* 45*/ "Wichtiges Objekt zerstört\n", + /* 46*/ "Erlangen Sie den CamSpy.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "CamSpy\n", + /* 49*/ "Ein CamSpy\n", + /* 50*/ "CamSpy aufgenommen\n", + /* 51*/ "Der Zugang zum Parterre wurde verriegelt. - \nRasch zum Aufzug!\n", + /* 52*/ "Dieses Gunship muss vernichtet werden, sonst \nwird das Fluchtfahrzeug angegriffen!\n", + /* 53*/ "Ich muss mich noch um die Bodyguards kümmern.\n", + /* 54*/ "Lassen Sie das Fluchtfahrzeug nicht warten! - \nZurück zum Helipad!\n", + /* 55*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 56*/ "Wachen\n", + /* 57*/ "Büro-Schlüsselkarte\n", + /* 58*/ "Büro-Schlüsselkarte\n", + /* 59*/ "Cassandras Büro-Schlüsselkarte aufgenommen\n", + /* 60*/ "Gebt Alarm - sie ist hier!\n", + /* 61*/ "Licht AUS!\n", + /* 62*/ "Was zum...?\n", + /* 63*/ "Na, wohin willst du denn?\n", + /* 64*/ "Kann ich etwas für dich tun, alte Frau?\n", + /* 65*/ "Geben Sie uns den Sapienten sofort zurück! Sie wissen \nnicht, was Sie da tun!\n", + /* 66*/ "Doch, das tue ich. Ich verschwinde.\n", + /* 67*/ "Letzte Chance: Geben Sie ihn zurück, und Sie\nkönnten vielleicht in Zukunft für mich arbeiten.\n", + /* 68*/ "Tut mir leid, ich bin in Eile.\n", + /* 69*/ "Sie müssen uns das Ding zurückbringen. Wir können \nsonst nicht fortfahren.\n", + /* 70*/ "Das weiß ich!\n", + /* 71*/ "Ich weiß auch, mit wem ich sprechen muss... \nMr. Carrington.\n", + /* 72*/ "Die Aufzugstüren sind auf diesem Stockwerk inaktiv.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_i.c b/src/files/lang/pal-final/ark_str_i.c new file mode 100644 index 000000000..d725498c6 --- /dev/null +++ b/src/files/lang/pal-final/ark_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Riattiva l'ascensore\n\nIn un PC del piano inferiore degli uffici abbiamo rintracciato l'ordine di bloccare l'unico ascensore accessibile. Devi trovare quel PC e cambiare l'ordine per rimettere in funzione l'ascensore.\n\n|Obiettivo 3: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 4: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 5: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Distruggi la cannoniera della dataDyne\n\nL'edificio dataDyne è sorvegliato da una potente cannoniera di difesa pronta a farti fuori in ogni momento per impedirti di procedere. Distruggila con estrema determinazione, o abbatterà la navetta e annienterà anche te.\n\n|Obiettivo 3: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 4: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nÈ stato dato l'allarme e l'edificio è pieno di soldati pronti a darti il benvenuto! La fuga dall'atrio è impossibile a causa del numero di soldati presenti. Tu e il Dr. Caroll sarete prelevati da un mezzo di salvataggio dall'eliporto sul tetto.\n\n|Carrington:\n\nNon penso sia necessario ricordarti di proteggere il Dr. Caroll ad ogni costo, vero Joanna? Cassandra e la dataDyne faranno di tutto per impedirti di salvarlo. Fa attenzione!\n\n|Obiettivo 1: - Raggiungi i piani superiori\n\nFatti strada nell'atrio fino a raggiungere uno degli ascensori che porteranno te e il Dr. Caroll ai piani superiori dell'edificio.\n\n|Obiettivo 2: - Elimina guardie del corpo di Cassandra\n\nAbbiamo ragione di sospettare che Cassandra abbia sguinzagliato le sue guardie del corpo per bloccare l'accesso all'eliporto. Non riuscirai ad evitarle, quindi aspettati una lotta all'ultimo sangue quando le incontri.\n\n|Obiettivo 3: - Torna sul tetto per l'evacuamento\n\nRaggiungi l'eliporto dove ti attenderà il mezzo di salvataggio. Non dimenticarti del Dr. Caroll!\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Usa l'ascensore dell'atrio\n", + /* 10*/ "Riattiva l'ascensore degli uffici\n", + /* 11*/ "Distruggi la cannoniera dataDyne\n", + /* 12*/ "Elimina guardie del corpo di Cassandra\n", + /* 13*/ "Appuntamento all'eliporto\n", + /* 14*/ "I comandi dell'ascensore...\n", + /* 15*/ "LE LUCI SONO ACCESE!\n", + /* 16*/ "Il Dr. Caroll è stato ucciso!\n", + /* 17*/ "Attaccano il Dr. Caroll!\n", + /* 18*/ "Il Dr. Caroll è ferito!\n", + /* 19*/ "Troppo tardi! È già qui!\n", + /* 20*/ "Sei una vera scocciatura!\n", + /* 21*/ "Buona notte, Perfect Dark!\n", + /* 22*/ "LUCI ACCESE ORA\n", + /* 23*/ "LUCI SPENTE ORA\n", + /* 24*/ "MISSIONE FALLITA\n", + /* 25*/ "MISSIONE COMPIUTA\n", + /* 26*/ "Allarme cannoniera!\n", + /* 27*/ "Procurati Vista Notturna\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Vista Notturna\n", + /* 31*/ "Presa Vista Notturna\n", + /* 32*/ "Chi non muore si rivede!\n", + /* 33*/ "Raggiunto l'ascensore nell'atrio.\n", + /* 34*/ "Aperta la porta ascensore uffici.\n", + /* 35*/ "Eliminata la cannoniera dataDyne.\n", + /* 36*/ "Sconfitte le guardie del corpo di Cassandra.\n", + /* 37*/ "Non si fa così, idiota!\n", + /* 38*/ "Sì, invece!\n", + /* 39*/ "Dammi qua! Faccio io!\n", + /* 40*/ "Non scocciarmi!\n", + /* 41*/ "Ti vuoi dare una mossa?!\n", + /* 42*/ "Oh, no! Troppo tardi.\n", + /* 43*/ "Ci ha raggiunti...\n", + /* 44*/ "Prendila!\n", + /* 45*/ "Distrutto strumento essenziale alla missione\n", + /* 46*/ "Procurati TeleSpia.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "TeleSpia\n", + /* 49*/ "TeleSpia\n", + /* 50*/ "Presa la TeleSpia.\n", + /* 51*/ "Hanno chiuso il pianterreno! \nVa all'ascensore!\n", + /* 52*/ "Bisogna tirar giù quella cannoniera \no abbatterà la navetta!\n", + /* 53*/ "Non posso lasciar vive le guardie!\n", + /* 54*/ "Fai presto: vai alla navetta! \nTorna all'eliporto!\n", + /* 55*/ "Procurati la chiave alfa\n", + /* 56*/ "Guardia:\n", + /* 57*/ "Chiave dell'ufficio\n", + /* 58*/ "Chiave dell'ufficio\n", + /* 59*/ "Presa chiave ufficio di Cassandra\n", + /* 60*/ "Date l'allarme: è qui!\n", + /* 61*/ "Ma chiudi il becco!\n", + /* 62*/ "Ma cosa...?\n", + /* 63*/ "Dove credi di andare?\n", + /* 64*/ "Posso aiutarla, madama?\n", + /* 65*/ "Ridacci immediatamente il Sapiente! \nNon sai quel che fai!\n", + /* 66*/ "Certo che lo so: me ne vado!\n", + /* 67*/ "Te lo ripeto! Restituiscilo e \npotrai venire a lavorare per me.\n", + /* 68*/ "Spiacente! Ho da fare!\n", + /* 69*/ "Devi recuperare il Sapiente: senza \nnon è possibile andare avanti.\n", + /* 70*/ "Lo so benissimo!\n", + /* 71*/ "So anche con chi parlare... \ncon Carrington!\n", + /* 72*/ "La porta dell'ascensore è fuori servizio.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ark_str_s.c b/src/files/lang/pal-final/ark_str_s.c new file mode 100644 index 000000000..2c90413ec --- /dev/null +++ b/src/files/lang/pal-final/ark_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Reactivar Ascensor\n\nHemos interceptado una orden de cerrar el único ascensor accesible enviada a un PC situado en el piso de oficinas más bajo. Tienes que encontrar ese PC y cambiar la orden para hacer que el ascensor funcione de nuevo.\n\n|Objetivo Tres: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Cuatro: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cinco: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Destruir Helicóptero Gunship de dataDyne\n\nHay un helicóptero de seguridad de dataDyne dando vueltas alrededor del edificio que os supera en armamento y no dudará en derribaros. Acaba con el helicóptero sin prejuicios, ya que él intentará hacer lo mismo contigo.\n\n|Objetivo Tres: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Cuatro: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa alarma ha sido activada, y hay tropas de choque de dataDyne preparadas por todo el edificio. Salir por el vestíbulo es imposible debido al gran número de tropas presentes. El transporte os recogerá a ti y al Dr. Caroll en el helipuerto.\n\n|Carrington - \n\nNo creo que necesite recordarte que debes proteger al Dr. Caroll a toda costa, Joanna. Cassandra y dataDyne pondrán todos los obstáculos que puedan en tu camino para impedir que saques al Dr. Caroll de allí. Buena suerte.\n\n|Objetivo Uno: - Acceder a los Pisos Superiores\n\nAvanza por el vestíbulo hasta que tengas acceso a uno de los ascensores que os llevarán a ti y al Dr. Caroll a los pisos superiores del edificio.\n\n|Objetivo Dos: - Derrotar a las Guardaespaldas de Cassandra\n\nSospechamos que Cassandra ha desplegado a sus guardaespaldas para bloquear la ruta al helipuerto. Es casi seguro que no serás capaz de evitarlas, así que espera fiera resistencia cuando las encuentres.\n\n|Objetivo Tres: - Volver al Helipuerto para Evacuación\n\nVe al helipuerto donde tu nave de recogida te aguarda. Y no te olvides del Dr. Caroll.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Acceder al ascensor del vestíbulo\n", + /* 10*/ "Reactivar ascensor de las oficinas\n", + /* 11*/ "Destruir helicóptero de dataDyne\n", + /* 12*/ "Derrotar a las guard. de Cassandra\n", + /* 13*/ "Encuentro en el helipuerto\n", + /* 14*/ "Accediendo a los controles del ascensor...\n", + /* 15*/ "¡LUCES ENCENDIDAS!\n", + /* 16*/ "¡El Dr. Caroll ha muerto!\n", + /* 17*/ "¡Están atacando al Dr. Caroll!\n", + /* 18*/ "¡El Dr. Caroll ha sido dañado!\n", + /* 19*/ "¡Demasiado tarde! Ella está aquí...\n", + /* 20*/ "Estás empezando a ser un fastidio...\n", + /* 21*/ "Buenas noches, Srta. Dark.\n", + /* 22*/ "LUCES ENCENDIDAS\n", + /* 23*/ "LUCES APAGADAS\n", + /* 24*/ "MISIÓN FALLADA\n", + /* 25*/ "MISIÓN CUMPLIDA\n", + /* 26*/ "Aviso del Helicóptero va aquí.\n", + /* 27*/ "Obtén Visión Nocturna.\n", + /* 28*/ "Cassandra De Vries:\n", + /* 29*/ "V. Nocturna\n", + /* 30*/ "Visión Nocturna\n", + /* 31*/ "Visión Nocturna obtenida.\n", + /* 32*/ "¡Nos vemos de nuevo, chica!\n", + /* 33*/ "Accediste al ascensor del vestíbulo.\n", + /* 34*/ "La puerta del ascensor a las oficinas ha sido abierta.\n", + /* 35*/ "Helicóptero de dataDyne eliminado.\n", + /* 36*/ "Las guardaespaldas de Cassandra han sido derrotadas.\n", + /* 37*/ "Así no es como va.\n", + /* 38*/ "Sí, así es.\n", + /* 39*/ "Dámelo. Lo estás haciendo mal.\n", + /* 40*/ "Deja de molestarme.\n", + /* 41*/ "¡Debemos darnos prisa!\n", + /* 42*/ "Oh, no... demasiado tarde.\n", + /* 43*/ "Ella está aquí...\n", + /* 44*/ "¡Cogedla!\n", + /* 45*/ "Objeto crítico de la misión destruido. \n", + /* 46*/ "Obtén la Cámara Espía.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Cámara Espía\n", + /* 49*/ "Una Cámara Espía\n", + /* 50*/ "Cámara Espía obtenida.\n", + /* 51*/ "Han cerrado la planta baja. \n¡Ve al ascensor!\n", + /* 52*/ "¡Necesitamos acabar con ese helicóptero, \no derribará la nave de escape!\n", + /* 53*/ "No puedo dejar ninguna guardaespaldas en pie.\n", + /* 54*/ "No hagas esperar a la nave de escape: \nvuelve a la zona de aterrizaje.\n", + /* 55*/ "Obtén la llave magnética alfa.\n", + /* 56*/ "Guarda:\n", + /* 57*/ "Llave de la oficina\n", + /* 58*/ "Llave magnética de la oficina\n", + /* 59*/ "Llave magnética de la oficina de Cassandra obtenida.\n", + /* 60*/ "Activa la alarma: ¡ella está aquí!\n", + /* 61*/ "¡Luces fuera!\n", + /* 62*/ "¿Qué dem...?\n", + /* 63*/ "¿Vas a alguna parte?\n", + /* 64*/ "¿Puedo hacer algo por ti, anciana?\n", + /* 65*/ "¡Devuelve nuestra IA inmediatamente! No sabes \nlo que estás haciendo.\n", + /* 66*/ "Sí lo sé. Me largo.\n", + /* 67*/ "¡Otra oportunidad! Devuélvelo, y podrás \ntrabajar para mí.\n", + /* 68*/ "¡Lo siento! ¿Lo pillas?\n", + /* 69*/ "Debes traer de vuelta la IA. No podemos \navanzar sin ella.\n", + /* 70*/ "¡Ya lo sé!\n", + /* 71*/ "También sé con quién hablar... \ncon el Sr. Carrington.\n", + /* 72*/ "La puerta del ascensor no funciona en este piso.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/ashE.c b/src/files/lang/pal-final/ashE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ashJ.c b/src/files/lang/pal-final/ashJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ashP.c b/src/files/lang/pal-final/ashP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ashP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_f.c b/src/files/lang/pal-final/ash_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_g.c b/src/files/lang/pal-final/ash_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_i.c b/src/files/lang/pal-final/ash_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ash_str_s.c b/src/files/lang/pal-final/ash_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ash_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ateE.c b/src/files/lang/pal-final/ateE.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-final/ateE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ateJ.c b/src/files/lang/pal-final/ateJ.c new file mode 100644 index 000000000..4ee541df8 --- /dev/null +++ b/src/files/lang/pal-final/ateJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Joanna's Graduation Test - The Duel\n", + /* 1*/ "Defeat Your Opponent In A Duel.\n", + /* 2*/ "Defeat Your Opponent In A Duel.\n", + /* 3*/ "Defeat Your Opponent In A Duel.\n", + /* 4*/ "Defeat Your Opponent.\n", + /* 5*/ "Defeat Your Opponent.\n", + /* 6*/ "Defeat Your Opponent.\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat Your Opponent.\n", + /* 9*/ "Well Done! You Were Too Quick For Him!.\n", + /* 10*/ "Well Done! You Were Too Quick For Him!.\n", + /* 11*/ "Well Done! You Were Too Quick For Him!.\n", + /* 12*/ "Opponent Skill Level: AGENT\n", + /* 13*/ "Opponent Skill Level: SPECIAL AGENT\n", + /* 14*/ "Opponent Skill Level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ateP.c b/src/files/lang/pal-final/ateP.c new file mode 100644 index 000000000..f39953549 --- /dev/null +++ b/src/files/lang/pal-final/ateP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\n|Objective Three: - Defeat Trent Easton\n\nDefeat the simulation of a skilled government agent. The Simulant is an exceptionally able opponent; if you pass this test, you should be proud of your achievement.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\n|Objective Two: - Defeat Jonathan Dark\n\nDefeat the simulation of Jonathan Dark, the Institute's current test score record holder. The Simulant has good combat abilities and is capable of surprising a complacent foe.\n\nEND\n", + /* 3*/ "|Background - \n\nFinal Test. Defeat the holographic simulated opponent.\n\n|Carrington - \n\nI have every confidence in your abilities, Joanna. Pay attention to the test, and use all of the experience you picked up throughout your training. Good luck.\n\n|Objective One: - Defeat dataDyne Guard\n\nDefeat the simulation of a dataDyne guard. The Simulant will have moderate abilities in combat but should not be underestimated.\n\nEND\n", + /* 4*/ "Defeat dataDyne guard\n", + /* 5*/ "Defeat Jonathan Dark\n", + /* 6*/ "Defeat Trent Easton\n", + /* 7*/ "THE DUEL\n", + /* 8*/ "Defeat your opponent.\n", + /* 9*/ "Well done! You were too quick for him!\n", + /* 10*/ "Well done! You were too quick for him!\n", + /* 11*/ "Well done! You were too quick for him!\n", + /* 12*/ "Opponent skill level: AGENT\n", + /* 13*/ "Opponent skill level: SPECIAL AGENT\n", + /* 14*/ "Opponent skill level: PERFECT AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_f.c b/src/files/lang/pal-final/ate_str_f.c new file mode 100644 index 000000000..532da82cf --- /dev/null +++ b/src/files/lang/pal-final/ate_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\n|Objectif 3: - Vaincre Trent Easton\n\nEliminer le simulant d'un agent expérimenté du gouvernement. Ce simulant sera exceptionnellement fort. Si vous passez ce test, vous pourrez être fière de vos prouesses.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\n|Objectif 2: - Vaincre Jonathan Dark\n\nVenez à bout de la réplique de Jonathan Dark, le meilleur élément de l'Institut en matière de test holographique. Il possède de grandes et surprenantes capacités au combat.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nTest Final. Vaincre l'ennemi holographique.\n\n|Carrington - \n\nJ'ai confiance en vos capacités, Joanna. Concentrez-vous sur le test et mettez en application les bases de votre entraînement. Bonne chance.\n\n|Objectif 1: - Vaincre le garde de dataDyne\n\nVenez à bout de la simulation d'un garde de la dataDyne. La réplique est modérément puissante mais dangereuse.\n\nFIN\n", + /* 4*/ "Vaincre le garde dataDyne\n", + /* 5*/ "Vaincre Jonathan Dark\n", + /* 6*/ "Vaincre Trent Easton\n", + /* 7*/ "LE DUEL\n", + /* 8*/ "Vaincre votre adversaire.\n", + /* 9*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 10*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 11*/ "Bien joué! Vous êtes trop rapide pour lui!\n", + /* 12*/ "Niveau adverse: AGENT\n", + /* 13*/ "Niveau adverse: AGENT SPECIAL\n", + /* 14*/ "Niveau adverse: AGENT PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_g.c b/src/files/lang/pal-final/ate_str_g.c new file mode 100644 index 000000000..7eafe8c92 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\n|3. Ziel: - Besiegen Sie Trent Easton!\n\nBesiegen Sie die Simulation eines äußerst gefährlichen Regierungsagenten. Der Simulant ist ein überdurchschnittlich erfahrener Kämpfer. Wenn Sie diesen Test bestehen, dürfen Sie zu Recht stolz auf sich sein.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\n|2. Ziel: - Besiegen Sie Jonathan Dark!\n\nBesiegen Sie die Simulation von Jonathan Dark, den aktuellen Rekordhalter des institutsinternen Testverfahrens. Der Simulant verfügt über gute Kampffähigkeiten und ist in der Lage, einen zu selbstsicheren Gegner im kritischsten Moment zu überraschen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nFinaler Test: Besiegen Sie die holografische Gegner-Simulation!\n\n|Carrington - \n\nIch habe volles Vertrauen in Ihre Fähigkeiten, Joanna. Bleiben Sie stets aufmerksam und besinnen Sie sich darauf, was Sie im Laufe Ihres Trainings gelernt haben. Viel Glück!\n\n|1. Ziel: - Besiegen Sie die dataDyne-Wache!\n\nBesiegen Sie die Simulation einer dataDyne-Wache! Der Simulant verfügt über moderate Kampffähigkeiten. Sie sollten ihn jedoch nicht unterschätzen.\n\nENDE\n", + /* 4*/ "Besiegen Sie die dataDyne-Wache!\n", + /* 5*/ "Besiegen Sie Jonathan Dark!\n", + /* 6*/ "Besiegen Sie Trent Easton!\n", + /* 7*/ "DAS DUELL\n", + /* 8*/ "Besiegen Sie Ihren Gegner!\n", + /* 9*/ "Sie waren zu schnell für ihn!\n", + /* 10*/ "Sie waren zu schnell für ihn!\n", + /* 11*/ "Sie waren zu schnell für ihn!\n", + /* 12*/ "Schwierigkeitsgrad: AGENT\n", + /* 13*/ "Schwierigkeitsgrad: SPEZIALAGENT\n", + /* 14*/ "Schwierigkeitsgrad: PERFEKTER AGENT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_i.c b/src/files/lang/pal-final/ate_str_i.c new file mode 100644 index 000000000..a8db21ab9 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\n|Obiettivo 3: - Sconfiggi Trent Easton\n\nSconfiggi la simulazione di questo esperto agente governativo. Il replicante è un avversario particolarmente duro. Se superi questa prova, puoi ritenerti soddisfatta dei risultati raggiunti!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\n|Obiettivo 2: - Sconfiggi Jonathan Dark\n\nSconfiggi la simulazione di Jonathan Dark che al momento detiene il record nel punteggio delle prove. Il replicante ha buone capacità di combattimento ed è in grado di mettere in difficoltà anche combattenti affermati.\n\nFINE\n ", + /* 3*/ "|Situazione:\n\nProva finale: sconfiggi l'avversario olografico simulato.\n\n|Carrington:\n\nHo completa fiducia nelle tue capacità, Joanna. Tieni gli occhi bene aperti durante la prova e usa tutta l'esperienza che hai accumulatodurante l'allenamento. In bocca al lupo!\n\n|Obiettivo 1: - Sconfiggi la guardia dataDyne\n\nSconfiggi la simulazione della guardia dataDyne. Il replicante dispone di mediocri capacità in lotta, ma non deve assolutamente essere sottovalutato.\n\nFINE\n ", + /* 4*/ "Sconfiggi la guardia dataDyne \n", + /* 5*/ "Sconfiggi Jonathan Dark \n", + /* 6*/ "Sconfiggi Trent Easton \n", + /* 7*/ "IL DUELLO\n", + /* 8*/ "Sconfiggi l'avversario.\n", + /* 9*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 10*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 11*/ "Ben fatto! Sei troppo veloce per lui!\n", + /* 12*/ "Livello abilità avversario: AGENTE\n", + /* 13*/ "Livello abilità avversario: AGENTE SPECIALE\n", + /* 14*/ "Livello abilità avversario: AGENTE PERFECT\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/ate_str_s.c b/src/files/lang/pal-final/ate_str_s.c new file mode 100644 index 000000000..77a8a0666 --- /dev/null +++ b/src/files/lang/pal-final/ate_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\n|Objetivo Tres: - Derrotar a Trent Easton\n\nDerrota a la simulación de un habilidoso agente del gobierno. El Simulante es un oponente especialmente capacitado; si pasas esta prueba, podrás estar orgullosa de tu logro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\n|Objetivo Dos: - Derrotar a Jonathan Dark\n\nDerrota a la simulación de Jonathan Dark, actual poseedor del récord de la prueba del Instituto. El Simulante tiene buenas habilidades de combate y es capaz de sorprender al enemigo despistado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPrueba Final. Derrota al oponente simulado holográficamente.\n\n|Carrington - \n\nTengo total confianza en tus habilidades, Joanna. Presta atención a la prueba, y usa toda la experiencia que has obtenido a través de tu entrenamiento. Buena suerte.\n\n|Objetivo Uno: - Derrotar al Guardián de dataDyne\n\nDerrota a la simulación de un guardián de dataDyne. El Simulante tendrá habilidades moderadas en combate, pero no debes subestimarlo.\n\nFIN\n", + /* 4*/ "Derrotar al guardián de dataDyne\n", + /* 5*/ "Derrotar a Jonathan Dark\n", + /* 6*/ "Derrotar a Trent Easton\n", + /* 7*/ "EL DUELO\n", + /* 8*/ "Derrota a tu oponente.\n", + /* 9*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 10*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 11*/ "¡Bien hecho! ¡Fuiste demasiado rápida para él!\n", + /* 12*/ "Nivel del oponente: AGENTE\n", + /* 13*/ "Nivel del oponente: AGENTE ESPECIAL\n", + /* 14*/ "Nivel del oponente: AGENTE PERFECTO\n", + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/aztE.c b/src/files/lang/pal-final/aztE.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-final/aztE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/aztJ.c b/src/files/lang/pal-final/aztJ.c new file mode 100644 index 000000000..fca41cd9d --- /dev/null +++ b/src/files/lang/pal-final/aztJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have to identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis' last-ditch manoeuvre, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history, and is able to maintain a check n his state of health. You will need it if you are to ensure his wellbeing.\n\n|Objective Two: - Shutdown Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Three: - Locate And Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential Medical Scanner\n", + /* 6*/ "Activate Distress Beacon\n", + /* 7*/ "Shutdown Enemy Jamming Device\n", + /* 8*/ "Retire Presidential Clone\n", + /* 9*/ "Locate And Rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... it's coming from that ship.\n", + /* 13*/ "Elvis... he'll be able to protect the president.\n", + /* 14*/ "Distress Beacon Has Been Activated.\n", + /* 15*/ "Critical Mission Object Has Been Destroyed.\n", + /* 16*/ "Obtain Presidential Scanner\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner\n", + /* 21*/ "Jamming Device Has Been Shut Down.\n", + /* 22*/ "President Has Been Killed.\n", + /* 23*/ "Presidential Clone Has Been Eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President Has Been Rescued.\n", + /* 26*/ "Obtain Night Sight\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Sight\n", + /* 29*/ "Night Sight\n", + /* 30*/ "Picked up Night Sight\n", + /* 31*/ "Take This, You Should Find It Useful!\n", + /* 32*/ "Ahhh... uuhhhh...", + /* 33*/ "Ahhh... uhh... owww...", + /* 34*/ "Agent Dark! Please report!", + /* 35*/ "Perfect Dark, come in!", + /* 36*/ "A-agent Dark reporting in...", + /* 37*/ "Agent Dark! Please reply!", + /* 38*/ "Something's jamming my transmissions... maybe it's coming from that other craft.", + /* 39*/ "I'd better find that jamming device, and check that Elvis is okay. Not forgetting the President, of course.", + /* 40*/ "How are you feeling, Mr. President?", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...", + /* 42*/ "Just one thing, sir? What is the Pelagic 2 that Trent wanted so badly?", + /* 43*/ "It's a US government Deep Sea Research Vessel, one of a kind... the only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.", + /* 46*/ "Just try it, you scandinavian freak!", + /* 47*/ "Noooooooo!!!", +}; diff --git a/src/files/lang/pal-final/aztP.c b/src/files/lang/pal-final/aztP.c new file mode 100644 index 000000000..5282016e1 --- /dev/null +++ b/src/files/lang/pal-final/aztP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Shut Down Enemy Jamming Device\n\nA sophisticated jamming device is flooding the area with impenetrable ECM cover. You might be able to pinpoint the source on the ground more effectively than our high-altitude overflights are doing. Once located, shut the source down so we can fix your position and get help.\n\n|Objective Four: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Five: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 1*/ "CRASH SITE\n", + /* 2*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Retrieve Presidential Medical Scanner\n\nThis device is constantly updating the President's medical history and is able to maintain a check on his state of health. You will need it if you are to ensure his well-being.\n\n|Objective Two: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Three: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Four: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 3*/ "|Background - \n\nFollowing Elvis's last-ditch maneuver, the three craft involved have crashed close together in the Alaskan wilderness. The whereabouts of the President are uncertain, and a cloud of ECM jamming is preventing rescuers from finding the site of the crash.\n\n|Carrington - \n\nAt this moment in time, this one-way text messaging system is the only way we can communicate with you, Joanna. If you can remove the source of the jamming, then we can get a fix on your location and send help. But locating and ensuring the safety of the President should be your most important task.\n\n|Objective One: - Activate Distress Beacon\n\nIt won't do much good until the jamming is down, but if you activate the beacon in the escape pod, it will shorten the response time of the rescue teams.\n\n|Objective Two: - Retire Presidential Clone\n\nIt would be detrimental to the security of the United States of America to have two identical people claiming to be the President, issuing orders with absolute authority. Identify the imposter and remove the threat.\n\n|Objective Three: - Locate and Rescue President\n\nThis is your highest priority. The safety of the President is paramount. You must find a way to safeguard him until help arrives or the danger is past.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Retrieve Presidential medical scanner\n", + /* 6*/ "Activate distress beacon\n", + /* 7*/ "Shut down enemy jamming device\n", + /* 8*/ "Retire Presidential clone\n", + /* 9*/ "Locate and rescue President\n", + /* 10*/ "There's the escape pod.\n", + /* 11*/ "Maybe there's a beacon in there.\n", + /* 12*/ "The jamming... It's coming from that ship.\n", + /* 13*/ "Elvis... He'll be able to protect the President.\n", + /* 14*/ "Distress beacon has been activated.\n", + /* 15*/ "Critical mission object has been destroyed.\n", + /* 16*/ "Obtain Presidential Scanner.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "A Presidential Scanner\n", + /* 20*/ "Picked up a Presidential Scanner.\n", + /* 21*/ "Jamming device has been shut down.\n", + /* 22*/ "President has been killed.\n", + /* 23*/ "Presidential clone has been eliminated.\n", + /* 24*/ "You'll never save him now!\n", + /* 25*/ "President has been rescued.\n", + /* 26*/ "Obtain Night Vision.\n", + /* 27*/ "Cassandra De Vries'\n", + /* 28*/ "Night Vision\n", + /* 29*/ "Night Vision\n", + /* 30*/ "Picked up Night Vision.\n", + /* 31*/ "Take this; you should find it useful!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "Agent Dark! Please report!\n", + /* 35*/ "Perfect Dark, come in!\n", + /* 36*/ "A-agent Dark reporting in...\n", + /* 37*/ "Agent Dark! Please reply!\n", + /* 38*/ "Something's jamming my transmissions... It's coming from that other craft.\n", + /* 39*/ "I'd better find the jamming device and check that Elvis is okay. Not forgetting the President, of course.\n", + /* 40*/ "How are you feeling, Mr. President?\n", + /* 41*/ "Better now, young lady. Today, I think, will take a while for me to get over. I can't believe Easton would do such a thing. I knew he was ambitious, yes, but this...\n", + /* 42*/ "Just one thing, sir? What is the Pelagic II that Trent wanted so badly?\n", + /* 43*/ "It's a U.S. government deep sea research vessel, one of a kind... The only ship that can conduct a full-scale diving operation at extreme depth. Trent wanted me to loan it to the dataDyne Corporation, but I refused.\n", + /* 44*/ "Trent has a lot to answer for, but I don't think we'll find him now.\n", + /* 45*/ "You have failed, Easton. You are a flawed device, and we need you no longer.\n", + /* 46*/ "Just try it, you Scandinavian freak!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_f.c b/src/files/lang/pal-final/azt_str_f.c new file mode 100644 index 000000000..cd43a5d4f --- /dev/null +++ b/src/files/lang/pal-final/azt_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Désactiver appareil brouillage\n\nUn système ennemi sophistiqué inonde le secteur d'un brouillage CME impénétrable. Vous pourrez déterminer sa position plus facilement au sol que nos appareils en altitude. Une fois trouvé, coupez le courant et nous vous fournirons de l'aide.\n\n|Objectif 4: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 5: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 1*/ "SITE du CRASH\n", + /* 2*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Récupérer scanner médical présidentiel\n\nCet appareil actualise en permanence le journal médical du Président et lui assure un état de santé stable. Trouvez-le pour garder le Président en bonne santé.\n\n|Objectif 2: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 3: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 4: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn suivant la dernière manoeuvre d'Elvis, les trois appareils impliqués se sont écrasés ensemble en Alaska. La position du Président est incertaine et un écran de brouillage CME empêche toute action de sauvetage ou de localisation du site.\n\n|Carrington - \n\nPour l'instant nous ne pouvons que vous envoyer des messages, Joanna. Si vous parvenez à éliminer la source du brouillage, nous pourrons déterminer votre position et envoyer de l'aide. Trouver et protéger le Président demeure en revanche votre priorité absolue.\n\n|Objectif 1: - Activer le signal de détresse\n\nCelui-ci ne sera efficace qu'une fois le brouillage éliminé mais s'il est activé au point d'évacuation, les équipes de sauvetage arriveront plus vite.\n\n|Objectif 2: - Eliminer le clone du Président\n\nLa sécurité des Etats Unis serait menacée si deux individus identiques ayant tout pouvoir affirmaient être le Président. Identifiez l'imposteur et éliminez la menace.\n\n|Objectif 3: - Trouver et sauver le Président\n\nCet objectif est votre priorité. La sécurité du Président est vitale. Il vous faut le protéger à tout prix avant l'arrivée de renforts ou écarter tout danger.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Récupérer scanner médical présidentiel\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Désactiver appareil brouillage\n", + /* 8*/ "Eliminer le clone du Président\n", + /* 9*/ "Trouver et sauver le Président\n", + /* 10*/ "Voilà le point d'évacuation. \n", + /* 11*/ "Le signal peut venir de là. \n", + /* 12*/ "Le brouillage... Il vient de ce vaisseau. \n", + /* 13*/ "Elvis... Il pourra protéger le Président.\n", + /* 14*/ "Signal de détresse activé.\n", + /* 15*/ "Objet crucial détruit.\n", + /* 16*/ "Obtenir le scanner présidentiel.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Scanner présidentiel\n", + /* 20*/ "Scanner présidentiel obtenu.\n", + /* 21*/ "Appareil de brouillage désactivé.\n", + /* 22*/ "Le Président a été abattu.\n", + /* 23*/ "Clone présidentiel éliminé.\n", + /* 24*/ "Vous ne pourrez pas le sauver!\n", + /* 25*/ "Président sauvé.\n", + /* 26*/ "Obtenir Vue nocturne.\n", + /* 27*/ "Cassandra De Vries: \n", + /* 28*/ "Vue nocturne\n", + /* 29*/ "Vue nocturne\n", + /* 30*/ "Vue nocturne obtenue.\n", + /* 31*/ "Prends ceci. Cela te sera utile!\n", + /* 32*/ "Ahhh... oohhhh...\n", + /* 33*/ "Ahhh... ohh... ouuuuhhh...\n", + /* 34*/ "Agent Dark! Quel est votre statut?\n", + /* 35*/ "Perfect Dark, répondez!\n", + /* 36*/ "A-agent Dark au rapport...\n", + /* 37*/ "Agent Dark! Parlez bon sang!\n", + /* 38*/ "Quelque chose brouille mes transmissions... Cela vient peut-être de l'autre appareil.\n", + /* 39*/ "Je ferais mieux de trouver la source du brouillage et m'assurer qu'Elvis est en bonne santé. Sans oublier le Président...\n", + /* 40*/ "Comment vous sentez-vous, M. le Président?\n", + /* 41*/ "Mieux. Merci mon petit. Je me souviendrai de cette journée. Comment Easton a-t-il pu faire une chose pareille? Je le savais ambitieux, mais tout ceci...\n", + /* 42*/ "Une question, monsieur. Qu'est-ce que le Pelagic II, cette chose que Trent cherchait?\n", + /* 43*/ "Un vaisseau de recherche sous-marin du gouvernement américain. Un modèle unique pouvant mener des expériences à de grandes profondeurs. Trent a formulé une demande de prêt au nom de la dataDyne Corporation. J'ai refusé.\n", + /* 44*/ "Trent devra répondre de ses actes. Encore faut-il le trouver.\n", + /* 45*/ "Vous avez échoué, Easton. Vous êtes un élément corrompu. Nous nous passerons de vous.\n", + /* 46*/ "C'est ça oui. Pétasse suédoise, va!\n", + /* 47*/ "Noooooooon!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_g.c b/src/files/lang/pal-final/azt_str_g.c new file mode 100644 index 000000000..948911bfc --- /dev/null +++ b/src/files/lang/pal-final/azt_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Deaktivieren Sie den ECM-Generator!\n\nEin High-Tech ECM-Generator sichert das Gebiet durch ein schier undurchdringliches ECM-Feld. Von Ihrem Standort aus sind Sie vermutlich eher in der Lage, die Quelle des Dämpfungs-Signals ausfindig zu machen, als unsere Luft-Aufklärer. Schalten Sie den Generator ab, sobald Sie ihn gefunden haben. Erst dann können wir Sie orten und Ihnen zu Hilfe kommen.\n\n|4. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|5. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 1*/ "ABSTURZSTELLE\n", + /* 2*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Finden Sie den medizinischen Scanner des Präsidenten!\n\nDieses Gerät zeichnet ständig die medizinischen Daten des Präsidenten auf. Mit seiner Hilfe können Sie Daten über den Gesundheitszustand des Präsidenten abrufen. Um sicherzustellen, dass er unversehrt bleibt, benötigen Sie dieses Gerät auf jeden Fall!\n\n|2. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|3. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|4. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Auswertung und Weiterführung des letzten Ausweichmanövers von Elvis hat ergeben, dass die drei Flugzeuge, die in den Unfall verwickelt waren, in der Wildnis von Alaska abgestürzt sind. Der genaue Aufenthaltsort des Präsidenten ist ungewiss, da ein starkes Dämpfungsfeld eine genauere Ortung nicht zulässt.\n\n|Carrington - \n\nMomentan ist dieses Empfangsgerät die einzige Möglichkeit, mit Ihnen zu kommunizieren, Joanna. Wenn Sie die Quelle des Dämpfungsfeldes ausschalten können, dann sind wir in der Lage, Ihren Standort genau zu lokalisieren. Aber oberste Priorität genießt die Sicherheit des Präsidenten. Ihn zu finden, ist Ihre wichtigste Aufgabe!\n\n|1. Ziel: - Aktivieren Sie das Notsignal!\n\nUm zu gewährleisten, dass das Rettungsteam rascher vor Ort eintrifft, sollten Sie das Notsignal in der Fluchtkapsel aktivieren. Solange das Dämpfungsfeld aktiv ist, verschafft Ihnen diese Aktion allerdings nur bedingten Spielraum.\n\n|2. Ziel: - Eliminieren Sie den Präsidenten-Klon!\n\nDie Sicherheit der Vereinigten Staaten wäre nicht mehr gewährleistet, wenn es plötzlich zwei Personen geben würde, die von sich behaupten, der Präsident zu sein. Identifizieren Sie den Betrüger und beseitigen Sie diese potentielle Bedrohung!\n\n|3. Ziel: - Orten und retten Sie den Präsidenten!\n\nDer Sicherheit des Präsidenten kommt die allerhöchste Priorität zu. Sie müssen UNBEDINGT für seine Sicherheit sorgen, bis Hilfe eintrifft!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden Sie den medizinischen Scanner!\n", + /* 6*/ "Aktivieren Sie das Notsignal!\n", + /* 7*/ "Deaktivieren Sie den Generator!\n", + /* 8*/ "Eliminieren Sie den Präsidenten-Klon!\n", + /* 9*/ "Orten und retten Sie den Präsidenten!\n", + /* 10*/ "Ich habe die Rettungskapsel gefunden.\n", + /* 11*/ "Vielleicht kann ich dort das Notsignal aktivieren.\n", + /* 12*/ "Das Dämpfungsfeld... Es wird von diesem Schiff aus generiert.\n", + /* 13*/ "Elvis... Er ist sicher in der Lage, den Präsidenten zu beschützen.\n", + /* 14*/ "Notsignal wurde aktiviert.\n", + /* 15*/ "Wichtiges Objekt zerstört\n", + /* 16*/ "Finden Sie den medizinischen Scanner!\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Ein medizinischer Scanner\n", + /* 20*/ "Medizinischer Scanner aufgenommen\n", + /* 21*/ "ECM-Generator deaktiviert\n", + /* 22*/ ".\n", + /* 23*/ "Präsidenten-Klon wurde eliminiert.\n", + /* 24*/ "Du kannst ihn nicht retten!\n", + /* 25*/ "Der Präsident wurde gerettet.\n", + /* 26*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 27*/ "Cassandra De Vries\n", + /* 28*/ "Nachtsichtgerät\n", + /* 29*/ "Nachtsichtgerät\n", + /* 30*/ "Nachtsichtgerät aufgenommen\n", + /* 31*/ "Nimm das; es wird sich als nützlich erweisen!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... ouuu...\n", + /* 34*/ "Agent Dark! Bitte melden Sie sich!\n", + /* 35*/ "Perfect Dark, kommen!\n", + /* 36*/ "A-Agent Dark hier...\n", + /* 37*/ "Agent Dark! Bitte antworten Sie!\n", + /* 38*/ "Diese Frequenz wird gestört... Das Signal kommt von dort drüben.\n", + /* 39*/ "Ich muss diesen Generator finden und sicherstellen, dass es Elvis gut geht. ...und nebenbei soll ich noch den Präsidenten retten.\n", + /* 40*/ "Wie fühlen Sie sich, Mr. President?\n", + /* 41*/ "Gerade eben ein wenig besser. Aber ich werde wohl einige Zeit brauchen, um den heutigen Tag zu vergessen. Ich kann nicht glauben, dass Easton in der Lage ist, so etwas zu tun. Ich wusste, dass er ehrgeizig ist, aber dass er zu so etwas in der Lage ist...\n", + /* 42*/ "Eine Frage, Sir. Worum handelt es sich bei der Pelagic II? Trent schien dahinter her gewesen zu sein.\n", + /* 43*/ "Die Pelagic II ist ein Forschungs-U-Boot der US-Regierung. Dieses Schiff ist ein Prototyp, der in der Lage ist, in extreme Tiefen vorzudringen. Trent wollte, dass ich es als Leihgabe an datyDyne vergebe. Aber ich habe diesem Antrag nicht zugestimmt.\n", + /* 44*/ "Trent ist uns wohl mehr als nur eine Antwort schuldig, aber ich glaube nicht, dass wir ihn jetzt finden.\n", + /* 45*/ "Sie haben versagt, Easton. Sie stellen eine potentielle Fehlerquelle dar, daher sind Sie nicht länger von Nutzen.\n", + /* 46*/ "Versuch's nur, du skandinavischer Freak!\n", + /* 47*/ "Neiiiiiiiin!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_i.c b/src/files/lang/pal-final/azt_str_i.c new file mode 100644 index 000000000..d09b617ee --- /dev/null +++ b/src/files/lang/pal-final/azt_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Disattiva dispositivo di disturbo nemico\n\nUn sofisticato dispositivo per la generazione di segnali di disturbo rende l'area impenetrabile per mezzo di una fitta rete di onde ECM. Sorvolando la zona ad alta quota non riusciamo ad identificare la fonte, ma dalla tua posizione a terra dovrebbe essere più facile localizzarla e disattivarla. Fatto ciò potremo accertare le tue coordinate e mandarti dei rinforzi. \n\n|Obiettivo 4 - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 5: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 1*/ "LUOGO DEL DISASTRO\n", + /* 2*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Recupera scanner medico del Presidente\n\nQuesto dispositivo aggiorna continuamente l'anamnesi del Presidente ed è in grado di monitorare costantemente il suo stato di salute. Per garantirgli buone condizioni di salute dovrai trovare lo scanner.\n\n|Obiettivo 2: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 3: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 4: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIn seguito al tentativo disperato di Elvis i tre velivoli coinvolti nell'incidente si sono schiantati nella foresta dell'Alaska vicini l'uno all'altro. La posizione del Presidente è ancora sconosciuta; inoltre un forte campo di onde di disturbo ECM sta complicando la vita ai soccorritori che non riescono a localizzare il luogo del disastro.\n\n|Carrington:\n\nIn questo momento, l'unico nostro canale di comunicazione con te, Joanna, è costituito da questo sistema di invio messaggi a senso unico. Se riesci ad eliminare la fonte del disturbo, potremmo identificare la tua posizione e mandarti dei rinforzi. Tuttavia il tuo primo obiettivo è quello di scoprire la posizione del Presidente e garantirne la sicurezza.\n\n|Obiettivo 1: - Attiva il segnale di pericolo\n\nPer ridurre il tempo di reazione delle squadre di salvataggio attiva il segnale di pericolo nella capsula di salvataggio. Sappi tuttavia che non sarà molto efficace finché non avrai eliminato il campo di onde di disturbo.\n\n|Obiettivo 2: - Trova ed elimina il clone del Presidente\n\nSarebbe disastroso per l'incolumità degli Stati Uniti d'America scoprire di avere due persone identiche che affermano di essere il Presidente e che impartiscono ordini con autorità assoluta. Identifica l'impostore ed elimina tale minaccia.\n\n|Obiettivo 3: - Trova e salva il Presidente\n\nQuesta è la tua priorità assoluta. La sicurezza del Presidente è della massima importanza. Devi trovare il modo di assicurarne l'incolumità fino all'arrivo dei rinforzi e comunque fintanto che sussiste il pericolo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Recupera scanner medico del Presidente\n", + /* 6*/ "Attiva il segnale di pericolo\n", + /* 7*/ "Disattiva il dispositivo di disturbo\n", + /* 8*/ "Trova ed elimina il clone del Presidente\n", + /* 9*/ "Trova e salva il Presidente\n", + /* 10*/ "Ecco la capsula di salvataggio!\n", + /* 11*/ "Forse si può mandare un segnale da lì!\n", + /* 12*/ "Queste onde... Vengono da quella navicella!\n", + /* 13*/ "Elvis... Può proteggere lui il Presidente.\n", + /* 14*/ "Inviato segnale di pericolo.\n", + /* 15*/ "Distrutto strumento essenziale alla missione.\n", + /* 16*/ "Procurati scanner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Scanner del Presidente!\n", + /* 20*/ "Preso scanner del Presidente.\n", + /* 21*/ "Disattivato dispositivo per onde di disturbo.\n", + /* 22*/ "Il Presidente è stato ucciso.\n", + /* 23*/ "Il clone del Presidente è stato eliminato.\n", + /* 24*/ "Non riuscirai mai a salvarlo!\n", + /* 25*/ "Il Presidente è stato salvato.\n", + /* 26*/ "Procurati Vista Notturna!\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "Vista Notturna\n", + /* 29*/ "Vista Notturna\n", + /* 30*/ "Presa Vista Notturna.\n", + /* 31*/ "Ecco, tieni: ti sarà utile!\n", + /* 32*/ "Aaah... uuuh...\n", + /* 33*/ "Aaah... uuuh... oooh...\n", + /* 34*/ "Agente Dark! A rapporto!\n", + /* 35*/ "Perfect Dark, rispondi!\n", + /* 36*/ "Agente Dark a rapporto, signore!\n", + /* 37*/ "Agente Dark! Rispondi!\n", + /* 38*/ "C'è qualcosa che disturba la comunicazione... Magari proviene da quella navicella!\n", + /* 39*/ "Meglio trovare subito il dispositivo di disturbo e controllare che Elvis stia bene. Non devo scordarmi del Presidente!!!\n", + /* 40*/ "Come sta, Sig. Presidente?\n", + /* 41*/ "Molto meglio, grazie. Penso che mi ci vorrà un po' per superare questo colpo. Non posso credere che Easton abbia potuto fare una cosa simile. Sapevo sì che era ambizioso, ma fino a questo punto...\n", + /* 42*/ "Solo una cosa, signore? Cos'è il Pelagic II che Trent voleva ad ogni costo?\n", + /* 43*/ "È un sottomarino di ricerca del governo statunitense, tipo... l'unico sommergibile che possa condurre una completa operazione di immersione nelle profondità oceaniche. Trent voleva che lo prestassi alla dataDyne Corporation, ma io ho rifiutato.\n", + /* 44*/ "Trent deve render conto di molte cose, ma non penso che lo troveremo tanto presto!\n", + /* 45*/ "Hai fallito, Easton! Ormai sei totalmente inutile! Non ci servi più!\n", + /* 46*/ "Provaci, pazzo scandinavo!\n", + /* 47*/ "Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/azt_str_s.c b/src/files/lang/pal-final/azt_str_s.c new file mode 100644 index 000000000..4ae153923 --- /dev/null +++ b/src/files/lang/pal-final/azt_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Desconectar Dispositivo de Bloqueo Enemigo\n\nUn sofisticado dispositivo de bloqueo está inundando el área con una cobertura de impenetrable ECM. Tienes que ser capaz de rastrear la fuente de tierra más efectivamente de lo que nuestros aviones espía están haciendo. Una vez localizada, apaga la fuente para que podamos fijar tu posición y enviemos ayuda.\n\n|Objetivo Cuatro: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cinco: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 1*/ "LUGAR DEL IMPACTO\n", + /* 2*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Recuperar Escáner Médico del Presidente\n\nEste dispositivo está actualizando constantemente el historial médico del Presidente y es capaz de chequear su estado de salud. Lo necesitarás para asegurarte de que está en buenas condiciones.\n\n|Objetivo Dos: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Tres: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Cuatro: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSiguiendo la última maniobra de Elvis, las tres naves involucradas han chocado entre sí en pleno ecosistema de Alaska. Se desconoce el paradero del Presidente, y una nube de bloqueo ECM evita que el equipo de rescate encuentre el lugar del accidente.\n\n|Carrington - \n\nEn este preciso instante, este sistema de mensajes de texto unidireccional es el único modo con que podemos comunicarnos, Joanna. Si puedes eliminar la fuente del bloqueo, entonces podremos fijar tu posición para enviar ayuda. Pero localizar y asegurar la integridad del Presidente debe ser tu tarea más importante.\n\n|Objetivo Uno: - Activar la Señal de Socorro\n\nNo hará nada hasta que caiga el bloqueo, pero si activas la Señal de Socorro en la cápsula de escape, acortará el tiempo de respuesta de los equipos de rescate.\n\n|Objetivo Dos: - Eliminar al Clon del Presidente\n\nSerá perjudicial para la seguridad de los Estados Unidos de América tener dos personas idénticas clamando ser el Presidente, dando órdenes con absoluta autoridad. Identifica al impostor y elimina la amenaza.\n\n|Objetivo Tres: - Localizar y Rescatar al Presidente\n\nÉsta es tu mayor prioridad. La seguridad del Presidente es de suma importancia. Debes encontrar la manera de protegerle hasta que llegue la ayuda o el peligro haya pasado.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Recuperar escáner médico del Presidente\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "Apagar la señal de bloqueo enemiga\n", + /* 8*/ "Eliminar al clon del Presidente\n", + /* 9*/ "Localizar y rescatar al Presidente\n", + /* 10*/ "Ahí está la cápsula de escape.\n", + /* 11*/ "Quizá haya un emisor dentro.\n", + /* 12*/ "El bloqueo... Proviene de esa nave.\n", + /* 13*/ "Elvis... Él será capaz de proteger al Presidente.\n", + /* 14*/ "Señal de socorro activada.\n", + /* 15*/ "Objeto crítico de la misión destruido.\n", + /* 16*/ "Obtén el Escáner del Presidente.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Un Escáner Presidencial\n", + /* 20*/ "Escáner Presidencial obtenido.\n", + /* 21*/ "Dispositivo de bloqueo apagado.\n", + /* 22*/ "El Presidente ha muerto.\n", + /* 23*/ "El clon del Presidente ha sido eliminado.\n", + /* 24*/ "¡Ahora ya no podrás salvarle!\n", + /* 25*/ "El Presidente ha sido rescatado.\n", + /* 26*/ "Obtén Visión Nocturna.\n", + /* 27*/ "Cassandra De Vries:\n", + /* 28*/ "V. Nocturna\n", + /* 29*/ "Visión Nocturna\n", + /* 30*/ "Visón Nocturna obtenida.\n", + /* 31*/ "Toma esto, ¡lo encontrarás muy útil!\n", + /* 32*/ "Ahhh... uuhhhh...\n", + /* 33*/ "Ahhh... uhh... owww...\n", + /* 34*/ "¡Agente Dark! ¡Informe, por favor!\n", + /* 35*/ "¡Perfect Dark, responda!\n", + /* 36*/ "A-agente Dark informando...\n", + /* 37*/ "¡Agente Dark! ¡Por favor, responda!\n", + /* 38*/ "Algo está bloqueando mis transmisiones... Proviene de esa otra nave.\n", + /* 39*/ "Mejor encontrar el dispositivo de bloqueo y comprobar si Elvis está bien. No olvidando al Presidente, por supuesto.\n", + /* 40*/ "¿Cómo se siente, Sr. Presidente?\n", + /* 41*/ "Ahora mejor, jovencita. Pero creo que me va a llevar un rato recuperarme. No puedo creer que Easton hiciera algo así. Sabía que era ambicioso, sí, pero esto...\n", + /* 42*/ "Sólo una cosa, señor. ¿Qué es el Pelagic II que tanto ansiaba Trent?\n", + /* 43*/ "Es un navío de investigación de profundidad del gobierno norteamericano, único en su clase... El único barco capaz de dirigir una operación a gran escala a profundidad extrema. Trent quería que se lo prestara a la Corporación dataDyne, pero rehusé.\n", + /* 44*/ "Trent tiene bastante que contestar, pero no creo que le encontremos ahora.\n", + /* 45*/ "Has fallado, Easton. Eres un dispositivo defectuoso, y ya no te necesitamos.\n", + /* 46*/ "¡Inténtalo, mamarracho escandinavo!\n", + /* 47*/ "¡¡¡Noooooooo!!!\n", +}; diff --git a/src/files/lang/pal-final/catE.c b/src/files/lang/pal-final/catE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/catJ.c b/src/files/lang/pal-final/catJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/catP.c b/src/files/lang/pal-final/catP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/catP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_f.c b/src/files/lang/pal-final/cat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_g.c b/src/files/lang/pal-final/cat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_i.c b/src/files/lang/pal-final/cat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cat_str_s.c b/src/files/lang/pal-final/cat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/caveE.c b/src/files/lang/pal-final/caveE.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-final/caveE.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-final/caveJ.c b/src/files/lang/pal-final/caveJ.c new file mode 100644 index 000000000..99a875c98 --- /dev/null +++ b/src/files/lang/pal-final/caveJ.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Item From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL\nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later when you are aboard Air Force One. First, though, you need to find a case to put the equipment inside.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the Airbase in Alaska, preparing for the President's foreign visit. from the evidence gathered in Chicago we assume that this is the start of his move against the President, and as such it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the Airbase. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise And Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the airbase. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the Security screening system will need a different approach. If it detects the weapon in your equipment then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain Disguise And Enter Base\n", + /* 6*/ "Check In Equipment\n", + /* 7*/ "Subvert Security Monitoring System\n", + /* 8*/ "Obtain Item From Safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain safe item\n", + /* 21*/ "\n", + /* 22*/ "Safe Item\n", + /* 23*/ "Safe Item\n", + /* 24*/ "Picked up a safe item\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent Civilians Have Been Killed\n", + /* 27*/ "Is he Ok?\n", + /* 28*/ "I'll go and get some help\n", + /* 29*/ "Good afternoon\n", + /* 30*/ "Ok, You know the way from here\n", + /* 31*/ "Please holster your weapon, miss\n", + /* 32*/ "Oh my god!\n", + /* 33*/ "Weapons are not allowed in the base\n", + /* 34*/ "Right, I'm calling security\n", + /* 35*/ "System Shutdown Initiated...\n", + /* 36*/ "Security Systems Have Been Shut Down\n", + /* 37*/ "Weapons Have Been Detected\n", + /* 38*/ "Suitcase has been deposited\n", + /* 39*/ "Suitcase has been scanned\n", + /* 40*/ "Hey you - this is a restricted area\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case\n", + /* 43*/ "You get security, I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder\n", + /* 45*/ "Lasergrid access denied\n", + /* 46*/ "Laser grid system has been overloaded\n", + /* 47*/ "Too many neutral casualties inflicted\n", + /* 48*/ "Stop them from getting the safe....\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess' \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The bag will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller\nthan I thought.\n", + /* 54*/ "Stop them, they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.", + /* 56*/ "Excellent, Joanna. That cable car is your way in; our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by airbase troops. I don't have to remind you that...", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.", + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, +}; diff --git a/src/files/lang/pal-final/caveP.c b/src/files/lang/pal-final/caveP.c new file mode 100644 index 000000000..3425c36c3 --- /dev/null +++ b/src/files/lang/pal-final/caveP.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a Hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Obtain Flight Plans From Safe\n\nThe planned flight path for Air Force One is held in a safe in the base. If you get hold of it, then we can use the data to vector Elvis in on Air Force One during the flight as backup for you in case anything goes wrong.\n\n|Objective Five: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 1*/ "PRESIDENTIAL TERMINAL \nUS AIRBASE, ALASKA\n", + /* 2*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Check In Equipment\n\nGet rid of your equipment as soon as possible; avoid carrying suspicious items around with you that could compromise your disguise. You can collect it later after loading it aboard Air Force One using a hover trolley. First, though, you need to find a case to put the equipment in.\n\n|Objective Three: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment,then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Four: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton has flown to meet the President at the air base in Alaska, preparing for the President's foreign visit. From the evidence gathered in Chicago, we assume that this is the start of his move against the President, and as such, it must be prevented. \n\n|Carrington - \n\nCare is needed here, Joanna. There are many innocent people about in the air base. Only Trent's men or those strange Blonde men are viable targets. Remember, the longer that you stay in the disguise, the greater your chance of success.\n\n|Objective One: - Obtain Disguise and Enter Base\n\nThe stewardess arriving on the cable car is carrying her uniform in her bag. Subdue her and her escort and use the uniform as a disguise to enter the air base. Remember, these people know nothing of Trent's conspiracy and must not be killed.\n\n|Objective Two: - Subvert Security Monitoring System\n\nYou can fool humans with the disguise, but the security screening system will need a different approach. If it detects the weapon in your equipment, then the alarm will sound and the base will be locked down. Prevent the alarm from being given by whatever means you can.\n\n|Objective Three: - Board Air Force One\n\nDon't let the plane leave without you. If your diguise is still active, then you should be able to use the docking shuttle to get on board. If not, you will have to find another way. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Obtain disguise and enter base\n", + /* 6*/ "Check in equipment\n", + /* 7*/ "Subvert security monitoring system\n", + /* 8*/ "Obtain flight plans from safe\n", + /* 9*/ "Board Air Force One\n", + /* 10*/ "Obtain suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain air stewardess uniform.\n", + /* 16*/ "\n", + /* 17*/ "Disguise\n", + /* 18*/ "Disguise\n", + /* 19*/ "Picked up a stewardess uniform.\n", + /* 20*/ "Obtain flight plans from safe.\n", + /* 21*/ "\n", + /* 22*/ "Flight Plans\n", + /* 23*/ "Flight Plans\n", + /* 24*/ "Picked up the flight plans.\n", + /* 25*/ "Look out - it's an intruder...\n", + /* 26*/ "Innocent civilians have been killed.\n", + /* 27*/ "Is he OK?\n", + /* 28*/ "I'll go and get some help.\n", + /* 29*/ "Good afternoon.\n", + /* 30*/ "OK, you know the way from here.\n", + /* 31*/ "You'll have to check that weapon in here.\n", + /* 32*/ "Oh, my God!\n", + /* 33*/ "Weapons are not allowed in the base.\n", + /* 34*/ "Right, I'm calling security.\n", + /* 35*/ "System shutdown initiated...\n", + /* 36*/ "Security systems have been shut down.\n", + /* 37*/ "Weapons have been detected.\n", + /* 38*/ "Suitcase has been deposited.\n", + /* 39*/ "Suitcase has been scanned.\n", + /* 40*/ "Hey, you - this is a restricted area.\n", + /* 41*/ "Are you new around here?\n", + /* 42*/ "Hey - give me back my case.\n", + /* 43*/ "You get security - I'll deal with her...\n", + /* 44*/ "Upstairs...there's an intruder.\n", + /* 45*/ "Laser grid access denied.\n", + /* 46*/ "Laser grid system has been overloaded.\n", + /* 47*/ "Too many neutral casualties inflicted.\n", + /* 48*/ "Stop them from getting the safe...\n", + /* 49*/ "Disguise worn.\n", + /* 50*/ "Now's your chance! Grab the stewardess's \nbag and get her uniform.\n", + /* 51*/ "Use that case to conceal your equipment.\n", + /* 52*/ "The case will get stopped unless you do something.\n", + /* 53*/ "So that's Air Force One? ... Huh, smaller \nthan I thought.\n", + /* 54*/ "Stop them - they're breaking into the safe...\n", + /* 55*/ "Agent Dark in position. I can see the main entrance to the base, and I can just make out the cable car arrival point.\n", + /* 56*/ "Excellent, Joanna. That cable car is your way in... Our observer at the lower terminus has spotted a member of the flight crew boarding a minute ago. She is being escorted by air base troops. I don't have to remind you that...\n", + /* 57*/ "That they're probably innocent of any involvement in Trent's little scheme. And I can't shoot them even if they shoot at me. What about the NSA Agents?\n", + /* 58*/ "I don't know how far the conspiracy has spread through the NSA, but I'm willing to bet that the men Trent has around him here are loyal to him and his plan. You have to get the evidence of Trent's betrayal onto Air Force One and show it to the President.\n", + /* 59*/ "Yes, and protect him from his abductors. Do you have any idea what Trent's plan might be yet, and what about those blonde guys?\n", + /* 60*/ "Only vague suspicions, and I won't distract you with those. Good luck. Carrington out.\n", + /* 61*/ "Lift inoperative - security system is active.\n", + /* 62*/ "Critical mission personnel disabled.\n", + /* 63*/ "Critical mission object destroyed.\n", + /* 64*/ "Entrance to base secured.\n", + /* 65*/ "We're taking over!!\n", + /* 66*/ "Hover trolley has been shut down.\n", + /* 67*/ "Equipment cannot be checked in.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_f.c b/src/files/lang/pal-final/cave_str_f.c new file mode 100644 index 000000000..f1707e59d --- /dev/null +++ b/src/files/lang/pal-final/cave_str_f.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Obtenir le plan de vol\n\nLe plan de vol de l'Air Force One est gardé dans un coffre de la base. Dérobez-le et nous pourrons orienter Elvis vers l'Air Force One pendant le vol. Vous aurez ainsi du renfort si la situation devient critique.\n\n|Objectif 5: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENTIEL\nBASE AERIENNE US, ALASKA\n", + /* 2*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Ranger l'équipement\n\nDébarrassez-vous de votre équipement le plus tôt possible et évitez de transporter des objets compromettants. Vous pourrez récupérer votre paquetage une fois à bord de l'Air Force One en utilisant un chariot. Il vous faut d'abord trouver une caisse pour y ranger votre inventaire.\n\n|Objectif 3: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme se déclenchera et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 4: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nTrent Easton est parti rencontrer le Président sur la base aérienne en Alaska afin de préparer la visite présidentielle à l'étranger. D'après les preuves trouvées à Chicago, nous en concluons qu'il s'agit de la première étape dans son action contre le Président. Elle doit être contrecarrée. \n\n|Carrington - \n\nPrudence est le maître mot de cette mission, Joanna. De nombreuses personnes innocentes peuplent la base aérienne. Seuls les hommes de Trent et les étranges hommes blonds seront vos cibles. Souvenez-vous: plus vous conserverez votre couverture, plus grandes seront vos chances de réussir.\n\n|Objectif 1: - Voler uniforme et entrer dans la base\n\nL'hôtesse arrivant par téléphérique porte son uniforme dans un sac. Occupez-vous d'elle en douceur et revêtez son uniforme pour pénétrer dans la base. Souvenez-vous: ces gens ne font pas partie de la conspiration de Trent et ne doivent pas être éliminés.\n\n|Objectif 2: - Leurrer le système de détection\n\nVotre couverture trompera le personnel présent mais le système de détection demande une approche différente. S'il décèle une arme dans votre équipement, l'alarme sera donnée et la base sera scellée. Contrez l'activation de l'alarme par un moyen de votre choix.\n\n|Objectif 3: - Monter à bord de l'Air Force One\n\nNe laissez pas l'avion partir sans vous. Si vous portez encore votre uniforme, utilisez la navette d'embarquement. Dans le cas contraire, à vous de choisir la meilleure option. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Voler uniforme et entrer dans la base\n", + /* 6*/ "Ranger l'équipement\n", + /* 7*/ "Leurrer le système de détection\n", + /* 8*/ "Obtenir le plan de vol\n", + /* 9*/ "Monter à bord de l'Air Force One\n", + /* 10*/ "Obtenir valise.\n", + /* 11*/ "\n", + /* 12*/ "Valise\n", + /* 13*/ "Valise\n", + /* 14*/ "Valise obtenue.\n", + /* 15*/ "Obtenir uniforme d'hôtesse.\n", + /* 16*/ "\n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme\n", + /* 19*/ "Uniforme d'hôtesse obtenu.\n", + /* 20*/ "Obtenir plans de vol.\n", + /* 21*/ "\n", + /* 22*/ "Plans de vol\n", + /* 23*/ "Plans de vol\n", + /* 24*/ "Plans de vol obtenus.\n", + /* 25*/ "Attention - un intrus...\n", + /* 26*/ "Civils innocents abattus.\n", + /* 27*/ "Va-t-il bien?\n", + /* 28*/ "Je vais chercher de l'aide.\n", + /* 29*/ "Bonjour. \n", + /* 30*/ "Vous connaissez le chemin.\n", + /* 31*/ "Rangez votre arme, je vous prie. \n", + /* 32*/ "...??? Oh, mon Dieu! \n", + /* 33*/ "Les armes sont interdites dans la base. \n", + /* 34*/ "J'appelle la sécurité.\n", + /* 35*/ "Coupure système initialisée... \n", + /* 36*/ "Systèmes sécurité coupés. \n", + /* 37*/ "Armement détecté.\n", + /* 38*/ "Valise déposée.\n", + /* 39*/ "Valise scannée.\n", + /* 40*/ "Vous, là! Cette zone est interdite. \n", + /* 41*/ "Vous êtes nouvelle ou quoi?\n", + /* 42*/ "Hé! Ma valise! \n", + /* 43*/ "Appelle la sécurité... Je m'occupe d'elle.\n", + /* 44*/ "En haut...il y a un intrus.\n", + /* 45*/ "Accès grilles laser refusé.\n", + /* 46*/ "Système grilles laser: surcharge.\n", + /* 47*/ "Trop de cibles neutres abattues.\n", + /* 48*/ "Empêchez-les d'avoir le coffre...\n", + /* 49*/ "Costume revêtu.\n", + /* 50*/ "Vite! Attrapez le sac de l'hôtesse \net prenez son uniforme.\n", + /* 51*/ "Utilisez cette caisse pour cacher votre équipement. \n", + /* 52*/ "Cette caisse se fera arrêter si vous n'intervenez pas. \n", + /* 53*/ "C'est ça Air Force One, hein? ... C'est assez \npetit en fait.\n", + /* 54*/ "Arrêtez-les - ils ouvrent le coffre...\n", + /* 55*/ "Agent Dark en position. Je vois l'entrée principale de la base. J'aperçois aussi le point d'arrivée du téléphérique.\n", + /* 56*/ "Excellent, Joanna. Ce téléphérique est votre billet d'entrée. Notre contact a repéré une hôtesse montant à bord il y a une minute. Elle est escortée par des troupes de la base. Je n'ai pas besoin de vous rappeler qu...\n", + /* 57*/ "...qu'ils ne font pas partie de l'opération de Trent et que je ne dois pas les abattre même sous leur feu. Et les agents de la NSA?\n", + /* 58*/ "Je ne connais pas les implications de la NSA dans cette affaire. Je suis néanmoins persuadé que les hommes de Trent lui sont tous loyaux. A vous de trouver les preuves de la trahison de Trent une fois à bord et présentez-les au Président.\n", + /* 59*/ "Et le protéger de ses ravisseurs. Avez-vous une théorie sur les plans de Trent et sur ce type blond?\n", + /* 60*/ "Que de vagues soupçons. Concentrez-vous plutôt sur la mission. Bonne chance. Carrington, terminé.\n", + /* 61*/ "Ascenseur inactif - système sécurité actif.\n", + /* 62*/ "Personnel crucial inutilisable.\n", + /* 63*/ "Objet crucial détruit.\n", + /* 64*/ "Entrée de la base sécurisée.\n", + /* 65*/ "On s'en charge!!\n", + /* 66*/ "Chariot coupé.\n", + /* 67*/ "Equipement ne peut être enregistré.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_g.c b/src/files/lang/pal-final/cave_str_g.c new file mode 100644 index 000000000..e141b3fcf --- /dev/null +++ b/src/files/lang/pal-final/cave_str_g.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Entwenden Sie die Flugpläne aus dem Safe!\n\nDie Route, welche für die Air Force One geplant ist, wird in einem Safe auf der Basis aufbewahrt. Bringen Sie die Pläne in Ihren Besitz! Durch diese Daten werden wir in der Lage sein, auch Elvis auf Ihre Route zu bringen. Im Falle einer Kalamität dient er als Ihre Verstärkung.\n\n|5. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 1*/ "PRÄSIDENTEN TERMINAL \nUS AIRBASIS, ALASKA\n", + /* 2*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Checken Sie Ihre Ausrüstung ein!\n\nSie müssen Ihre Ausrüstung so schnell wie möglich loswerden. Vermeiden Sie es, verdächtig wirkende Gegenstände mit sich herumzutragen. Sie können wieder auf Ihre Ausrüstung zugreifen, nachdem Sie sie mit einem Hover-Trolley an Bord gebracht haben. Zuerst müssen Sie natürlich einen Koffer finden, um die Ausrüstung zu verstauen.\n\n|3. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|4. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Easton ist nach Alaska gereist, um den Präsidenten auf einem Stützpunkt zu treffen. Aufgrund der in Chicago gesammelten Beweise gehen wir davon aus, dass er nun seinen ersten Schachzug macht, um gegen die Person des Präsidenten vorzugehen. Dies muss auf jeden Fall verhindert werden! \n\n|Carrington - \n\nIn diesem Fall müssen Sie mit allerhöchster Sorgfalt vorgehen! Am Stützpunkt befinden sich viele unbeteiligte Personen. Nur Trents Leute und diese eigenartigen blonden Männer sind legitime Ziele. Vergessen Sie nicht: Je länger Sie Ihre Tarnung aufrecht erhalten, desto größer sind Ihre Erfolgschancen.\n\n|1. Ziel: - Erlangen Sie die Tarnung und betreten Sie die Basis!\n\nEine der Stewardessen kommt mit der Bahn. Sie trägt ihre Uniform in Ihrer Tasche. Überwältigen Sie sie und ihre Begleitung, und verwenden Sie die Uniform als Verkleidung, um den Stützpunkt unerkannt betreten zu können. Bedenken Sie, dass diese Leute nichts mit Trents Absichten zu tun haben. Daher dürfen sie nicht zu Schaden kommen.\n\n|2. Ziel: - Unterminieren Sie das Überwachungssystem!\n\nMit Ihrer Verkleidung können Sie zwar das menschliche Auge täuschen, das elektronische Wachsystem erfordert aber eine andere Vorgehensweise. Sobald es die Waffe in Ihrem Gepäck erfasst, wird sofort der Alarm ausgelöst. Dies hat zur Folge, dass die Basis hermetisch abgeriegelt wird. Sorgen Sie dafür, dass der Alarm unter keinen Umständen ausgelöst wird!\n\n|3. Ziel: - Gehen Sie an Bord der Air Force One!\n\nSie müssen unter allen Umständen an Bord des Flugzeugs gelangen. Sollte Ihre Tarnung noch bestehen, sollten Sie problemlos Zutritt zum Shuttle bekommen. Andernfalls müssen Sie einen anderen Weg finden, um an Bord zu gelangen.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Erlangen Sie die Tarnung!\n", + /* 6*/ "Checken Sie Ihre Ausrüstung ein!\n", + /* 7*/ "Unterminieren Sie die Überwachung!\n", + /* 8*/ "Entwenden Sie die Flugpläne!\n", + /* 9*/ "Gehen Sie an Bord der Air Force One!\n", + /* 10*/ "Erlangen Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer aufgenommen\n", + /* 15*/ "Erlangen Sie die Uniform!\n", + /* 16*/ "\n", + /* 17*/ "Verkleidung\n", + /* 18*/ "Verkleidung\n", + /* 19*/ "Uniform aufgenommen\n", + /* 20*/ "Entwenden Sie die Flugpläne aus dem Safe!\n", + /* 21*/ "\n", + /* 22*/ "Flugpläne\n", + /* 23*/ "Flugpläne\n", + /* 24*/ "Flugpläne aufgenommen\n", + /* 25*/ "Vorsicht - Ein Eindringling...\n", + /* 26*/ "Es sind unschuldige Zivilisten zu Schaden gekommen.\n", + /* 27*/ "Ist er OK?\n", + /* 28*/ "Ich gehe und hole Hilfe.\n", + /* 29*/ "Schönen guten Tag.\n", + /* 30*/ "OK, von hier aus kennen Sie ja den Weg.\n", + /* 31*/ "Sie müssen Ihre Waffe hier einchecken, Miss.\n", + /* 32*/ "Oh nein!\n", + /* 33*/ "Das Tragen von Waffen ist in diesem Areal nicht erlaubt.\n", + /* 34*/ "Ich alarmiere die Security.\n", + /* 35*/ "System wird heruntergefahren...\n", + /* 36*/ "Überwachungssystem wurde deaktiviert.\n", + /* 37*/ "WAFFEN WURDEN ENTDECKT!!!\n", + /* 38*/ "Der Koffer wurde deponiert.\n", + /* 39*/ "Der Koffer wurde gescannt.\n", + /* 40*/ "Hey, Sie - Sie befinden sich in einer Sperrzone.\n", + /* 41*/ "Sind Sie neu hier?\n", + /* 42*/ "Hey - geben Sie mir meinen Koffer zurück!\n", + /* 43*/ "Du holst die Security - Ich kümmere mich um sie...\n", + /* 44*/ "Wache... Es befindet sich ein Eindringling in der Basis!\n", + /* 45*/ "Zugriff auf die Lasermatrix verweigert\n", + /* 46*/ "Lasermatrix-System wurde überladen!!!\n", + /* 47*/ "Es sind zu viele unschuldige Opfer zu beklagen.\n", + /* 48*/ "Haltet sie vom Safe fern...\n", + /* 49*/ "Verkleidung wurde angelegt.\n", + /* 50*/ "Das ist Ihre Chance! Schnappen Sie sich \ndie Tasche der Stewardess! \n", + /* 51*/ "Verbergen Sie Ihre Ausrüstung in der Tasche. \n", + /* 52*/ "Wenn Sie nichts unternehmen, wird der Koffer abgefangen. \n", + /* 53*/ "Das ist also die Air Force One? ... Hm, kleiner als ich \ndachte.\n", + /* 54*/ "Haltet sie auf - sie brechen den Safe auf...\n", + /* 55*/ "Agent Dark ist in Position. Ich kann bereits den Haupteingang der Basis sehen. Auch die Haltestelle ist in Sichtweite.\n", + /* 56*/ "Ausgezeichnet, Joanna. In der Bahn befindet sich etwas, dass Sie brauchen. Unser Beobachter hat uns mitgeteilt, dass ein Crew-Mitglied vor einer Minute die Bahn betreten hat. Sie wird von Soldaten eskortiert. Ich muss Sie wohl nicht daran erinnern, dass...\n", + /* 57*/ "...dass diese Leute nichts mit Trents kleiner Inszenierung zu tun haben, und ich darf mich nicht mal wehren, selbst wenn sie mich angreifen. Was ist mit den NSA-Agenten?\n", + /* 58*/ "Ich weiß nicht, wie weit diese Verschwörung innerhalb der NSA fortgeschritten ist, aber ich wette, dass Trents Leute ihm und seinem Plan gegenüber absolut loyal sind. Sie müssen einen Beweis gegen Trent erbringen und diesen dem Präsidenten vorlegen.\n", + /* 59*/ "Und ich soll ihn auch noch beschützen. Haben Sie schon eine Vorstellung, wie sich Trents Vorhaben gestalten könnte? Und was hat es mit diesen blonden Kerlen auf sich?\n", + /* 60*/ "Nur vage Vermutungen, mit denen ich Sie nicht belasten will. Viel Glück! Over und out.\n", + /* 61*/ "Aufzug inoperativ - Sicherheitssystem ist aktiv.\n", + /* 62*/ "Wichtige Person eliminiert\n", + /* 63*/ "Wichtiges Objekt zerstört\n", + /* 64*/ "Eingang wurde gesichert.\n", + /* 65*/ "Wir übernehmen jetzt!!\n", + /* 66*/ "Hover-Trolley wurde abgeschaltet.\n", + /* 67*/ "Ausrüstung kann nicht überprüft werden.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_i.c b/src/files/lang/pal-final/cave_str_i.c new file mode 100644 index 000000000..fe24377c7 --- /dev/null +++ b/src/files/lang/pal-final/cave_str_i.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Prendi i piani di volo dalla cassaforte\n\nLe rotte di volo dell'Air Force One sono conservate in una cassaforte della base. Se riesci ad impossessartene, potremmo usarne i dati per guidare Elvis all'inseguimento dell'Air Force One in modo che ti possa essere di supporto nel caso sopraggiungano circostanze impreviste.\n\n|Obiettivo 5: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 1*/ "TERMINAL PRESIDENZIALE \nBASE AEREA USA, ALASKA\n", + /* 2*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Deposita i tuoi strumenti\n\nLiberati della tua attrezzatura al più presto possibile: trova una valigia dove riporre tutte le tue cose. Evita di portare con te oggetti che possano generare sospetti e compromettere il tuo travestimento. Potrai riprenderli più tardi dopo averli caricati sull'Air Force One per mezzo di un aerocarrello.\n\n|Obiettivo 3: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 4: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nTrent Easton è andato alla base aerea in Alaska per incontrare il Presidente prima della sua visita ufficiale. Dalle prove raccolte a Chicago si può affermare che questa sia la prima fase della sua strategia contro il Presidente e che in quanto tale vada impedita. \n\n|Carrington:\n\nDevi fare molta attenzione qui, Joanna. Nella base aerea sono presenti molte persone estranee al fatto. I tuoi unici obiettivi sono gli uomini di Trent e quegli strani signori biondi. Ricorda che più a lungo riuscirai a mimetizzarti nel tuo travestimento, maggiori saranno le tue possibilità di riuscita.\n\n|Obiettivo 1: - Procurati travestimento ed entra nella base\n\nL'hostess presente nella navetta porta la sua divisa nella valigia. Fatti aiutare da lei e dalla sua scorta e indossa la sua uniforme per entrare nella base aerea. Ricorda che queste persone non sanno niente della cospirazione di Trent e non devono essere uccise.\n\n|Obiettivo 2: - Neutralizza il sistema di sicurezza\n\nCon il tuo travestimento ti sarà possibile ingannare le persone, ma non il detector del sistema di sicurezza che richiede un approccio diverso. Se riesce a scovare l'arma che ti porti appresso, scatterà l'allarme e la base verrà chiusa. Impedisci con qualsiasi mezzo che scatti l'allarme.\n\n|Obiettivo 3: - Sali a bordo dell'Air Force One\n\nNon permettere che l'aereo parta senza di te. Se il tuo travestimento non è ancora stato scoperto, dovresti riuscire a utilizzare la navetta di collegamento per salire a bordo. Altrimenti dovrai trovare qualche altro stratagemma.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Travestiti ed entra nella base\n", + /* 6*/ "Deposita i tuoi strumenti\n", + /* 7*/ "Neutralizza il sistema di sicurezza\n", + /* 8*/ "Prendi i piani di volo dalla cassaforte\n", + /* 9*/ "Sali a bordo dell'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati la divisa dell'hostess.\n", + /* 16*/ "\n", + /* 17*/ "Travestimento\n", + /* 18*/ "Travestimento\n", + /* 19*/ "Presa divisa dell'hostess.\n", + /* 20*/ "Procurati piani di volo.\n", + /* 21*/ "\n", + /* 22*/ "Piani di volo\n", + /* 23*/ "Piani di volo\n", + /* 24*/ "Presi piani di volo.\n", + /* 25*/ "Attenzione! C'è un intruso!\n", + /* 26*/ "Sono stati uccisi troppi civili.\n", + /* 27*/ "Sta bene?\n", + /* 28*/ "Vado a cercare aiuto!\n", + /* 29*/ "Buonasera.\n", + /* 30*/ "Bene, la strada la conosce.\n", + /* 31*/ "Si tolga il cinturone, per favore!\n", + /* 32*/ "Oh, per la miseria!\n", + /* 33*/ "Non sono ammesse armi alla base!\n", + /* 34*/ "Bene, chiamerò la sicurezza!\n", + /* 35*/ "Chiusura del sistema in corso...\n", + /* 36*/ "Il sistema di sicurezza è stato disattivato.\n", + /* 37*/ "Sono state rilevate delle armi.\n", + /* 38*/ "La valigia è stata depositata.\n", + /* 39*/ "La valigia è stata esaminata.\n", + /* 40*/ "Ehi! L'accesso a quest'area è vietato.\n", + /* 41*/ "È la prima volta che viene qui?\n", + /* 42*/ "Ehi! Mi restituisca la valigia.\n", + /* 43*/ "Chiami pure la sicurezza: me la vedrò io con loro!\n", + /* 44*/ "Di sopra... c'è un intruso.\n", + /* 45*/ "Negato l'accesso alla griglia laser.\n", + /* 46*/ "Sistema a griglie laser in sovraccarico.\n", + /* 47*/ "Vittime ingiustificate.\n", + /* 48*/ "Non devono prendere la cassaforte!\n", + /* 49*/ "Indossato travestimento.\n", + /* 50*/ "Ecco la tua occasione! Prendi la valigia dell'hostess \n e indossa la sua divisa.\n", + /* 51*/ "Usa quella valigia per nascondere la tua attrezzatura.\n", + /* 52*/ "Se non fai qualcosa la valigia verrà fermata.\n", + /* 53*/ "Così quello è l'Air Force One? Mhm... \n più piccolo di quanto pensassi.\n", + /* 54*/ "Fermateli! Stanno scassinando la cassaforte...\n", + /* 55*/ "Agente Dark in posizione! Vedo l'ingresso principale della base e suppongo di aver trovato il punto d'arrivo della navetta!\n", + /* 56*/ "Eccellente, Joanna. Quella navetta è il tuo biglietto d'entrata. Il nostro uomo al terminal inferiore ha riconosciuto un membro dell'equipaggio, una donna salita un minuto fa. È scortata da una squadra della base aerea. È superfluo ricordarti che...\n", + /* 57*/ "Lo so, lo so! Sono poveri esserini innocenti, probabilmente del tutto estranei allo stupido piano di Trent e non posso sparargli neanche se sparano loro per primi. E che mi dice degli agenti NSA?\n", + /* 58*/ "Non sono a conoscenza della misura in cui si sia diffusa la cospirazione all'interno dell'NSA, ma sono pronto a scommettere che gli uomini di Trent sono fedeli a lui e al suo piano. Devi trovare le prove del suo tradimento sull'Air Force One e mostrarle al Presidente.\n", + /* 59*/ "Sììì e proteggerlo dai suoi rapitori! Ha qualche idea in merito al piano di Trent e cosa mi sa dire di quegli strani biondi?\n", + /* 60*/ "Solo vaghi sospetti che non vale la pena menzionare. Buona fortuna! Passo e chiudo!\n", + /* 61*/ "Ascensore inattivo - Sistema di sicurezza attivo\n", + /* 62*/ "Ucciso personale essenziale alla missione.\n", + /* 63*/ "Distrutto strumento essenziale alla missione.\n", + /* 64*/ "L'entrata alla base è stata chiusa.\n", + /* 65*/ "Stiamo decollando!!!\n", + /* 66*/ "Chiuso carrello del velivolo.\n", + /* 67*/ "L'attrezzatura non può essere depositata.\n", +}; diff --git a/src/files/lang/pal-final/cave_str_s.c b/src/files/lang/pal-final/cave_str_s.c new file mode 100644 index 000000000..918ac4808 --- /dev/null +++ b/src/files/lang/pal-final/cave_str_s.c @@ -0,0 +1,72 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Obtener Planes de Vuelo de la Caja Fuerte\n\nLa ruta de vuelo planeada para el Air Force One está guardada en la caja fuerte de la base. Si puedes hacerte con ella, entonces podremos usar los datos para dirigir a Elvis hasta el Air Force One durante el vuelo como apoyo para ti en caso de que algo vaya mal.\n\n|Objetivo Cinco: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 1*/ "TERMINAL PRESIDENCIAL \nBASE AÉREA EE.UU., ALASKA\n", + /* 2*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Facturar el Equipo\n\nDeshazte de tu equipo tan pronto te sea posible; evita llevar objetos sospechosos contigo que puedan comprometer tu disfraz. Puedes recogerlos más tarde tras cargarlos a bordo del Air Force One usando un carrito aéreo. Primero, creo, necesitarás encontrar una maleta para poner el equipo dentro.\n\n|Objetivo Tres: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Cuatro: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 3*/ "|Antecendentes- \n\nTrent Easton ha volado para encontrarse con el Presidente en la base aérea de Alaska, preparada para la visita del mismo. De las evidencias obtenidas en Chicago, asumimos que éste es su primer movimiento en contra del Presidente y, como tal, debe ser prevenido. \n\n|Carrington - \n\nDebes tener cuidado aquí, Joanna. Hay mucha gente inocente por la base aérea. Sólo los hombres de Trent o esos extraños hombres Rubios son blancos viables. Recuerda, cuanto más tiempo tengas puesto el disfraz, más posibilidades de éxito tendrás.\n\n|Objetivo Uno: - Obtener Disfraz y Entrar en la Base\n\nLa azafata que llega en el teleférico lleva su uniforme en su bolsa. Hazte con ella y su escolta y usa el uniforme como disfraz para entrar en la base aérea. Recuerda, esa gente no sabe nada acerca de la conspiración de Trent y no debe morir.\n\n|Objetivo Dos: - Burlar al Sistema Monitor de Seguridad\n\nPuedes engañar a los humanos con el disfraz, pero las pantallas del sistema de seguridad necesitan otro enfoque. Si detectan el arma de tu equipo, la alarma sonará y la base será bloqueada. Evita que la alarma sea dada del modo que puedas.\n\n|Objetivo Tres: - Abordar el Air Force One\n\nNo dejes que el avión se vaya sin ti. Si tu disfraz todavía sigue activo, entonces serás capaz de usar la pasarela para subir a bordo. Si no es así, deberás encontrar otro camino. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Obtener el disfraz y entrar a la base\n", + /* 6*/ "Facturar el equipo\n", + /* 7*/ "Burlar al sistema monitor de seguridad\n", + /* 8*/ "Obtener planes v. de la caja fuerte\n", + /* 9*/ "Abordar el Air Force One\n", + /* 10*/ "Obtén la maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén el uniforme de azafata de vuelo.\n", + /* 16*/ "\n", + /* 17*/ "Disfraz\n", + /* 18*/ "Disfraz\n", + /* 19*/ "Uniforme de azafata obtenido.\n", + /* 20*/ "Obtén los planes de vuelo de la caja fuerte.\n", + /* 21*/ "\n", + /* 22*/ "Planes de Vuelo\n", + /* 23*/ "Planes de Vuelo\n", + /* 24*/ "Planes de vuelo obtenidos.\n", + /* 25*/ "Cuidado. Es un intruso...\n", + /* 26*/ "Han muerto civiles inocentes.\n", + /* 27*/ "¿Está bien?\n", + /* 28*/ "Iré para obtener alguna ayuda.\n", + /* 29*/ "Buenas tardes.\n", + /* 30*/ "Muy bien, ya conoce el camino desde aquí.\n", + /* 31*/ "Deberás dejar ese arma aquí.\n", + /* 32*/ "¡Oh, Dios mío!\n", + /* 33*/ "No se permiten armas en la base.\n", + /* 34*/ "De acuerdo, avisaré a seguridad.\n", + /* 35*/ "Cierre del sistema iniciado...\n", + /* 36*/ "Los sistemas de seguridad han sido apagados.\n", + /* 37*/ "Se han detectado armas.\n", + /* 38*/ "La maleta ha sido facturada.\n", + /* 39*/ "La maleta ha sido escaneada.\n", + /* 40*/ "Hey, tú: ésta es un área restringida.\n", + /* 41*/ "¿Eres nueva por aquí?\n", + /* 42*/ "Hey. Devuélveme mi maleta.\n", + /* 43*/ "Trae a seguridad, yo me encargo de ella...\n", + /* 44*/ "Arriba... hay un intruso.\n", + /* 45*/ "Acceso a la rejilla de láser denegado.\n", + /* 46*/ "Sistema de rejilla de láser sobrecargado.\n", + /* 47*/ "Demasiados civiles heridos.\n", + /* 48*/ "Detenles antes de que abran la caja fuerte...\n", + /* 49*/ "Disfraz puesto.\n", + /* 50*/ "¡Ésta es tu oportunidad! Agarra la bolsa \nde la azafata y coge su uniforme.\n", + /* 51*/ "Usa la maleta para ocultar tu equipo.\n", + /* 52*/ "La maleta será detenida a menos que hagas algo.\n", + /* 53*/ "¿Así que ese es el Air Force One? ... Huh, es más \npequeño de lo que pensaba.\n", + /* 54*/ "Detenlos: están accediendo a la caja fuerte...\n", + /* 55*/ "Agente Dark en posición. Puedo ver la entrada principal de la base, y distingo el punto de llegada del teleférico.\n", + /* 56*/ "Excelente, Joanna. Ese teleférico es tu modo de entrar... nuestro observador de la terminal inferior ha visto a un miembro de la tripulación entrar hace un minuto. Está siendo escoltada por tropas de la base aérea. No debo recordarte que probablemente...\n", + /* 57*/ "Que probablemente sean inocentes de estar involucrados en la pequeña trama de Trent. Y que no puedo dispararles aunque ellos me disparen a mí. ¿Qué pasa con los agentes de la ANS?\n", + /* 58*/ "No sé cuán lejos ha llegado la conspiración a través de la ANS, pero podría apostar a que los hombres que Trent ha situado por aquí son leales a su plan y a él mismo. Debes encontrar evidencias de la traición de Trent en el Air Force One y enseñárselas al Presidente.\n", + /* 59*/ "Sí, y protegerle de sus secuestradores. ¿Tienes alguna idea sobre de qué puede tratar el plan de Trent, y qué pasa con esos chicos rubios?\n", + /* 60*/ "Sólo sospechas vagas, y no quiero distraerte ahora con eso. Buena suerte. Carrington fuera.\n", + /* 61*/ "Ascensor no operativo: sistema de seguridad activo.\n", + /* 62*/ "Personal crítico de la misión eliminado.\n", + /* 63*/ "Objeto crítico de la misión destruido.\n", + /* 64*/ "Entrada a la base asegurada.\n", + /* 65*/ "¡¡Nos ocupamos nosotros!!\n", + /* 66*/ "El teleférico ha sido derribado.\n", + /* 67*/ "El equipo no puede ser registrado.\n", +}; diff --git a/src/files/lang/pal-final/cradE.c b/src/files/lang/pal-final/cradE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cradJ.c b/src/files/lang/pal-final/cradJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cradP.c b/src/files/lang/pal-final/cradP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cradP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_f.c b/src/files/lang/pal-final/crad_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_g.c b/src/files/lang/pal-final/crad_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_i.c b/src/files/lang/pal-final/crad_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crad_str_s.c b/src/files/lang/pal-final/crad_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crad_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypE.c b/src/files/lang/pal-final/crypE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypJ.c b/src/files/lang/pal-final/crypJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/crypP.c b/src/files/lang/pal-final/crypP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/crypP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_f.c b/src/files/lang/pal-final/cryp_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_g.c b/src/files/lang/pal-final/cryp_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_i.c b/src/files/lang/pal-final/cryp_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/cryp_str_s.c b/src/files/lang/pal-final/cryp_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/cryp_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/damE.c b/src/files/lang/pal-final/damE.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-final/damE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-final/damJ.c b/src/files/lang/pal-final/damJ.c new file mode 100644 index 000000000..f6b35fb3f --- /dev/null +++ b/src/files/lang/pal-final/damJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Secure Laboratories And Research Data\n\nWe want any information that dataDyne have amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic 2 and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and their strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and their allies. Disrupt the operation as extensively as possible but remember our minimum force rules for non-combatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the Primary Power Source will help cause the ship to wander from the operating location, but it will also cause blackouts in non-essential sections of the ship.\n\n|Objective Two: - Deactivate GPS And AutoPilot\n\ngetting both the GPS location system and the ship's Autopilot offline will cause the ship to drift off station; if only one is shut down it will not be enough to prevent the diving operations from continuing.\n\n|Objective Three: - Rendezvous And Escape With Elvis\n\nfind Elvis and return to the Moon pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS And AutoPilot\n", + /* 6*/ "Disable Primary Power Source\n", + /* 7*/ "Secure Laboratories And Research Data\n", + /* 8*/ "Activate Moon Pool Lift\n", + /* 9*/ "Rendezvous And Escape With Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship\nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations\nwithout any power.\n", + /* 14*/ "Autopilot System Has Been Deactivated.\n", + /* 15*/ "GPS System Has Been Deactivated.\n", + /* 16*/ "Critical Mission Object Has Been Destroyed.\n", + /* 17*/ "Reactor Shutdown Control Hatch Opened.\n", + /* 18*/ "Reactor Has Been Shut Down.\n", + /* 19*/ "Diving Control Centre Has Been Located.\n", + /* 20*/ "Critical Mission Personnel Killed.\n", + /* 21*/ "Research Data Has Been Secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research Data Disk\n", + /* 25*/ "A Research Data Disk\n", + /* 26*/ "Picked up a Research Data Disk\n", + /* 27*/ "Critical Mission Personnel Have Been Killed.\n", + /* 28*/ "LIft Door Has Been Unlocked.\n", + /* 29*/ "LIft Has Been Activated.\n", + /* 30*/ "Operation Denied - Hangar Doors Still Closed.\n", + /* 31*/ "Unlocking Sequence Has Been Reset.\n", + /* 32*/ "You go on ahead Jo, I'll secure the perimeter.\nWe'll meet up later.\n", + /* 33*/ "Elvis Has Been Killed.\n", + /* 34*/ "Joanna..what took you so long?. Follow me,\nlets get out of this old tub.\n", + /* 35*/ "Civilians Have Been Killed.\n", + /* 36*/ "Critical Mission Objects Has Been Destroyed.\n", + /* 37*/ "Alarm Has Been Activated.\n", + /* 38*/ "Alarm Has Been De-Activated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. Time for a swim.", + /* 40*/ "I hope the government don't want to use this ship anytime soon.", + /* 41*/ "Do you think we were a little heavy-handed?", + /* 42*/ "Naaahhhh.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/damP.c b/src/files/lang/pal-final/damP.c new file mode 100644 index 000000000..22c4cd5ff --- /dev/null +++ b/src/files/lang/pal-final/damP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Secure Laboratories and Research Data\n\nWe want any information that dataDyne has amassed on this project. Secure the labs on the science deck and remember to stun the scientists and technicians working there; we will want to interrogate them later.\n\n|Objective Three: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Four: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Five: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 1*/ "Cetan Ship\n", + /* 2*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Activate Moon Pool Lift\n\nThis will activate the automatic pilot on the deep submersible, recalling it for you and Elvis to use. The controls are in the sub hangar.\n\n|Objective Four: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 3*/ "|Background - \n\nThe conspirators have thrown caution to the winds and have committed an act of piracy, taking over the Pelagic II and commencing hurried diving operations in the Pacific Ocean. Both dataDyne and its strange allies are involved in what appears to be a joint operation.\n\n|Carrington - \n\nAlthough this move seems reckless, it only serves to highlight how important the operation on the seabed must be to dataDyne and its allies. Disrupt the operation as extensively as possible, but remember our minimum force rules for noncombatants.\n\n|Objective One: - Disable Primary Power Source\n\nShutting down the primary power source will help cause the ship to wander from the operating location, but it will also cause blackouts in nonessential sections of the ship. Use the x-ray scanner to find the active switches on the power core.\n\n|Objective Two: - Deactivate GPS and Autopilot\n\nGetting both the GPS location system and the ship's autopilot offline will cause the ship to drift off station; if only one is shut down, it will not be enough to prevent the diving operations from continuing. Do not harm any innocent civilians you come across.\n\n|Objective Three: - Rendezvous and Escape With Elvis\n\nFind Elvis and return to the Moon Pool to prep both the deep submersible and yourselves for the dive to the seafloor.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Deactivate GPS and autopilot\n", + /* 6*/ "Disable primary power source\n", + /* 7*/ "Secure laboratories and research data\n", + /* 8*/ "Activate Moon Pool lift\n", + /* 9*/ "Rendezvous and escape with Elvis\n", + /* 10*/ "Cripple the engines and the ship will \ndrift... Perfect!\n", + /* 11*/ "This must be where the sub's controlled from.\n", + /* 12*/ "Without the autopilot and the GPS, the ship \nwill wander off station.\n", + /* 13*/ "They'll be unable to conduct any operations \nwithout any power.\n", + /* 14*/ "Autopilot system has been deactivated.\n", + /* 15*/ "GPS system has been deactivated.\n", + /* 16*/ "Critical mission object has been destroyed.\n", + /* 17*/ "Reactor shutdown control hatch opened.\n", + /* 18*/ "Reactor has been shut down.\n", + /* 19*/ "Diving control center has been located.\n", + /* 20*/ "Critical mission personnel killed.\n", + /* 21*/ "Research data has been secured.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Research data disk\n", + /* 25*/ "A research data disk\n", + /* 26*/ "Picked up a research data disk.\n", + /* 27*/ "Critical mission personnel have been killed.\n", + /* 28*/ "Lift door has been unlocked.\n", + /* 29*/ "Lift has been activated.\n", + /* 30*/ "Operation denied - hangar doors still closed.\n", + /* 31*/ "Unlocking sequence has been reset.\n", + /* 32*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 33*/ "Elvis has been killed.\n", + /* 34*/ "Joanna... What took you so long? Follow me - \nlet's get out of this old tub.\n", + /* 35*/ "Civilians have been killed.\n", + /* 36*/ "Critical mission object has been destroyed.\n", + /* 37*/ "Alarm has been activated.\n", + /* 38*/ "Alarm has been deactivated.\n", + /* 39*/ "Right. The diving operation has been disrupted on the surface. \nTime for a swim.\n", + /* 40*/ "I hope the government don't want to use this ship anytime soon.\n", + /* 41*/ "Do you think we were a little heavy-handed?\n", + /* 42*/ "Naaahhhh.\n", + /* 43*/ "Pull the plug on that now.\n", + /* 44*/ "Switch this thing off.\n", + /* 45*/ "I'll shut it down.\n", + /* 46*/ "Please don't hurt me.\n", + /* 47*/ "Die, you traitors.\n", +}; diff --git a/src/files/lang/pal-final/dam_str_f.c b/src/files/lang/pal-final/dam_str_f.c new file mode 100644 index 000000000..60a0d73cf --- /dev/null +++ b/src/files/lang/pal-final/dam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Sécuriser labos et données de recherche\n\nNous voulons les informations recueillies par la dataDyne sur ce projet. Sécurisez les labos du pont scientifique et souvenez-vous d'assommer les scientifiques et les techniciens du site. Nous les interrogerons plus tard.\n\n|Objectif 3: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours.\n\n|Objectif 4: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 5: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 1*/ "Vaisseau Cetan\n", + /* 2*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Activer l'ascenseur du sas\n\nCeci enclenchera le pilote automatique du submersible, ramenant celui-ci pour vous et Elvis. Les commandes se trouvent dans le hangar du sous-marin.\n\n|Objectif 4: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLes conspirateurs ont détourné le Pelagic II et ont entamé d'importantes opérations sous-marines dans l'Océan Pacifique. La dataDyne et leurs mystérieux alliés semblent être impliqués dans une manoeuvre de coopération.\n\n|Carrington - \n\nBien que cette action semble maladroite, elle met en évidence l'importance de cette zone sous-marine aux yeux de la dataDyne et de ses alliés. Contrecarrez du mieux que vous pouvez l'opération tout en respectant notre protocole de sauvegarde des civils.\n\n|Objectif 1: - Désactiver source d'énergie principale\n\nLa coupure du générateur principal fera dériver le vaisseau de sa zone d'opération mais provoquera des blackouts dans les sections secondaires de l'appareil. Utilisez un scanner rayons X pour trouver les interrupteurs sur le générateur.\n\n|Objectif 2: - Désactiver GPS et Auto-pilote\n\nDébrancher le système de localisation GPS et l'auto-pilote du vaisseau le fera s'écarter de la station. Si seulement l'un des deux est éteint, les opérations de plongée ne seront pas perturbées et suivront leur cours. Epargnez les civils.\n\n|Objectif 3: - Retrouver Elvis et s'enfuir avec lui\n\nTrouvez Elvis et retournez au sas pour préparer le submersible et votre équipement pour une plongée.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Désactiver GPS et Auto-pilote\n", + /* 6*/ "Désactiver source d'énergie principale\n", + /* 7*/ "Sécuriser labos et données de recherche\n", + /* 8*/ "Activer l'ascenseur du sas\n", + /* 9*/ "Retrouver Elvis et s'enfuir avec lui\n", + /* 10*/ "On sabote les moteurs et le vaisseau \ndérivera... Parfait!\n", + /* 11*/ "Le sous-marin doit être contrôlé d'ici. \n", + /* 12*/ "Sans auto-pilote ni GPS, l'appareil \ns'éloignera de la station. \n", + /* 13*/ "Ils ne pourront plus continuer l'opération \nsans énergie.\n", + /* 14*/ "Système auto-pilote désactivé.\n", + /* 15*/ "Système GPS désactivé.\n", + /* 16*/ "Objet crucial détruit.\n", + /* 17*/ "Porte de commande d'arrêt du réacteur ouverte.\n", + /* 18*/ "Réacteur désactivé.\n", + /* 19*/ "Centre de contrôle de plongée localisé.\n", + /* 20*/ "Personnel crucial abattu.\n", + /* 21*/ "Données de recherche sécurisées.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disque de recherche\n", + /* 25*/ "Un disque de recherche\n", + /* 26*/ "Disque de recherche obtenu.\n", + /* 27*/ "Personnel crucial abattu.\n", + /* 28*/ "Porte ascenseur déverrouillée.\n", + /* 29*/ "Ascenseur activé.\n", + /* 30*/ "Opération refusée - portes du hangar fermées.\n", + /* 31*/ "Séquence de déverrouillage réinitialisée.\n", + /* 32*/ "Vas-y. Je sécurise le périmètre. \nOn se retrouve plus tard.\n", + /* 33*/ "Elvis a été abattu.\n", + /* 34*/ "Qu'est-ce que tu faisais? Suis-moi... \nOn décampe.\n", + /* 35*/ "Des civils ont été abattus.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Alarme activée.\n", + /* 38*/ "Alarme désactivée.\n", + /* 39*/ "Bien. L'opération de plongée a été annulée à la surface. \nIl est temps de piquer une tête.\n", + /* 40*/ "J'espère que le gouvernement ne compte pas utiliser ce vaisseau tout de suite.\n", + /* 41*/ "On y est allé un peu fort, non?\n", + /* 42*/ "Mais non.\n", + /* 43*/ "Débranche ce truc.\n", + /* 44*/ "Eteins-moi ça.\n", + /* 45*/ "Je vais l'éteindre.\n", + /* 46*/ "Ne me faites pas de mal!\n", + /* 47*/ "Crevez, charognes!\n", +}; diff --git a/src/files/lang/pal-final/dam_str_g.c b/src/files/lang/pal-final/dam_str_g.c new file mode 100644 index 000000000..e7a389244 --- /dev/null +++ b/src/files/lang/pal-final/dam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Sichern Sie die Daten der Forschungen!\n\nWir wollen sämtliche Informationen, die dataDyne bis dato über dieses Projekt gesammelt hat. Sichern Sie die Laboratorien am Forschungs-Deck, und setzen Sie die anwesenden Wissenschaftler und Techniker außer Gefecht. Vergessen Sie nicht, dass wir sie später noch verhören wollen!\n\n|3. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|4. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|5. Ziel: - Treffen Sie sich mit Elvis, und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 1*/ "Cetanisches Schiff\n", + /* 2*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Aktivieren Sie den Moon Pool-Aufzug!\n\nDie Steuerungselemente für das Tauchschiff befinden sich im Tiefhangar. Wenn Sie den Autopiloten des Tauchschiffs aktivieren, gelangt es für Sie und Elvis in Reichweite.\n\n|4. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie Verschwörer haben ihre Deckung fallen gelassen und einen Akt der Piraterie eingeleitet. Die Pelagic II wurde geentert und führt nun ein Tauchmanöver im Pazifischen Ozean durch. Sowohl dataDyne als auch ihre eigenartigen Verbündeten scheinen in diese Operation verwickelt zu sein.\n\n|Carrington - \n\nObwohl dieser Schritt sehr leichtsinnig erscheint, zeigt diese Maßnahme, wie wichtig diese Tiefsee-Operation für die dataDyne-Gruppe und ihre Verbündeten sein muss. Ihre Aufgabe ist es, diese Operation zu stören. Bedenken Sie aber auch unsere Verhaltensregeln gegenüber unbeteiligten Personen.\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nDurch die Abschaltung des Generators wird das Schiff gezwungen, das Operationsgebiet zu verlassen. Allerdings führt der Energieverlust in manchen Teilen des Schiffs auch zu Blackouts. Setzen Sie den Röntgen-Scanner ein, um die aktiven Schalter zu finden.\n\n|2. Ziel: - Deaktivieren Sie das GPS und den Autopiloten!\n\nEs ist erforderlich, das GPS-Ortungssystem und den Autopiloten zu deaktivieren. Ohne die Unterstützung dieser Systeme beginnt das Schiff abzudriften. Die Abschaltung von nur einem System reicht nicht aus, die Fortführung der Operation zu unterbrechen. Zivilisten dürfen auf keinen Fall zu Schaden kommen.\n\n|3. Ziel: - Treffen Sie sich mit Elvis und flüchten Sie gemeinsam!\n\nFinden Sie Elvis und kehren Sie mit ihm zum Moon Pool zurück. Bereiten Sie dort sich selbst und das Tauchschiff für den Tauchgang zum Meeresgrund vor.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Deaktivieren Sie den Autopiloten!\n", + /* 6*/ "Setzen Sie den Generator außer Kraft!\n", + /* 7*/ "Sichern Sie die Daten!\n", + /* 8*/ "Aktivieren Sie den Moon Pool-Aufzug!\n", + /* 9*/ "Flüchten Sie gemeinsam mit Elvis!\n", + /* 10*/ "Leg die Maschinen lahm, dann \ndriftet das Schiff ab... Perfekt!\n", + /* 11*/ "Von hier aus wird das Schiff gesteuert.\n", + /* 12*/ "Ohne Autopilot und GPS kann das Schiff \nseine Position nicht halten.\n", + /* 13*/ "Das Schiff wird ohne Stromzufuhr völlig \nnavigationsunfähig sein.\n", + /* 14*/ "Autopilot wurde deaktiviert\n", + /* 15*/ "GPS-System wurde deaktiviert\n", + /* 16*/ "Wichtiges Objekt wurde zerstört\n", + /* 17*/ "Reaktor-Kontrollkonsole geöffnet\n", + /* 18*/ "Reaktor wurde abgeschaltet.\n", + /* 19*/ "Tauch-Kontrollzentrum wurde geortet.\n", + /* 20*/ "Wichtige Person neutralisiert\n", + /* 21*/ "Forschungsdaten wurden gesichert.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Sicherungsdiskette\n", + /* 25*/ "Eine Sicherungsdiskette\n", + /* 26*/ "Sicherungsdiskette aufgenommen\n", + /* 27*/ "Wichtige Personen wurden neutralisiert.\n", + /* 28*/ "Aufzugstür wurde entriegelt.\n", + /* 29*/ "Aufzug wurde aktiviert.\n", + /* 30*/ "Unzulässige Operation - Die Hangartüren sind noch geschlossen.\n", + /* 31*/ "Entriegelungssequenz wurde abgebrochen.\n", + /* 32*/ "Du gehst voraus, Jo. Ich sichere das Gelände. \nWir treffen uns später.\n", + /* 33*/ "Elvis wurde neutralisiert.\n", + /* 34*/ "Joanna... Was hat dich aufgehalten? Folge mir! \nLass uns von dieser Rostschüssel verschwinden.\n", + /* 35*/ "Zivile Verluste!!!\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Alarm wurde aktiviert.\n", + /* 38*/ "Alarm wurde deaktiviert.\n", + /* 39*/ "Korrekt. Die Operation wurde an der Oberfläche unterbrochen.\nZeit für ein wenig Badevergnügen.\n", + /* 40*/ "Ich hoffe, die Regierung will dieses Schiff so rasch nicht benutzen.\n", + /* 41*/ "Glaubst du, wir waren ein wenig zu grob?\n", + /* 42*/ "Ach, stell Dich nicht so mädchenhaft an!\n", + /* 43*/ "Zieh den Stecker raus!\n", + /* 44*/ "Schalte das Ding ab!\n", + /* 45*/ "Ich schalte es ab.\n", + /* 46*/ "Bitte tu mir nichts.\n", + /* 47*/ "Jetzt seid ihr dran, Verräter.\n", +}; diff --git a/src/files/lang/pal-final/dam_str_i.c b/src/files/lang/pal-final/dam_str_i.c new file mode 100644 index 000000000..e137b03de --- /dev/null +++ b/src/files/lang/pal-final/dam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Chiudi a chiave i laboratori\n\nVogliamo ogni informazione che la dataDyne abbia raccolto su questo progetto. Chiudi a chiave i laboratori sul piano per la ricerca scientifica e stordisci gli scienziati e i tecnici che lavorano lì: li interrogheremo più tardi.\n\n|Obiettivo 3: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 4: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 5: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 1*/ "Astronave Cetan\n", + /* 2*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Attiva il sollevatore del Moon Pool\n\nQuesto attiverà il pilota automatico dell'unità sommergibile minore, richiamandola affinché tu ed Elvis possiate salire a bordo. I comandi sono nell'hangar.\n\n|Obiettivo 4: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nRischiando il tutto per tutto, i cospiratori in un atto di pirateria hanno preso il comando del Pelagic II e hanno dato inizio a frettolose operazioni sottomarine nell'Oceano Pacifico. Sia la dataDyne che i suoi strani alleati sono coinvolti in quella che ha tutto l'aspetto di un'operazione congiunta.\n\n|Carrington:\n\nPer quanto la loro mossa possa sembrare avventata, in realtà non fa altro che confermare l'importanza delle operazioni sul fondo oceanico per la dataDyne e i suoi alleati. Ostacola le operazioni quanto più possibile, ma tenendo sempre presente la regola del ricorso minimo alla violenza contro i civili.\n\n|Obiettivo 1: - Disattiva la fonte d'energia primaria\n\nLa chiusura della fonte d'energia primaria permetterà lo spostamento del sottomarino dalla sua posizione operativa, ma interromperà anche l'erogazione energetica a settori non essenziali del sommergibile. Usa lo scanner a raggi X per trovare gli interruttori attivi nella centralina elettrica.\n\n|Obiettivo 2: - Disattiva il GPS e il pilota automatico\n\nDisattivando il sistema di orientamento GPS e il pilota automatico la nave inizierà ad allontanarsi dalla sua posizione. Se ne viene disattivato solo uno dei due, questo non sarà sufficiente ad impedire la continuazione delle operazioni sottomarine. Non ferire nessuno dei civili che incontri.\n\n|Obiettivo 3: - Incontro e fuga con Elvis\n\nTrova Elvis e tornate al Moon Pool. Preparatevi per la fuga sul fondo oceanico a bordo di questo piccolo sommergibile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il GPS e il pilota automatico\n", + /* 6*/ "Disattiva la fonte d'energia primaria\n", + /* 7*/ "Chiudi a chiave i laboratori\n", + /* 8*/ "Attiva il sollevatore del Moon Pool\n", + /* 9*/ "Incontro e fuga con Elvis\n", + /* 10*/ "Disattivando il motore il sottomarino\n andrà alla deriva... Perfetto!\n", + /* 11*/ "Ah, ecco da dove si controlla il sommergibile!\n", + /* 12*/ "Senza il pilota automatico e il GPS, il sottomarino \nsi allontanerà dalla sua posizione.\n", + /* 13*/ "Senza energia non riusciranno a \ncondurre nessuna operazione.\n", + /* 14*/ "Disattivato pilota automatico.\n", + /* 15*/ "Disattivato sistema GPS.\n", + /* 16*/ "Distrutto strumento essenziale alla missione.\n", + /* 17*/ "Aperto sportello comandi del reattore.\n", + /* 18*/ "Disattivato il reattore.\n", + /* 19*/ "Localizzato centro di comando immersione.\n", + /* 20*/ "Ucciso personale essenziale alla missione.\n", + /* 21*/ "I dati di ricerca sono al sicuro.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco dati di ricerca\n", + /* 25*/ "Disco dati di ricerca\n", + /* 26*/ "Preso disco dati di ricerca.\n", + /* 27*/ "Ucciso personale essenziale alla missione.\n", + /* 28*/ "Aperta porta sollevatore.\n", + /* 29*/ "Attivato sollevatore.\n", + /* 30*/ "Operazione impossibile - Porte hangar ancora chiuse.\n", + /* 31*/ "La sequenza di sblocco è stata resettata.\n", + /* 32*/ "Va avanti tu, Jo. Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 33*/ "Elvis è stato ucciso.\n", + /* 34*/ "Joanna, qualche problema? Dai, seguimi, \nusciamo da 'sta bagnarola!\n", + /* 35*/ "Uccisi dei civili.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Attivato allarme.\n", + /* 38*/ "Disattivato allarme.\n", + /* 39*/ "Bene. Sembra proprio che le operazioni \ndi immersione siano finite per ora! \nFacciamoci una nuotata...\n", + /* 40*/ "Spero bene che il governo non intenda usare questo sottomarino tanto presto!\n", + /* 41*/ "Dici che abbiamo avuto un po'\ntroppo la mano pesante?\n", + /* 42*/ "Ma va là!!!\n", + /* 43*/ "E ora stacca la spina!\n", + /* 44*/ "Spegni 'sto coso!\n", + /* 45*/ "Ora lo chiudo!\n", + /* 46*/ "Non farmi del male!\n", + /* 47*/ "Crepa, traditore!\n", +}; diff --git a/src/files/lang/pal-final/dam_str_s.c b/src/files/lang/pal-final/dam_str_s.c new file mode 100644 index 000000000..0bc7da93e --- /dev/null +++ b/src/files/lang/pal-final/dam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objetivo Dos: - Asegurar los Laboratorios y Datos de Investigación\n\nQueremos cualquier información que dataDyne haya reunido sobre este proyecto. Asegura los laboratorios de la cubierta de ciencias y recuerda aturdir a los científicos y técnicos que allí trabajan; queremos interrogarles más tarde.\n\n|Objectivo Tres: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Cuatro: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cinco: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 1*/ "Nave Cetan\n", + /* 2*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Activar el Ascensor de la Piscina\n\nEsto activará el piloto automático del sumergible de profundidad, trayéndolo de vuelta para que lo uséis Elvis y tú. Los controles están en el sub-hangar.\n\n|Objetivo Cuatro: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLos conspiradores han echado la precaución por la borda y han cometido un acto de piratería, tomando el Pelagic II y comenzando a toda velocidad operaciones submarinas en el Océano Pacífico. Ambos, dataDyne y sus extraños aliados, están envueltos en lo que parece una operación conjunta.\n\n|Carrington - \n\nAunque este movimiento parece insensato, sólo sirve para mostrar lo importante que esta operación en el fondo marino debe ser para dataDyne y sus aliados. Interrumpe la operación tanto como sea posible, pero recuerda nuestras reglas de fuerza mínima para los no combatientes.\n\n|Objetivo Uno: - Desactivar la Fuente Primaria de Energía\n\nApagar la fuente primaria de energía puede causar que el navío se aparte de la zona de operaciones, pero también puede causar apagones en secciones no esenciales de la nave. Usa el escáner de rayos-x para encontrar los interruptores activos en el núcleo de energía.\n\n|Objectivo Dos: - Desactivar el GPS y el Piloto Automático\n\nApagar tanto el sistema de localización GPS como el piloto automático de la nave causará que el barco quede 'dormido'; si solamente uno es apagado, no será suficiente para evitar que las operaciones submarinas continúen. No hieras a los civiles con los que te cruces.\n\n|Objetivo Tres: - Encontrar y Escapar con Elvis\n\nEncuentra a Elvis y regresa a la Piscina donde debéis preparar el sumergible y a vosotros mismos para sumergiros hacia el fondo marino.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar GPS y piloto automático\n", + /* 6*/ "Desactivar fuente primaria de energía\n", + /* 7*/ "Asegurar laboratorios y datos\n", + /* 8*/ "Activar el ascensor de la piscina\n", + /* 9*/ "Encontrar y escapar con Elvis\n", + /* 10*/ "Estropea los motores y la nave irá \na la deriva... ¡Perfecto!\n", + /* 11*/ "Desde aquí se debe controlar el submarino.\n", + /* 12*/ "Sin el piloto automático y el GPS, la nave \ndeambulará fuera de la estación.\n", + /* 13*/ "No podrán realizar ninguna operación \nsin energía.\n", + /* 14*/ "El sistema de piloto automático ha sido desactivado.\n", + /* 15*/ "El sistema GPS ha sido desactivado.\n", + /* 16*/ "Objeto crítico de la misión destruido.\n", + /* 17*/ "Escotilla del control de apagado del reactor abierta.\n", + /* 18*/ "El reactor ha sido apagado.\n", + /* 19*/ "El centro de control de buceo ha sido localizado.\n", + /* 20*/ "Ha muerto personal crítico de la misión.\n", + /* 21*/ "Datos de investigación asegurados.\n", + /* 22*/ "\n", + /* 23*/ "\n", + /* 24*/ "Disco de datos\n", + /* 25*/ "Un disco de datos de investigación\n", + /* 26*/ "Disco de datos de investigación obtenido.\n", + /* 27*/ "Ha muerto personal crítico de la misión.\n", + /* 28*/ "La puerta del ascensor ha sido abierta.\n", + /* 29*/ "El ascensor ha sido activado.\n", + /* 30*/ "Operación denegada: puertas del hangar todavía cerradas.\n", + /* 31*/ "La secuencia de desbloqueo ha sido reinicializada.\n", + /* 32*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos más tarde.\n", + /* 33*/ "Elvis ha muerto.\n", + /* 34*/ "Joanna... ¿Por qué has tardado tanto? Sígueme. \nSalgamos de esta vieja bañera.\n", + /* 35*/ "Han muerto civiles.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "La alarma ha sido activada.\n", + /* 38*/ "La alarma ha sido desactivada.\n", + /* 39*/ "Correcto. La operación de buceo ha sido desbaratada en la superficie. \nEs la hora del baño.\n", + /* 40*/ "Espero que el gobierno no quiera usar esta nave en breve.\n", + /* 41*/ "¿Piensas que fuimos un poquito torpes?\n", + /* 42*/ "Nooohhhh.\n", + /* 43*/ "Tira del enchufe ahora.\n", + /* 44*/ "Apaga esa cosa.\n", + /* 45*/ "Lo apagaré.\n", + /* 46*/ "Por favor, no me hagas daño.\n", + /* 47*/ "Morid, traidores...\n", +}; diff --git a/src/files/lang/pal-final/depoE.c b/src/files/lang/pal-final/depoE.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-final/depoE.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-final/depoJ.c b/src/files/lang/pal-final/depoJ.c new file mode 100644 index 000000000..4830724b0 --- /dev/null +++ b/src/files/lang/pal-final/depoJ.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the operation of any recording equipment. Locate it and shut it down.\n\n|Objective Two: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - De-activate Laser Grid Systems\n\nAn examination of the power grid of the G5 building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly softly, Joanna.\n\n|Objective One: - Record Meeting\n\nThe Eye-Spy device is an excellent way to record the meeting without alerting the De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 building. If we can obtain it it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside and you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable Damping Field Generator\n", + /* 10*/ "De-activate Laser Grid Systems\n", + /* 11*/ "Photograph Meeting Conspirators\n", + /* 12*/ "Retrieve Dr Caroll Backup From Safe\n", + /* 13*/ "Exit Building\n", + /* 14*/ "Obtain Alpha Keycard\n", + /* 15*/ "Guards\n", + /* 16*/ "Level 1 Keycard\n", + /* 17*/ "Guards Keycard\n", + /* 18*/ "Picked up Guards Keycard.\n", + /* 19*/ "Obtain Alpha Keycard\n", + /* 20*/ "Guards\n", + /* 21*/ "Level 2 Keycard\n", + /* 22*/ "Guards Keycard\n", + /* 23*/ "Picked up Guards Keycard.\n", + /* 24*/ "Mission Critical Object Destroyed\n", + /* 25*/ "Damping Field Generator Shut Down\n", + /* 26*/ "Generator Cannot Be Restarted\n", + /* 27*/ "Laser Grid Unit Shut Down\n", + /* 28*/ "Laser Grid Unit Activated\n", + /* 29*/ "All Laser Grid Systems Shut Down\n", + /* 30*/ "Obtain Dat Tape\n", + /* 31*/ "Dr Carolls\n", + /* 32*/ "Backup Disk\n", + /* 33*/ "Backup Disk\n", + /* 34*/ "Picked up Backup Disc\n", + /* 35*/ "Door Decoder Attached To Access Pad\n", + /* 36*/ "Initiating Cracking Routines\n", + /* 37*/ "Door Decoder Finished - Door Unlocked\n", + /* 38*/ "INTRUDER ALERT - all security to the safe\n", + /* 39*/ "Door Decoder Placed Correctly\n", + /* 40*/ "Door Decoder Incorrectly Positioned\n", + /* 41*/ "Conspirators Have Been Alerted\n", + /* 42*/ "Alarm Activated\n", + /* 43*/ "Alarm Deactivated\n", + /* 44*/ "Safe Door Is Locked\n", + /* 45*/ "Door Decoder attached\n", + /* 46*/ "Obtain Door Exploder\n", + /* 47*/ "Dr Carolls\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder\n", + /* 51*/ "Objectives Incomplete - MISSION FAILED\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications Bug Placed Correctly\n", + /* 54*/ "Communications Bug Placed Incorrectly\n", + /* 55*/ "Obtain Eye Spy\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Eye Spy\n", + /* 58*/ "An Eye Spy\n", + /* 59*/ "Picked up an Eye Spy\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "I can't go any further, but the Eye-Spy can.\n", + /* 62*/ "A safe that big will be heavily encrypted.\nThe decoder will take longer than usual.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission Critical Object Destroyed\n", + /* 65*/ "Stand back Joanna, we'll create your escape\nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator\n", + /* 71*/ "EyeSpy Has Been Destroyed - Abort Mission\n", + /* 72*/ "We've recovered the sapient from Carrington and altered its programming. It no longer has a personality, so there will be no further incidents.", + /* 73*/ "This will reduce its efficency. My team will have to take it to the core themselves. This will endanger them. You should have anticipated that the sapient might develop a troublesome moral code.", + /* 74*/ "No-one could have predicted that! And I resent being singled out for blame! What about him?", + /* 75*/ "The President turned down your request for the loan of the Pelagic 2?", + /* 76*/ "Could it be you over-estimated your influence over him?", + /* 77*/ "No! Perhaps I underestimated his resolve. We have a contingency plan ready to go, and will move as soon as the presidential entourage arrives at the airbase. All I need from the President is a tissue sample.", + /* 78*/ "Ha! Assuming you don't get any interference. If Carrington has pieced together enough of this he will have called for reinforcements.", + /* 79*/ "There will be no outside help for Mr. Carrington. The technology you gave us is installed in Nevada and fully operational. We can intercept any craft they use.", + /* 80*/ "Then the devices we gave you are working correctly? Good. Because we believe that anything which does not work correctly should be destroyed. Consider that as you follow your 'back-up plans'.", + /* 81*/ "Agent Dark reporting in! Prepare to receive a download of the meeting data. Priority request for an Institute Support Team to protect the President before he goes to Alaska.", + /* 82*/ "No time for that now, Agent Dark. There's been a development during radio silence. The craft carrying those 'friends' I was talking about was shot down over Nevada. The weapon responsible was fired from Area 51; that's where the survivors and debris will have been taken. You're to prep for immediate despatch when you return here. Carrington out.", + /* 83*/ "Area 51? But what about the President?", +}; diff --git a/src/files/lang/pal-final/depoP.c b/src/files/lang/pal-final/depoP.c new file mode 100644 index 000000000..7fad8ee86 --- /dev/null +++ b/src/files/lang/pal-final/depoP.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Disable Damping Field Generator\n\nA device in the car garage section of the building is preventing the transmission of any information recorded by the CamSpy. Once shut down, the CamSpy can relay any captured recordings back to HQ.\n\n|Objective Two: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Three: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Four: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Five: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 1*/ "G5 BUILDING\n", + /* 2*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Deactivate Laser Grid Systems\n\nAn examination of the power grid of the G5 Building indicates a network of laser grids. These grids are placed specifically to deny a route into the meeting room, but if you can turn them off, the way is clear.\n\n|Objective Two: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Three: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Four: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 3*/ "|Background - \n\nOnce inside G5 Headquarters, proceed into the heart of the building where the meeting should be taking place. Obtain a visual record of the meeting and get out as quickly as possible.\n\n|Carrington - \n\nThe G5 Building has an integrated alarm system. Watch out for any guards who see you, as they're sure to try and activate it. This will alert the conspirators, who will almost certainly not go ahead with the meeting under such circumstances. Softly, softly, Joanna.\n\n|Objective One: - Holograph Meeting Conspirators\n\nThe CamSpy device is an excellent way to record the meeting without alerting De Vries and the other conspirators.\n\n|Objective Two: - Retrieve Backup From Safe\n\nDr. Caroll informed Daniel of a backup personality that is stored in a safe in the G5 Building. If we can obtain it, it would mean that we could restore the personality to Dr. Caroll at a later date.\n\n|Objective Three: - Exit Building\n\nDestroy the blocked-up door to create your exit. If you remember which level of the fire escape is outside, you may save yourself some time.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disable damping field generator\n", + /* 10*/ "Deactivate laser grid systems\n", + /* 11*/ "Holograph meeting conspirators\n", + /* 12*/ "Retrieve Dr. Caroll backup from safe\n", + /* 13*/ "Exit building\n", + /* 14*/ "Obtain alpha key card.\n", + /* 15*/ "Guard's\n", + /* 16*/ "Level 1 key card\n", + /* 17*/ "Guard's key card\n", + /* 18*/ "Picked up guard's key card.\n", + /* 19*/ "Obtain alpha key card.\n", + /* 20*/ "Guard's\n", + /* 21*/ "Level 2 key card\n", + /* 22*/ "Guard's key card\n", + /* 23*/ "Picked up guard's key card.\n", + /* 24*/ "Mission critical object destroyed.\n", + /* 25*/ "Damping field generator shut down.\n", + /* 26*/ "Generator cannot be restarted.\n", + /* 27*/ "Laser grid unit shut down.\n", + /* 28*/ "Laser grid unit activated.\n", + /* 29*/ "All laser grid systems shut down.\n", + /* 30*/ "Obtain DAT tape.\n", + /* 31*/ "Dr. Caroll's\n", + /* 32*/ "Backup disk\n", + /* 33*/ "Backup disk\n", + /* 34*/ "Picked up backup disk.\n", + /* 35*/ "Door Decoder attached to access pad.\n", + /* 36*/ "Initiating cracking routines.\n", + /* 37*/ "Door Decoder finished - door unlocked.\n", + /* 38*/ "INTRUDER ALERT - all security to the vault.\n", + /* 39*/ "Door Decoder placed correctly.\n", + /* 40*/ "Door Decoder incorrectly positioned.\n", + /* 41*/ "Conspirators have been alerted.\n", + /* 42*/ "Alarm activated.\n", + /* 43*/ "Alarm deactivated.\n", + /* 44*/ "Safe door is locked.\n", + /* 45*/ "Door Decoder attached.\n", + /* 46*/ "Obtain Door Exploder.\n", + /* 47*/ "Dr. Caroll's\n", + /* 48*/ "Door Exploder\n", + /* 49*/ "Door Exploder\n", + /* 50*/ "Picked up Door Exploder.\n", + /* 51*/ "Objectives incomplete - MISSION FAILED.\n", + /* 52*/ "MISSION SUCCESSFUL\n", + /* 53*/ "Communications bug placed correctly.\n", + /* 54*/ "Communications bug placed incorrectly.\n", + /* 55*/ "Obtain CamSpy.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "CamSpy\n", + /* 58*/ "A CamSpy\n", + /* 59*/ "Picked up a CamSpy.\n", + /* 60*/ "There's no way through while those \nlasers are active.\n", + /* 61*/ "That must be the meeting room up ahead. \nTime to use the CamSpy.\n", + /* 62*/ "The safe's heavily encrypted. \nThe decoder's gonna take a little longer.\n", + /* 63*/ "Time to leave! Let's get to the door I set \nup earlier.\n", + /* 64*/ "Mission critical object destroyed.\n", + /* 65*/ "Stand back, Joanna. We'll create your escape \nroute.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Picked up Detonator.\n", + /* 71*/ "CamSpy has been destroyed - abort mission.\n", + /* 72*/ "We've recovered the sapient from Carrington \nand altered its programming. It no longer \nhas a personality, so there will be no \nfurther incidents.\n", + /* 73*/ "This will reduce its efficiency. My team will \nhave to take it to the core themselves. This \nwill endanger them. You should have \nanticipated that the sapient might develop \na troublesome moral code.\n", + /* 74*/ "No one could have predicted that! And I \nresent being singled out for blame! \nWhat about him?\n", + /* 75*/ "The President turned down your request for \nthe loan of the Pelagic II?\n", + /* 76*/ "Could it be you overestimated your \ninfluence over him?\n", + /* 77*/ "No! Perhaps I underestimated his resolve. \nWe have a contingency plan ready to go, \nand we will move as soon as the Presidential \nentourage arrives at the air base. All I \nneed from the President is a tissue sample.\n", + /* 78*/ "Ha! Assuming you don't get any interference. \nIf Carrington has pieced together enough of \nthis, he will have called for reinforcements.\n", + /* 79*/ "There will be no outside help for \nMr. Carrington. The technology you gave us \nis installed in Nevada and fully operational. \nWe can intercept any craft they use.\n", + /* 80*/ "Then the devices we gave you are working \ncorrectly? Good. Because we believe \nanything which does not work correctly \nshould be destroyed. Consider that as you \nfollow your 'backup plans.'\n", + /* 81*/ "Agent Dark reporting in! Prepare to \nreceive a download of the meeting data. \nPriority request for an Institute Support \nTeam to protect the President before he \ngoes to Alaska.\n", + /* 82*/ "No time for that now, Agent Dark. There's \nbeen a development during radio silence. \nThe craft carrying those 'friends' I was \ntalking about was shot down over Nevada. \nThe weapon responsible was fired from \nArea 51... that's where the survivors and \ndebris will have been taken. You're to \nprep for immediate dispatch when you \nreturn here. Carrington out.\n", + /* 83*/ "Area 51? But what about the President?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_f.c b/src/files/lang/pal-final/depo_str_f.c new file mode 100644 index 000000000..815834afe --- /dev/null +++ b/src/files/lang/pal-final/depo_str_f.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver le champ d'isolement\n\nUn appareil dans la zone du garage de l'immeuble empêche tout système d'enregistrement de fonctionner. Une fois coupée, la Camspy pourra transmettre les données au QG.\n\n|Objectif 2: - Désactiver les systèmes de grilles laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 3: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 4: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 5: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 1*/ "IMMEUBLE G5\n", + /* 2*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Désactiver les systèmes de grille laser\n\nUn examen du tableau énergétique du bâtiment G5 indique la présence d'un réseau de grilles laser. Celles-ci sont placées pour barrer la route vers la salle de réunion. Désactivez-les pour ouvrir la voie.\n\n|Objectif 2: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 3: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 4: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUne fois dans le QG du G5, rendez-vous au centre du bâtiment où la rencontre devrait avoir lieu. Obtenez une preuve visuelle de cette rencontre et partez le plus vite possible.\n\n|Carrington - \n\nL'immeuble G5 est protégé par un système d'alarme. Prenez garde à ne pas être repérée par les vigiles ou ils l'activeront, ce qui inciterait les conspirateurs à annuler leur rencontre. Procédez donc avec la plus grande prudence, Joanna.\n\n|Objectif 1: - Holographier les conspirateurs\n\nL'appareil CamSpy est un excellent moyen d'enregistrer la rencontre sans alerter De Vries ou les autres conspirateurs.\n\n|Objectif 2: - Récupérer la sauvegarde dans le coffre\n\nLe Dr. Caroll a informé Daniel de la présence d'une sauvegarde de sa personnalité gardée dans un coffre de l'immeuble G5. Si nous obtenons cette sauvegarde, la personnalité du Dr. Caroll pourra être restaurée ultérieurement.\n\n|Objectif 3: - Sortir de l'immeuble\n\nDétruisez la porte condamnée pour créer une sortie. Souvenez-vous du niveau extérieur de la sortie de secours pour gagner du temps.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Désactiver le champ d'isolement\n", + /* 10*/ "Désactiver les systèmes de grilles laser\n", + /* 11*/ "Holographier les conspirateurs\n", + /* 12*/ "Récupérer la sauvegarde dans le coffre\n", + /* 13*/ "Sortir de l'immeuble\n", + /* 14*/ "Obtenir carte alpha.\n", + /* 15*/ "Garde: \n", + /* 16*/ "Carte Niveau 1\n", + /* 17*/ "Carte du garde\n", + /* 18*/ "Carte du garde obtenue.\n", + /* 19*/ "Obtenir carte alpha.\n", + /* 20*/ "Garde: \n", + /* 21*/ "Carte Niveau 2\n", + /* 22*/ "Carte du garde\n", + /* 23*/ "Carte du garde obtenue.\n", + /* 24*/ "Objet crucial détruit.\n", + /* 25*/ "Générateur champ d'isolement coupé.\n", + /* 26*/ "Générateur ne peut être rallumé.\n", + /* 27*/ "Unité grilles laser coupée.\n", + /* 28*/ "Unité grilles laser activée.\n", + /* 29*/ "Tous systèmes grilles laser coupés.\n", + /* 30*/ "Obtenir cassette DAT.\n", + /* 31*/ "Dr. Caroll: \n", + /* 32*/ "Disque sauvegarde\n", + /* 33*/ "Disque sauvegarde\n", + /* 34*/ "Disque sauvegarde obtenu.\n", + /* 35*/ "Décodeur porte fixé sur panneau d'accès.\n", + /* 36*/ "Commandes piratages lancées.\n", + /* 37*/ "Décodage porte achevé - porte déverrouillée.\n", + /* 38*/ "ALERTE INTRUSION - sécurité dans l'abri.\n", + /* 39*/ "Décodeur porte placé correctement.\n", + /* 40*/ "Décodeur porte mal placé.\n", + /* 41*/ "Conspirateurs alertés.\n", + /* 42*/ "Alarme activée.\n", + /* 43*/ "Alarme désactivée.\n", + /* 44*/ "Porte du coffre fermée.\n", + /* 45*/ "Décodeur porte fixé.\n", + /* 46*/ "Obtenir explosif porte.\n", + /* 47*/ "Dr. Caroll: \n", + /* 48*/ "Explosif porte\n", + /* 49*/ "Explosif porte\n", + /* 50*/ "Explosif porte obtenu.\n", + /* 51*/ "Objectifs incomplets - MISSION ECHOUEE.\n", + /* 52*/ "MISSION ACCOMPLIE\n", + /* 53*/ "Mouchard placé correctement.\n", + /* 54*/ "Mouchard mal placé.\n", + /* 55*/ "Obtenir CamSpy.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "CamSpy\n", + /* 58*/ "Une CamSpy\n", + /* 59*/ "CamSpy obtenue.\n", + /* 60*/ "C'est impossible de passer avec tous \nces lasers activés.\n", + /* 61*/ "La salle de réunion doit être droit devant. \nIl est temps d'utiliser la CamSpy.\n", + /* 62*/ "La combinaison du coffre est très complexe. \nLe décodeur va mettre plus de temps.\n", + /* 63*/ "Il faut partir maintenant! Je retourne vite à \nla porte de tout à l'heure.\n", + /* 64*/ "Objet crucial détruit.\n", + /* 65*/ "Reculez, Joanna. Nous allons vous ouvrir \nun passage.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Détonateur\n", + /* 69*/ "Détonateur\n", + /* 70*/ "Détonateur obtenue.\n", + /* 71*/ "CamSpy détruite - abandonner la mission.\n", + /* 72*/ "Nous avons récupéré le Sapiens chez Carrington \net changé son programme. Il n'a plus de \npersonnalité. Cela évitera de futurs \nincidents.\n", + /* 73*/ "Cela réduira son efficacité. Mon équipe le \nmènera au centre. Ils prendront donc \ndes risques inutiles. Vous auriez dû \nprévoir ce développement de conscience chez \nle Sapiens.\n", + /* 74*/ "Comment prévoir une chose pareille?! \nEt pourquoi suis-je la seule à porter \nle chapeau? Et lui alors?\n", + /* 75*/ "Le Président a-t-il refusé votre demande \nde prêt du Pelagic II?\n", + /* 76*/ "Pensiez-vous avoir tant d'influence \nsur lui?\n", + /* 77*/ "Non! J'ai peut-être sous-estimé son côté \nintègre. Mais nous avons un plan de \nsecours. Nous agirons dès que l'équipe \nprésidentielle arrivera à la base aérienne. \nJe n'ai besoin que d'un échantillon de la \npeau du Président.\n", + /* 78*/ "Pff! En admettant que vous ne fassiez pas \ntout foirer. Si Carrington en apprend \nsuffisamment, il appellera des renforts.\n", + /* 79*/ "Mr. Carrington ne bénéficiera d'aucune aide \nextérieure. L'équipement que vous nous \navez offert est installé au Nevada et est \nopérationnel. Nous pourrons ainsi intercepter \nleurs appareils.\n", + /* 80*/ "Notre dispositif fonctionne donc \ncorrectement? Bien. Notre philosophie \nest de détruire tout ce qui ne veut pas \nfonctionner. Souvenez-vous-en pendant \nl'exécution de votre 'plan de secours.'\n", + /* 81*/ "Agent Dark au rapport! Préparez-vous à \nrecevoir les données de la réunion. \nDemande prioritaire d'une équipe de \nl'Institut pour protéger le Président \navant son départ pour l'Alaska.\n", + /* 82*/ "Nous n'avons pas le temps, Agent Dark. \nIl y a du nouveau depuis le silence \nradio. L'appareil transportant les \n'amis' dont je parlais plus tôt a été \nabattu au-dessus du Nevada. Le tir \nprovenait du Secteur 51, là où les \nrescapés et les débris ont dû être amenés. \nRevenez au poste et préparez-vous \npour un départ imminent. \nCarrington, terminé.\n", + /* 83*/ "Secteur 51? Et le Président alors?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_g.c b/src/files/lang/pal-final/depo_str_g.c new file mode 100644 index 000000000..268459faf --- /dev/null +++ b/src/files/lang/pal-final/depo_str_g.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Setzen Sie den Generator außer Kraft!\n\nAuf dem Garagen-Deck des Gebäudes befindet sich eine Vorrichtung, die den Einsatz jeglicher Rekorder verhindert. Finden Sie das Gerät und schalten Sie es ab! Anschließend sollte der CamSpy die Daten ohne Probleme übermitteln können.\n\n|2. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|3. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|4. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|5. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 1*/ "G5-BUILDING\n", + /* 2*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Deaktivieren Sie das Laser-Netz!\n\nEine Untersuchung der Spannungsfelder im G5-Building hat ergeben, dass sich ein System von Laser-Netzen durch das ganze Gebäude zieht. Diese Netze wurden so platziert, dass ein direkter Zugang zum Meeting-Raum verhindert wird. Wenn Sie das System abschalten können, ist der Weg frei.\n\n|2. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|3. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|4. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nSobald Sie in das G5-Hauptquartier eingedrungen sind, müssen Sie ins Herz des Gebäudes vordringen. Dort sollte das Meeting stattfinden. Erstellen Sie eine visuelle Aufzeichnung des Meetings, und verlassen Sie anschließend sofort das Gebäude!\n\n|Carrington - \n\nDas G5-Building verfügt über ein integriertes Alarmsystem. Achten Sie auf Patrouillen. Wenn Sie gesehen werden, wird der Alarm sofort ausgelöst. In diesem Fall würden die Verschwörer das Meeting sofort abbrechen. Also, Joanna, gehen Sie sanft vor! Es ist ja nicht Ihr erstes Mal...\n\n|1. Ziel: - Holografieren Sie die Verschwörer!\n\nDer CamSpy ist die perfekte Lösung, De Vries und die anderen Verschwörer bei der 'Arbeit' zu ertappen, ohne viel Aufsehen zu erregen.\n\n|2. Ziel: - Stehlen Sie die Sicherheitskopie aus dem Safe!\n\nDr. Caroll hat Daniel informiert, dass in einem Safe eine Kopie seiner Persönlichkeit aufbewahrt wird. Bringen Sie uns diese Kopie, damit wir Dr. Carolls Persönlichkeit zu einem späteren Zeitpunkt wiederherstellen können.\n\n|3. Ziel: - Verlassen Sie das Gebäude!\n\nZerstören Sie die blockierte Tür, um einen Fluchtweg zu schaffen. Sie sollten sich daran erinnern, wo sich die Feuerleiter befindet. Dadurch erhalten Sie einen nicht zu unterschätzenden Zeitvorteil.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Setzen Sie den Generator außer Kraft!\n", + /* 10*/ "Deaktivieren Sie das Laser-Netz!\n", + /* 11*/ "Holografieren Sie die Verschwörer!\n", + /* 12*/ "Stehlen Sie die Sicherheitskopie!\n", + /* 13*/ "Verlassen Sie das Gebäude!\n", + /* 14*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 15*/ "Level 1 Schlüsselkarte\n", + /* 16*/ "der Wache\n", + /* 17*/ "Schlüsselkarte der Wache\n", + /* 18*/ "Schlüsselkarte der Wache aufgenommen\n", + /* 19*/ "Erlangen Sie die Alpha-Schlüsselkarte!\n", + /* 20*/ "Level 2 Schlüsselkarte\n", + /* 21*/ "der Wache\n", + /* 22*/ "Schlüsselkarte der Wache\n", + /* 23*/ "Schlüsselkarte der Wache aufgenommen\n", + /* 24*/ "Wichtiges Objekt wurde zerstört.\n", + /* 25*/ "Generator wurde abgeschaltet.\n", + /* 26*/ "Der Generator kann nicht wieder gestartet werden.\n", + /* 27*/ "Laser-Netz wurde deaktiviert.\n", + /* 28*/ "Laser-Netz wurde aktiviert.\n", + /* 29*/ "Das gesamte Laser-Netz wurde deaktiviert.\n", + /* 30*/ "Erlangen Sie das DAT-Tape.\n", + /* 31*/ "Dr. Carolls\n", + /* 32*/ "Sicherheitskopie\n", + /* 33*/ "Sicherheitskopie\n", + /* 34*/ "Sicherheitskopie aufgenommen\n", + /* 35*/ "Tür-Decoder wurde an der Konsole angebracht.\n", + /* 36*/ "Crack-Routine wurde initiiert.\n", + /* 37*/ "Crack-Vorgang abgeschlossen - Tür wurde entriegelt.\n", + /* 38*/ "ZUTRITTSVERLETZUNG - Alle Sicherheitskräfte sofort ins Kellergeschoß!\n", + /* 39*/ "Tür-Decoder wurde korrekt platziert.\n", + /* 40*/ "Tür-Decoder wurde nicht korrekt platziert.\n", + /* 41*/ "Die Verschwörer wurden alarmiert.\n", + /* 42*/ "Alarm wurde aktiviert.\n", + /* 43*/ "Alarm wurde deaktiviert.\n", + /* 44*/ "Die Safetür ist versperrt.\n", + /* 45*/ "Tür-Decoder wurde angebracht.\n", + /* 46*/ "Erlangen Sie den Sprengsatz.\n", + /* 47*/ "Dr. Carolls\n", + /* 48*/ "Sprengsatz\n", + /* 49*/ "Sprengsatz\n", + /* 50*/ "Sprengsatz aufgenommen\n", + /* 51*/ "Zielerreichung unvollständig - MISSION FEHLGESCHLAGEN!\n", + /* 52*/ "MISSION ERFOLGREICH\n", + /* 53*/ "Sender wurde korrekt platziert.\n", + /* 54*/ "Sender wurde nicht korrekt platziert.\n", + /* 55*/ "Erlangen Sie den CamSpy.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "CamSpy\n", + /* 58*/ "Ein CamSpy\n", + /* 59*/ "CamSpy aufgenommen\n", + /* 60*/ "Es gibt hier kein Weiterkommen, solange die \nLaser aktiv sind.\n", + /* 61*/ "Weiter vorne muss der Meeting-Raum sein.\nZeit für den CamSpy.\n", + /* 62*/ "Der Safe-Code ist sehr ausgeklügelt.\nDer Decoder wird etwas mehr Zeit benötigen.\n", + /* 63*/ "Zeit zu gehen! Ich muss zu der Tür, die ich \nvorhin 'präpariert' habe.\n", + /* 64*/ "Wichtiges Objekt wurde zerstört.\n", + /* 65*/ "Halten Sie Abstand, Joanna. Wir schaffen Ihnen einen\nFluchtweg.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonator\n", + /* 69*/ "Detonator\n", + /* 70*/ "Detonator aufgenommen\n", + /* 71*/ "Der CamSpy wurde zerstört - Brechen Sie die Mission ab!\n", + /* 72*/ "Wir haben uns den Sapienten von Carrington zurückgeholt \nund sein Programm verändert. Es hat nun keine \nPersönlichkeit mehr. Daher sind auch keine \nweiteren Zwischenfälle mehr zu befürchten.\n", + /* 73*/ "Aber dadurch wird seine Effizienz reduziert. Mein Team muss \nnun selbst ins Zentrum vordringen. Sie \ngeraten dadurch in Gefahr! Sie hätten \nvoraussehen müssen, dass der Sapient \nin der Lage ist, Moral zu entwickeln.\n", + /* 74*/ "Niemand hätte das voraussehen können! Und ich \nlehne es ab, dafür verantwortlich gemacht zu \nwerden! Was ist mit ihm?\n", + /* 75*/ "Der Präsident hat die Anfrage nach der Pelagic II \nstrikt abgelehnt?\n", + /* 76*/ "Kann es sein, dass Sie Ihren Einfluss auf ihn \nein wenig überschätzt haben?\n", + /* 77*/ "Nein! Ich habe nur seine Entschlossenheit unterschätzt. \nWir haben einen Notfallplan parat, der in Kraft tritt, \nsobald die Air Force One am Stützpunkt landet. \nAlles, was ich brauche, ist eine Gewebeprobe des \nPräsidenten.\n", + /* 78*/ "Ha! Vorausgesetzt, es gibt keine Störmaßnahmen. \nWenn Carrington eins und eins zusammengezählt hat, \ndann ist Verstärkung schon unterwegs.\n", + /* 79*/ "Carrington wird keine Hilfe von außen erhalten. \nDie Technologie, die Sie uns zur Verfügung gestellt \nhaben, wurde in Nevada installiert und ist einsatzbereit. \nDamit können wir jedes Flugzeug vom Himmel holen.\n", + /* 80*/ "Die Vorrichtung arbeitet also einwandfrei? Gut. Wir \nsind der Meinung, dass alles, was nicht korrekt arbeitet, \nzerstört werden muss. Ziehen Sie das in Betracht, \nwenn Sie daran gehen, Ihren 'Plan B' in die Tat \numzusetzen.\n", + /* 81*/ "Hier ist Agent Dark! Bereiten Sie sich auf die \nÜbertragung der Aufzeichnung vor. Ich beantrage ein \nUnterstützungsteam des Instituts zum Schutz des \nPräsidenten, noch bevor er nach Alaska abreist. \nDiese Anfrage hat die Priorität Eins.\n", + /* 82*/ "Dafür ist nun keine Zeit, Agent Dark. Während \nder Funkstille haben wir neue Informationen erhalten. \nDas Flugzeug mit unseren 'Freunden', von denen ich \ngesprochen habe, wurde über Nevada abgeschossen. \nDie dafür verantwortliche Waffe wurde von der \nArea 51 abgefeuert; dorthin wurden vermutlich auch \nÜberlebende und die Wrackteile gebracht. Bereiten \nSie sich für die sofortige Abreise vor, wenn Sie \nwieder hier sind. Carrington over und out.\n", + /* 83*/ "Area 51? Aber was geschieht mit dem Präsidenten?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_i.c b/src/files/lang/pal-final/depo_str_i.c new file mode 100644 index 000000000..0480b5605 --- /dev/null +++ b/src/files/lang/pal-final/depo_str_i.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva generatore segnali di disturbo\n\nNel garage dell'edificio è collocato un dispositivo che impedisce la trasmissione di qualsiasi informazione registrata dalla TeleSpia. Una volta disattivato, la TeleSpia potrà trasmettere i dati al Quartier Generale!\n\n|Obiettivo 2: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 3: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 4: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 5: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Disattiva il sistema delle griglie laser\n\nL'analisi dell'impianto elettrico dell'Edificio G5 evidenzia una fitta rete di griglie laser collocate in modo da impedire l'accesso ai passaggi che portano alla sala riunioni. Se riesci a disattivarlo avrai via libera.\n\n|Obiettivo 2: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 3: - Prendi copia backup dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 4: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUna volta raggiunto il complesso G5 procedi verso il cuore dell'edificio dove dovrebbe aver luogo la riunione. Procurati la videoregistrazione dell'incontro e poi esci di lì il più in fretta possibile.\n\n|Carrington:\n\nL'edificio G5 ha un sistema d'allarme integrato. Fa attenzione alle guardie che ti vedono, poiché cercheranno certamente di attivarlo. Se ci riescono, i cospiratori interromperanno quasi sicuramente la riunione. Vacci piano, Joanna, molto, molto piano!\n\n|Obiettivo 1: - Olografa i cospiratori in riunione\n\nLa TeleSpia è uno strumento eccellente per registrare indisturbata la riunione, senza attirare l'attenzione di Cassandra De Vries e degli altri cospiratori.\n\n|Obiettivo 2: - Prendi copia dalla cassaforte\n\nIl Dr. Caroll ha comunicato a Daniel che nella cassaforte dell'Edificio G5 si troverebbe una copia di backup del suo cervello. Se riuscissimo ad impadronircene, potremmo ridare al Dr. Caroll il suo cervello originario in un secondo momento.\n\n|Obiettivo 3: - Esci dall'edificio\n\nDistruggi le porte bloccate per crearti una via di fuga. Se riesci a ricordare dove l'uscita antincendio dà sull'esterno, te la caverai più in fretta.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Disattiva generatore segnali\n", + /* 10*/ "Disattiva il sistema delle griglie laser\n", + /* 11*/ "Olografa i cospiratori in riunione\n", + /* 12*/ "Prendi copia backup dalla cassaforte\n", + /* 13*/ "Esci dall'edificio\n", + /* 14*/ "Procurati chiave alfa\n", + /* 15*/ "Guardia:\n", + /* 16*/ "Chiave 1° piano\n", + /* 17*/ "Chiave della guardia\n", + /* 18*/ "Presa chiave della guardia\n", + /* 19*/ "Procurati chiave alfa\n", + /* 20*/ "Guardia:\n", + /* 21*/ "Chiave 2° piano\n", + /* 22*/ "Chiave della guardia\n", + /* 23*/ "Presa chiave della guardia\n", + /* 24*/ "Distrutto strumento essenziale alla missione\n", + /* 25*/ "Disattivato generatore segnali di disturbo\n", + /* 26*/ "Impossibile riaccendere il generatore\n", + /* 27*/ "Disattivata unità griglie laser\n", + /* 28*/ "Attivata unità griglie laser\n", + /* 29*/ "Disattivati tutti i sistemi griglie laser\n", + /* 30*/ "Procurati nastro DAT\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco di backup \n", + /* 33*/ "Disco di backup\n", + /* 34*/ "Preso disco di backup.\n", + /* 35*/ "Decodificatore porta in azione\n", + /* 36*/ "Decodifica in corso...\n", + /* 37*/ "Decodificatore ha finito: porta aperta.\n", + /* 38*/ "ALLARME INTRUSIONE - Sicurezza all'erta\n", + /* 39*/ "Decodificatore piazzato correttamente\n", + /* 40*/ "Decodificatore in posizione errata\n", + /* 41*/ "Allertati i cospiratori\n", + /* 42*/ "Attivato l'allarme\n", + /* 43*/ "Disattivato l'allarme\n", + /* 44*/ "Bloccata porta di sicurezza \n", + /* 45*/ "Decodificatore in azione\n", + /* 46*/ "Procurati Esplodiporta\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Esplodiporta\n", + /* 49*/ "Esplodiporta\n", + /* 50*/ "Preso Esplodiporta\n", + /* 51*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 52*/ "MISSIONE COMPIUTA\n", + /* 53*/ "Cimice piazzata correttamente\n", + /* 54*/ "Cimice in posizione errata\n", + /* 55*/ "Procurati TeleSpia\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "TeleSpia\n", + /* 58*/ "TeleSpia\n", + /* 59*/ "Presa TeleSpia\n", + /* 60*/ "È impossibile passare finché sono \nattivi quei laser.\n", + /* 61*/ "Quella dev'essere la sala riunioni. \nÈ ora di usare la TeleSpia.\n", + /* 62*/ "La cassaforte è criptata. \nIl decodificatore ci metterà un po'.\n", + /* 63*/ "È ora di andare! Passiamo per la porta che ho \npredisposto!\n", + /* 64*/ "Distrutto strumento essenziale alla missione.\n", + /* 65*/ "Sta indietro, Joanna! Apriremo un varco \ndi fuga!\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonatore\n", + /* 69*/ "Detonatore\n", + /* 70*/ "Preso detonatore.\n", + /* 71*/ "Distrutta la TeleSpia - Missione fallita\n", + /* 72*/ "Abbiamo recuperato il Sapiente da Carrington \ne ne abbiamo alterato la programmazione. Ora \nha perso la sua personalità, così non \navremo più spiacevoli sorprese.\n", + /* 73*/ "Questo ridurrà la sua efficienza. La mia \nsquadra dovrà portarlo subito al centro, \nma ciò li metterà in pericolo. Avrebbe \ndovuto comunicarci che il Sapiente avrebbe \nsviluppato un codice morale problematico!\n", + /* 74*/ "Nessuno poteva prevedere una cosa simile! \nE non ammetto che mi vengano mossi dei \nrimproveri. E lui allora?\n", + /* 75*/ "Il Presidente ha rifiutato la sua richiesta \ndi finanziamento per il Pelagic II?\n", + /* 76*/ "Forse ha sopravvalutato la sua \ninfluenza su di lui!\n", + /* 77*/ "No! Avrò sottovalutato la sua determinazione, \npiuttosto! Abbiamo un piano contingente pronto \na partire non appena l'entourage del Presidente \narriva alla base aerea. Tutto ciò che mi serve \ndal Presidente è un campione di tessuto.\n", + /* 78*/ "Sì... salvo imprevisti! Se Carrington \nha raccolto elementi sufficienti, a \nquest'ora avrà già chiamato i rinforzi!\n", + /* 79*/ "Non ci saranno aiuti esterni per Carrington. \nLa tecnologia che ci ha dato è stata \ninstallata in Nevada ed è già operativa: \nsiamo in grado di intercettare qualsiasi \nmezzo utilizzino.\n", + /* 80*/ "Ciò significa che il dispositivo che vi \nabbiamo fornito funziona? Bene! Perfetto! \nRiteniamo infatti che tutto ciò che non \nfunziona correttamente debba essere eliminato. \nLo tenga bene a mente durante l'attuazione \ndel suo 'piano di emergenza'!\n", + /* 81*/ "Agente Dark a rapporto! Preparatevi a \nricevere e scaricare i dati della riunione. \nRichiesta prioritaria di una squadra di \nsupporto dell'istituto che protegga il \nPresidente prima del suo viaggio in Alaska.\n", + /* 82*/ "Ora non c'è tempo per questo, Agent Dark! \nCi sono stati degli sviluppi durante il \nsilenzio radio. Il mezzo con a bordo quegli \n'amici' di cui ti parlavo è stato abbattuto \nin Nevada. Il colpo è stato sparato dall'\nArea 51, dove saranno stati portati anche i \nsopravvissuti e i resti del velivolo. Dovrai \nprepararti a partire immediatamente appena \nrientri. Passo e chiudo! \n", + /* 83*/ "L'Area 51? E che ne sarà del Presidente?\n", +}; diff --git a/src/files/lang/pal-final/depo_str_s.c b/src/files/lang/pal-final/depo_str_s.c new file mode 100644 index 000000000..e7b81a6ea --- /dev/null +++ b/src/files/lang/pal-final/depo_str_s.c @@ -0,0 +1,88 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar el Generador de Campo Húmedo\n\nSe trata de un dispositivo en el garaje del edificio evita la transmisión de cualquier información grabada por la Cámara Espía. Una vez apagado, la Cámara Espía puede enviar cualquier grabación al Cuartel General.\n\n|Objetivo Dos: - Desactivar los Sistemas de la Rejilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Tres: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Cuatro: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cinco: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 1*/ "EDIFICIO G5\n", + /* 2*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Desactivar los Sistemas de la Parrilla Láser\n\nUn examen del suministro energético del Edificio G5 indica una red de rejillas láser. Estas rejillas están colocadas específicamente para evitar una posible ruta hacia la sala de reuniones, pero si puedes apagarlas, el camino estará limpio.\n\n|Objetivo Dos- Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Tres: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Cuatro: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna vez dentro del Cuartel General de G5, procede hasta el corazón del edificio donde una reunión tendrá lugar. Obtén una grabación visual de la reunión y sal tan pronto como te sea posible.\n\n|Carrington - \n\nEl Edificio G5 tiene un sistema integrado de alarmas. Cuidado con cualquier guarda que te vea, ya que seguro que intentarán activarlas. Esto alertará a los conspiradores, que casi seguro que no tendrán la reunión bajo esas circunstancias. Suavemente, Joanna, suavemente...\n\n|Objetivo Uno: - Holografiar la Reunión de los Conspiradores\n\nEl dispositivo de la Cámara Espía es un excelente modo de grabar la reunión sin alertar a De Vries y los otros conspiradores.\n\n|Objetivo Dos: - Recuperar Copia de Seguridad de la Caja Fuerte\n\nEl Dr. Caroll informó a Daniel de una copia de su personalidad que está guardada en una caja fuerte en el Edificio G5. Si nos hacemos con ella, podremos restaurar la personalidad del Dr. Caroll posteriormente.\n\n|Objetivo Tres: - Salir del Edificio\n\nDestruye la puerta bloqueada para crear una salida. Si recuerdas en qué nivel estaba fuera la salida de incendios, te ahorrarás bastante tiempo.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Desactivar generador de campo húmedo\n", + /* 10*/ "Desactivar sistemas de rejilla láser\n", + /* 11*/ "Holografiar reunión de conspiradores\n", + /* 12*/ "Recuperar copia del Dr. Caroll\n", + /* 13*/ "Salir del edificio\n", + /* 14*/ "Obtén la llave magnética alfa.\n", + /* 15*/ "Guarda:\n", + /* 16*/ "Llave de Nivel 1\n", + /* 17*/ "Llave Magnética del Guarda\n", + /* 18*/ "Llave Magnética del Guarda obtenida\n", + /* 19*/ "Obtén la llave magnética alfa.\n", + /* 20*/ "Guarda:\n", + /* 21*/ "Llave de Nivel 2\n", + /* 22*/ "Llave Magnética del Guarda\n", + /* 23*/ "Llave Magnética del Guarda obtenida\n", + /* 24*/ "Objeto crítico de la misión destruido.\n", + /* 25*/ "Generador de campo húmedo apagado.\n", + /* 26*/ "El generador no puede reiniciarse.\n", + /* 27*/ "Unidad de rejilla láser apagada.\n", + /* 28*/ "Unidad de rejilla láser activada.\n", + /* 29*/ "Todos los sistemas de rejilla láser apagados.\n", + /* 30*/ "Obtén la cinta de Datos.\n", + /* 31*/ "Dr. Caroll:\n", + /* 32*/ "Disco de seguridad\n", + /* 33*/ "Disco de seguridad\n", + /* 34*/ "Disco de seguridad obtenido.\n", + /* 35*/ "Decodificador de puertas colocado en el acceso.\n", + /* 36*/ "Iniciando rutinas de apertura.\n", + /* 37*/ "El decodificador de puertas terminó: puerta abierta.\n", + /* 38*/ "ALERTA DE INTRUSOS: toda la seguridad a la caja.\n", + /* 39*/ "Decodificador de puertas colocado correctamente.\n", + /* 40*/ "Decodificador de puertas colocado incorrectamente.\n", + /* 41*/ "Los conspiradores han sido alertados.\n", + /* 42*/ "Alarma activada.\n", + /* 43*/ "Alarma desactivada.\n", + /* 44*/ "La puerta de la caja fuerte está cerrada.\n", + /* 45*/ "Decodificador de puertas colocado.\n", + /* 46*/ "Obtén el Revienta-puertas.\n", + /* 47*/ "Dr. Caroll:\n", + /* 48*/ "Revienta-puertas\n", + /* 49*/ "Revienta-puertas\n", + /* 50*/ "Revienta-puertas obtenido.\n", + /* 51*/ "Objetivos incompletos: MISIÓN FALLADA.\n", + /* 52*/ "MISIÓN CONSEGUIDA\n", + /* 53*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 54*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 55*/ "Obtén la Cámara Espía.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Cámara Espía\n", + /* 58*/ "Una Camára Espía\n", + /* 59*/ "Cámara Espía obtenida.\n", + /* 60*/ "No hay ningún camino posible mientras \nesos láseres estén activos.\n", + /* 61*/ "Eso de ahí delante debe ser la sala de reuniones. \nHora de usar la Cámara Espía.\n", + /* 62*/ "La caja fuerte está fuertemente encriptada. \nEl decodificador va a tomarse su tiempo.\n", + /* 63*/ "¡Hora de irse! Vamos a la puerta que creé \nantes.\n", + /* 64*/ "Objeto crítico de la misión destruido.\n", + /* 65*/ "Aparta, Joanna. Crearemos tu ruta \nde escape.\n", + /* 66*/ "\n", + /* 67*/ "\n", + /* 68*/ "Detonador\n", + /* 69*/ "Detonador\n", + /* 70*/ "Detonador obtenido.\n", + /* 71*/ "La Cámara Espía ha sido destruida: abortar misión.\n", + /* 72*/ "Hemos recuperado la IA de manos de Carrington \ny alterado su programación. Nunca más tendrá \npersonalidad, así no podrá haber posibles \nfuturos incidentes.\n", + /* 73*/ "Esto reducirá su eficiencia. Mi equipo tendrá \nque llevarlo al núcleo por sí mismo. Esto les \npondrá en peligro. Debías haber anticipado \nque la IA podría desarrollar un problemático \ncódigo moral.\n", + /* 74*/ "¡Nadie podría haber predecido eso! ¡Y me \nmolesta que me echen la culpa de ello! \n¿Qué pasa con él?\n", + /* 75*/ "¿El Presidente no ha admitido tu petición \nde préstamo del Pelagic II?\n", + /* 76*/ "¿No podría ser que hayas sobreestimado \ntu influencia sobre él?\n", + /* 77*/ "¡No! Quizá haya menospreciado su resolución. \nTenemos un plan de contigencia preparado, \ny comenzará tan pronto como el séquito presidencial\nllegue a la base aérea. Todo lo que necesito del \nPresidente es una muestra de tejido cutáneo.\n", + /* 78*/ "¡Ja! Eso asumiendo que no sufras interferencias. \nSi Carrington ha recabado suficientes piezas de \nesto, seguro que avisará a los refuerzos.\n", + /* 79*/ "No habrá ayuda exterior para el Sr. Carrington. \nLa tecnología que nos diste está instalada en \nNevada y es totalmente operativa. \nPodemos interceptar cualquier nave que usen.\n", + /* 80*/ "¿Entonces los dispositivos que os dimos funcionan \ncorrectamente? Bien. Porque nosotros creemos que \ncualquier cosa que no funcione correctamente debe \nser destruida. Tenlo en cuenta para tus 'planes \nalternativos'.\n", + /* 81*/ "¡Agente Dark informando! Preparaos para \nrecibir los datos de la reunión. \nPetición prioritaria de un Equipo de Soporte \ndel Instituto para proteger al Presidente \nantes de que vaya a Alaska.\n", + /* 82*/ "No hay tiempo para eso ahora, Agente Dark. Se \nha progresado durante el silencio de radio. \nLa nave que llevaba a esos 'amigos' de los \nque te hablaba, fue derribada sobre Nevada. \nEl arma responsable fue disparada desde el\nÁrea 51... Allí es donde los supervivientes \ny los restos del siniestro han sido llevados. \nDebes prepararte para ser enviada de inmediato \nen cuanto regreses aquí. Carrington fuera.\n", + /* 83*/ "¿Al Área 51? ¿Pero qué pasa con el Presidente?\n", +}; diff --git a/src/files/lang/pal-final/destE.c b/src/files/lang/pal-final/destE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/destJ.c b/src/files/lang/pal-final/destJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/destP.c b/src/files/lang/pal-final/destP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/destP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_f.c b/src/files/lang/pal-final/dest_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_g.c b/src/files/lang/pal-final/dest_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_i.c b/src/files/lang/pal-final/dest_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dest_str_s.c b/src/files/lang/pal-final/dest_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/dest_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/dishE.c b/src/files/lang/pal-final/dishE.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishE.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dishJ.c b/src/files/lang/pal-final/dishJ.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishJ.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dishP.c b/src/files/lang/pal-final/dishP.c new file mode 100644 index 000000000..17198de02 --- /dev/null +++ b/src/files/lang/pal-final/dishP.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Collect Night Vision from table to begin.\n", + /* 9*/ "Activate the Night Vision.\nLocate the light switch.\nTurn the lights back on.\n", + /* 10*/ "Collect Data Uplink from table to begin.\n", + /* 11*/ "Stand next to the terminal and use the Uplink.\n", + /* 12*/ "You need to be holding the Data Uplink.\n", + /* 13*/ "Connection established...\n", + /* 14*/ "Terminal has been successfully hacked.\n", + /* 15*/ "Connection broken - too far from PC.\n", + /* 16*/ "Collect ECM Mine from table to begin.\n", + /* 17*/ "Locate Hub and throw ECM Mine onto Hub.\n", + /* 18*/ "ECM Mine has been placed incorrectly.\n", + /* 19*/ "ECM Mine has been placed correctly.\n", + /* 20*/ "Collect CamSpy from table to begin.\n", + /* 21*/ "Locate Info Room PC and holograph it.\n", + /* 22*/ "Info Room PC successfully holographed.\n", + /* 23*/ "Lights have been reactivated.\n", + /* 24*/ "Collect Door Decoder from table to begin.\n", + /* 25*/ "Use Decoder on door pad to unlock it.\n", + /* 26*/ "You need to be holding the Door Decoder.\n", + /* 27*/ "Decoder attached. Initiating cracking routines...\n", + /* 28*/ "Decoding complete. Door has been unlocked.\n", + /* 29*/ "Collect Tracker from table to begin.\n", + /* 30*/ "Locate IR Scanner using Tracker.\n", + /* 31*/ "IR Scanner has been successfully located.\n", + /* 32*/ "Collect IR Scanner from table to begin.\n", + /* 33*/ "Locate secret door using IR Scanner.\n", + /* 34*/ "Secret door has been successfully located.\n", + /* 35*/ "Collect X-Ray Scanner from table to begin.\n", + /* 36*/ "Find hidden switches to shut down laser grid.\n", + /* 37*/ "All laser grids have been deactivated.\n", + /* 38*/ "Collect Disguise from table to begin.\n", + /* 39*/ "Fool someone into giving you Cloaking Device.\n", + /* 40*/ "Cloaking Device successfully retrieved.\n", + /* 41*/ "Laser Grid 1 has been deactivated.\n", + /* 42*/ "Laser Grid 2 has been deactivated.\n", + /* 43*/ "I'm here to pick up the equipment.\n", + /* 44*/ "Go away, Joanna. You're not fooling anybody!\n", + /* 45*/ "Here you go. Don't drop it now.\n", + /* 46*/ "Cloaking Device has been secured successfully.\n", + /* 47*/ "You're meant to use the Disguise, remember?\n", + /* 48*/ "You'll have to do better than that, Joanna.\n", + /* 49*/ "Joanna, where did you spring from?\n", + /* 50*/ "You have been detected by the camera.\n", + /* 51*/ "Collect Cloaking Device from table to begin.\n", + /* 52*/ "Use Cloaking Device and locate Carrington.\n", + /* 53*/ "I think we can safely say your training\nis now complete!\n", + /* 54*/ "Mission complete - Device Training passed!\n", + /* 55*/ "Mission failed - you have been detected.\n", + /* 56*/ "Select the Uplink.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Data Uplink and release A Button.\n", + /* 57*/ "Select the CamSpy.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight CamSpy and release A Button.\n", + /* 58*/ "Select the Night Vision.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Night Vision and release A Button.\n", + /* 59*/ "Select the Door Decoder.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Door Decoder and release A Button.\n", + /* 60*/ "Select the X-Ray Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight X-Ray Scanner and release A Button.\n", + /* 61*/ "Select the Disguise.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Disguise and release A Button.\n", + /* 62*/ "Select the IR Scanner.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight IR Scanner and release A Button.\n", + /* 63*/ "Select the Tracker.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Tracker and release A Button.\n", + /* 64*/ "Select the Cloaking Device.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight Device and release A Button.\n", + /* 65*/ "Select the ECM Mine.\n- Hold A Button.\n- Use Control Stick to change selection.\n- Highlight ECM Mine and release A Button.\n", + /* 66*/ "Joanna, it's good to see you.\n", + /* 67*/ "Come with me.\nI'll walk you round the training rooms.\n", + /* 68*/ "The information center is through this door.\n", + /* 69*/ "In here we have the device lab.\n", + /* 70*/ "This leads to the simulant training room.\n", + /* 71*/ "This is the firing range, Jo.\n", + /* 72*/ "This corridor leads down to the hangar.\n", + /* 73*/ "HOVERCRATE\nPress B Button next to Hovcrate to grab it...\n", + /* 74*/ "Press B Button when crate grabbed to release it.\n", + /* 75*/ "HOVERBIKE\nDouble tap B Button next to Hovbike to ride it...\n", + /* 76*/ "Double tap B Button when on Hovbike to dismount.\n", + /* 77*/ "OPENING DOORS\nPress B Button next to door to open it.\n", + /* 78*/ "B Button will also activate any object nearby.\n", + /* 79*/ "ELEVATORS\nPress B Button next to door to call elevator.\n", + /* 80*/ "Cannot exit while training is in progress.\n", + /* 81*/ "Switch Code 1 has been obtained.\n", + /* 82*/ "Switch Code 2 has been obtained.\n", + /* 83*/ "Switch Code 3 has been obtained.\n", + /* 84*/ "Switch Code 4 has been obtained.\n", + /* 85*/ "LOOK UP\n- Press Down C Button to look up at the target.\n", + /* 86*/ "LOOK DOWN\n- Press Up C Button to look down at the target.\n", + /* 87*/ "Holoprogram 2 has been completed successfully.\n", + /* 88*/ "Holoprogram 4 has been completed successfully.\n", + /* 89*/ "Holoprogram 5 has been completed successfully.\n", + /* 90*/ "Guard has been successfully disarmed.\n", + /* 91*/ "Guard has been successfully knocked out.\n", + /* 92*/ "Disarm this live target if you can.\n", + /* 93*/ "Knock out this target - stealth is the key.\n", + /* 94*/ "And the final guard...\n", + /* 95*/ "DUCK\n- Hold R Button, then press Down C Button to duck.\n", + /* 96*/ "CROUCH\n- When ducking, hold R Button, then press Down C Button to duck.\n", + /* 97*/ "Holoprogram 3 has been completed successfully.\n", + /* 98*/ "Activate all the switches.\n", + /* 99*/ "Activate all of the wall switches.\n- Be quick, as they will quickly reset.\n", + /*100*/ "Get the access codes by examining terminals.\n- Use the codes on the wall terminals.\n", + /*101*/ "Code 1 has been obtained.\n", + /*102*/ "Code 2 has been obtained.\n", + /*103*/ "Code 3 has been obtained.\n", + /*104*/ "Code 4 has been obtained.\n", + /*105*/ "Training failed - you must face forward.\n", + /*106*/ "Holoprogram 1 has been completed successfully.\n", + /*107*/ "Unarmed combat - knock out the target.\n- Press Z Button repeatedly to punch.\n", + /*108*/ "Now try against a moving target...\n", + /*109*/ "And finally against a target that fights back.\n", + /*110*/ "Defeat all enemies without getting hit.\n", + /*111*/ "Training failed - you have been hit.\n", + /*112*/ "Holoprogram 6 has been completed successfully.\n", + /*113*/ "Holoprogram 7 has been completed successfully.\n", + /*114*/ "TERMINALS\n- Press B Button next to terminal to use it.\n", + /*115*/ "Now activate the red terminals on the wall.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, I'll leave you to prepare for the mission.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Human (Female)\n", + /*127*/ "23 years 2 months\n", + /*128*/ "|CI File #027 -\n\nTraining Status: Complete\nTraining Grade: A++\nActive Status: Assigned\n\n|Profile -\n\nHighly trained but inexperienced. Reactions superb. Proficient with a variety of weapons. Very competent all-round agent. Highest recorded training scores resulted in the creation of a new class of training grade. The embodiment of the Carrington Institute's ideal agent, hence the call sign 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Human (Male)\n", + /*131*/ "28 years 5 months\n", + /*132*/ "|CI File #009 -\n\nTraining Status: Complete\nTraining Grade: A+\nActive Status: Undercover\n\n|Profile -\n\nOur most experienced undercover agent. Highly accurate with his chosen weapon (a Magnum Revolver). Perfectly suited to undercover missions. Less suited to out-and-out combat. Before Joanna Dark, he held the honor of having the highest recorded training scores.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Human (Male)\n", + /*135*/ "62 years 8 months\n", + /*136*/ "|CI File #000 -\n\nTraining Status: N/A\nTraining Grade: N/A\nActive Status: N/A\n\n|Profile -\n\nIntelligent patriarchal scientist/entrepreneur, and founder of the Carrington Institute. Plans all missions carried out by his agents and runs each operation direct from a link in his office. Strange taste in clothes.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Human (Female)\n", + /*139*/ "39 years ? months\n", + /*140*/ "|Analyst note -\n\nThe head of dataDyne Corp. Addicted to power; dislikes being anybody's underling. Hates it when she loses the initiative. Is prepared to do extremely unscrupulous things in order to get ahead of her competition, to whit Daniel Carrington, whom she loathes.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Human (Male)\n", + /*143*/ "46 years ? months\n", + /*144*/ "|Analyst note -\n\nHead of the National Security Agency. Has a friendship of sorts with Cassandra De Vries, although it operates more like a partnership of interest. He will tend to do what Cassandra says, possibly because although he has a dominant personality, it is not as dominant as hers. Figurehead for some of the rogue elements in the NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "The Caroll Sapient (AI)\n", + /*147*/ "6 months\n", + /*148*/ "|Profile -\n\nAn artificial intelligence created by the dataDyne Corp. with an emphasis on language skills and code breaking. Fortunately, he has morals, and due to his formidable level of intelligence, has guessed some of dataDyne's future plans. The voice is highly precise and educated and simulates the character of an academic.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Male)\n", + /*151*/ "320 years\n", + /*152*/ "|Profile -\n\nAn alien from the Maian race. He is a 'Protector' (bodyguard) for the Maian ambassador who travels to Earth at Daniel Carrington's request. Protectors are trained to excel in the use of an assortment of weaponry. Elvis is a terraphile, finding Earth and everything about it fascinating.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Human (Male)\n", + /*155*/ "Late 20's\n", + /*156*/ "|Profile -\n\nA striking blonde human male. Very tall, wears white clothing, usually a raincoat. Appears to be masterminding the conspiracy in which Cassandra and Trent are involved. Little else is known.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disguised)\n", + /*159*/ "unknown\n", + /*160*/ "|Updated Profile -\n\nThis is a Skedar warrior lurking within a holographic projection of a striking blonde young human male in his late 20's. The oral modulation unit gives the Skedar a precise, persuasive, and intelligent voice. It is a propaganda and manipulation tool for the Skedar, and an unusually subtle one.\n", + /*161*/ "The U.S. President\n", + /*162*/ "Human (Male)\n", + /*163*/ "50 years\n", + /*164*/ "|Profile -\n\nA highly educated, shrewd African-American who is trying to do what is right but is surrounded by people like Trent Easton. He believes he has Trent under control after refusing the request for the loan of the Pelagic II to the dataDyne Corp. Perceived as being easily led by the majority of political commentators, which is perhaps unfair.\n", + /*165*/ "Maians\n", + /*166*/ "The Maians are the race of aliens that have come to be known on Earth as 'Greys.' They have been monitoring Earth for a long time - several centuries - and are benevolent towards mankind, sensing great potential in the human race. Their contact on Earth is Daniel Carrington. A formal political contact has yet to be made.\n", + /*167*/ "Skedar Warrior\n", + /*168*/ "The Skedar are a warlike alien race who have fought the Maians for centuries and have only recently agreed to a ceasefire. They tend to use mechanized armatures to walk about and fight in, since they are in actual fact smaller, snakelike creatures. Very aggressive - they have made war a religion - and are extremely devout.\n", + /*169*/ "Background\n", + /*170*/ "Millions of years ago, a huge alien ship of immense power was scuttled in the Pacific Ocean. It was equipped with an untried and vastly dangerous weapon: the weak nuclear force de-coupler, which could in theory cause the fundamental bonds between molecules to fail. So that watching eyes would believe in the destruction of the ship, a message pod was despatched to the home galaxy, and vital components of the ship's drives were destroyed in the star system it had chosen as a hiding place. For this ship was a Cetan, a massive, sentient alien creature.\n\nAnother extraterrestrial race, the Maians, encountered life on Earth in 2000 BC. They saw great potential, but decided to let the primitive human race develop without their interference.\n\nThe Maians encountered the Skedar near Delta Eridanus in 1650 AD (Earth date), and the resultant skirmish soon blossomed into all-out war. Only after hundreds of years of fighting did an uneasy peace develop, and even then Skedar fanatics persistently tested the boundaries of this peace with terrorist activities. Fortunately, the Maians refused to be drawn.\n\nMankind, too, continued to be a cause of concern to the Maians, and they watched with disappointment as Earth suffered more and more crises brought on by the rise of technology and 'outside context situations.' They feared that announcing their presence would only precipitate further wars on the planet, and quietly decided to continue their observation until the race became more mature.\n\nDaniel Carrington jumped the gun in 1985 AD by contacting a Maian ship in orbit above Earth. He put forward a plan that would help both parties, resulting in accelerated contact between Humans and Maians. Having agreed that his plan was sound, and finding him to be a person of integrity, the Maians allowed Carrington to release their technology into the public domain through his considerable Research and Development holdings.\n\nThen, in 2006 AD, Skedar fanatics stumbled across the Cetan message pod. They immediately began to scout Earth in a particularly heavy-handed way, abducting people and mutilating animals in an attempt to determine the location of the lost battle cruiser. In time, their tests inevitably led them to its resting place on the bed of the Pacific Ocean; however, in order to actually reach it, they would need the help of the natives.\n\nPerforming their own study of Earth, the Skedar came up with a shortlist of companies possessing the resources to help them recover the sunken ship. At the top of the list was the dataDyne Corporation. They contacted the company head, Cassandra De Vries, and presented her with a deal that sounded too good to be true - which, of course, it was. In return for helping to raise 'their' ship from the ocean floor, the Skedar promised to supply dataDyne with enough alien technology to become the biggest corporation on the face of the planet. All that dataDyne had to do was build an AI unit with language and code-breaking abilities, which was tricky, but certainly within their means. Work commenced on the project immediately.\n\nCassandra De Vries approached NSA head Trent Easton with the details of the plan, but his attempts to get Presidential approval for the loan of a deep-sea research vessel were repeatedly turned down. There was no way that the Skedar or dataDyne could steal the vessel without triggering the wrath of the U.S. Government, so over time they settled instead on a far more sinister plan of replacing the President with a clone that they could control. Of course, this also promised extra rewards for Trent and Cassandra when the Skedar operation was consigned to history.\n\nHowever, they would not be given much time to gloat. The Skedar fanatics' ultimate plan was to test the weak nuclear force de-coupler on Earth before wiping the Maians out of existence, and both Cassandra and Trent remained blind to the possibility of being double-crossed, so enamored were they with the visions of power and luxury that lay ahead.\n\nBut dataDyne had unwittingly created something that could see all too clearly the danger within this multilayered conspiracy: the sapient AI built to crack the core access codes of the Cetan ship. When it expressed concern over the mission for which it had been designed, Cassandra's response was to order its personality removed. Clearly, it was thinking too much. In desperation, and in a move which would make or break a great deal more than dataDyne's 'deal' with the Skedar, the sapient adopted the pseudonym Dr. Caroll and contacted the Carrington Institute with a plea for help...\n", + /*171*/ "The Story\n", + /*172*/ "Untried agent Joanna Dark is assigned a mission involving the extraction of a scientist from the high security research area beneath the dataDyne skyscraper. Upon rendezvous, she is surprised to discover that this 'Dr. Caroll' is an AI created by dataDyne itself - but she continues with her task of escorting him/it to a place of safety. When the alarm is raised, Joanna has to fight her way up the tower to reach the helipad and the dropship which presents her only means of escape.\n\nIn response to this incursion, dataDyne make Daniel Carrington a personal target and take him hostage two days later at his private villa. They demand the return of the AI - their 'property' - in exchange for his life. Unknown to them, the AI is already at the villa, where it was being questioned by Carrington on dataDyne's future plans. Joanna eventually rescues the head of the Institute but is unable to prevent dataDyne from taking back Dr. Caroll. However, Carrington has heard enough to take the drastic step of summoning a team of Maian specialists to Earth.\n\nJoanna is dispatched to Chicago to spy on a conspirators' meeting at the G5 Building, a front for the dataDyne Corp. It is here that she learns of the involvement of Trent Easton, head of the NSA, and of the strange Nordic men that appear to be in control of the whole deadly scheme. Once Trent discloses the plan to usurp the Presidential position, Jo radios the news back to base - only to find that another, more urgent task requires her attention before further action can be taken against Trent.\n\nThe Maian specialists have been intercepted and brought down by the conspirators, with survivors and wreckage alike being transported to Area 51 in Nevada. Briefed to rescue any survivors and retrieve their equipment, Joanna is dropped in to link up with another Carrington Institute agent. Upon breaking into the medlab, Joanna finally discovers the Institute's secret - their allies are Maians, the alien race commonly known as Greys. The particular Maian she manages to rescue goes by the name of Elvis. He was a bodyguard for the Ambassador who had been flying in at the head of the specialist team.\n\nHaving aided the remnants of the Maian delegation, Joanna can return to the matter of the President and dataDyne's designs against him. She poses as a member of the President's entourage to gain access to the air base where Air Force One is stationed, and successfully conceals herself aboard the plane. As soon as it's airborne, Trent and the cloaked Skedar make their move - but Joanna is there to stop them. She rushes the President to a safety capsule while a team of Trent's men scour the aircraft, intent on dragging the hapless politician aboard the Skedar UFO now docked to AF1 via an umbilical. Jo weakens the umbilical but is unable to break it, and ultimately Elvis makes a last-ditch attempt to sever the cord by crashing into it at high speed. All three craft plummet towards the Alaskan wilderness, and the AF1 escape pod is launched.\n\nComing around, Jo tries to report in but finds her communications jammed by a transmission from the Skedar craft. She sets off through the snow to find the President and Elvis, encountering teams of cloaked Skedar out searching for her, the President, Elvis, and the President's belongings. She tracks one group back to the downed Skedar ship, where she discovers a clone of the President: quickly she destroys it, shuts down the jamming device and calls in the cavalry. The Skedar are thwarted once more, the President is safe, and Trent's incompetence has earned him a nasty fate at the hands of his 'allies.'\n\nBut it's not over. Throwing caution to the wind, dataDyne and the Skedar steal the Government's deep-sea research vessel 'Pelagic II' and head out to the Pacific crash site. Joanna and Elvis leave to disrupt activity on board the ship and find out what lies at the heart of the grand Skedar plan. After crippling the vessel's diving operations and recalling the submersible, they head down to the ocean floor, where they get their first sight of the downed Cetan battle cruiser. A portal made by the Skedar offers them access to the ship, where they stumble across a dead Skedar warrior... Clearly the assault team didn't have it all their own way. Fighting off the remaining vengeful Skedar and avoiding the Cetans themselves, Joanna and Elvis make their way down to the core of the ship, where they find the AI that was once Dr. Caroll. They manage to restore his personality, whereupon he urges Joanna and Elvis to leave the ship so that he may destroy it for good.\n\nLater, back at the Carrington Institute, Joanna is about to leave for a Presidential reception at the White House when all hell breaks loose. The Skedar assault team survivors are venting their anger on those they deem responsible for their failure to recover the Cetan ship. Joanna dashes around the Institute, helping CI employees to reach the safety of the hangars, as the Skedar launch attacks on various parts of the building: the majority of the employees make good their escape while Joanna holds the fort, but eventually she is knocked unconscious and taken prisoner.\n\nShe comes to in a holding cell on board the Skedar assault ship, with only Cassandra De Vries for company. In a shocking move, the dataDyne CEO willingly gives her life to create the distraction necessary for Joanna to break out. Battling her way through the ship, Jo eventually manages to locate and disable the docking bay shields, allowing Elvis to bring in a few friends for the long-awaited shooting party.\n\nThe captured assault ship enters orbit above the Skedar Battle Shrine, which shocks Elvis as the Maians never managed to find this Skedar 'holiest of holies' throughout the long years of interracial war. If the Shrine were destroyed, Skedar morale would be dealt a fatal blow and true peace would finally replace the uneasy ceasefire. So Jo sets her sights on the Skedar leader, the high priest of the Battle Shrine, while Elvis returns to the assault ship in order to summon the Maian fleet.\n\nIn the wake of the climactic battle, the temple lies devastated with Elvis calling for a lull in the bombardment so that he can find Joanna. She is alive, held under a pile of rubble by the last tenacious Skedar that caught up during the last few seconds of her escape bid. Elvis quickly offers her a gun to convince the Skedar to let go, and with the job finally done, the Skedar Shrine and morale both in ruins and the conspiracy dealt a mortal blow to the heart, the two of them depart for orbit.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "The monolithic corporation that dataDyne has become started off as an AI systems programming business. When it became apparent that much of their income came from their work as a defense contractor for the U.S. military, a young and forward-looking manager called Cassandra De Vries started pushing for deals with weapons manufacturers, while ignoring offers from Daniel Carrington and the Institute for collaboration on quantum computing and AI research. After the third armament company was bought by dataDyne, profits became astronomical. Within a month of the receipt of a government contract for weapons development, Cassandra De Vries was CEO. A significant portion of corporation profits were redirected into AI research, with excellent results.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Briefly dismissed as a crackpot inventor, Daniel Carrington was the first to release anti-gravity technology to the world. Revenues from this and related development helped set up the Carrington Institute, ostensibly a technology think tank situated in a remote part of the continental U.S. In actual fact, the Institute is also a training ground for agents who are sent out into the world to keep track of technological development around the globe, for reasons best known to Daniel Carrington himself.\n", + /*177*/ "Description\n- A tiny remote camera for stealthy exploration. Equipped for spectroscopic holography. Opens doors by projecting a human-sized pulse of heat.\n\nTraining Instructions\n- Holograph the hacker's terminal next door in the Info room.\n\nOperation\n- Press the Z Button to take a holograph. Pressing the B Button will open any doors in the way. Hold down the R Button to look around.\n", + /*178*/ "Description\n- Enhances any visible light to produce an image of the surrounding area. Also highlights life forms. Overloads in normal light conditons, 'whiting out' the display.\n\nTraining Instructions\n- Head into the darkness, find the light switch, and activate it to turn the lights back on.\n\nOperation\n- Select the Night Vision from your inventory to activate it. Reselect to deactivate.\n", + /*179*/ "Description\n\n- Stand-alone code-breaking device. Attaches to the control panel and sifts through the possible combinations until the lock is opened.\n\nTraining Instructions\n- Find the pad by the locked door and use the Door Decoder on it to unlock the door.\n\nOperation\n- Stand next to the door pad and press the B Button while holding the Door Decoder to use it.\n", + /*180*/ "Description\n\n- Used to look through otherwise solid walls and objects. Can see things that the Night Vision and IR Scanner cannot.\n\nTraining Instructions\n- With the X-Ray Scanner on, search for the two hidden switches and activate them to turn off the laser grid.\n\nOperation\n- Select the X-Ray Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*181*/ "Description\n\n- Allay suspicion by the use of a disguise. But, always be alert for the possibility of being unmasked by a quick-witted enemy.\n\nTraining Instructions\n- Grimshaw has a Cloaking Device waiting to be serviced. Head next door and 'acquire' it from him.\n\nOperation\n- To wear the disguise, simply select it from your inventory.\n", + /*182*/ "Description\n\n- Translates thermal data into visible images. Can be used in darkness and will also reveal anomalies such as hidden doors and weak wall sections.\n\nTraining Instructions\n- Turning on the IR Scanner, find the hidden door and open it.\n\nOperation\n- Select the IR Scanner from your inventory to activate it. Reselect to deactivate.\n", + /*183*/ "Description\n- Locates a particular object on a HUD radar map. Shows the relative bearing and distance.\n\nTraining Instructions\n- Activate the Tracker and follow the radar signature to retrieve the item.\n\nOperation\n- Selecting the Tracker from your inventory will activate it. Reselect to deactivate.\n", + /*184*/ "Description\n- Disrupts the visible spectrum of light around the wearer, creating an almost perfect chameleonlike effect. This field is disrupted when the wearer fires.\n\nTraining Instructions\n- Activate the Cloaking Device and head to Carrington's office to surprise him!\n\nOperation\n- Selecting the Cloaking Device from your inventory will activate it. Reselect to deactivate.\n", + /*185*/ "Description\n- Emits a constantly shifting signal designed to jam any electronic communications device. Must be placed on the object to be effective.\n\nTraining Instructions\n- Throw the ECM Mine onto the lighting hub located through the secret door.\n\nOperation\n- Press the Z Button to throw the mine. Hold down the R Button and move the Control Stick to fine-tune your aim before throwing.\n", + /*186*/ "Description\n- Provides a link from the field agent to the Institute hackers back at HQ, who can then download data or crack electronic locks remotely.\n\nTraining Instructions\n- Use the Data Uplink to hack the terminal in the corner, unlocking a secret door.\n\nOperation\n- Stand next to the terminal and press the B Button when holding Data Uplink.\n", + /*187*/ "FIRING\n Press Z Button to fire gun.\n", + /*188*/ "AUTO RELOAD\n Release Z Button when out of ammo.\n", + /*189*/ "MANUAL RELOAD\n Press B Button to reload early if magazine not full.\n", + /*190*/ "Aiming: Hold down R Button to enter Aim mode.\n", + /*191*/ "Use Control Stick to move aiming sight.\n", + /*192*/ "AUTO FIRE\n Hold Z Button to repeatedly fire automatically.\n", + /*193*/ "ALTER AIM\n Press Up C Button or Down C Button to move sight up/down.\n", + /*194*/ "ZOOM\n Hold R Button to enter Zoom mode.\n", + /*195*/ "FAST FIRE\n Press Z Button quickly to fire faster.\n", + /*196*/ "Carrington Institute\0|Base of operations\n", + /*197*/ "Lucerne Tower\0|Global headquarters\n", + /*198*/ "Laboratory Basement\0|Underground research labs\n", + /*199*/ "Carrington Villa\0|Private coastal retreat\n", + /*200*/ "Chicago\0|Backstreets of the city\n", + /*201*/ "G5 Building\0|dataDyne front corporation\n", + /*202*/ "Area 51\0|Near Groom Dry Lake, Nevada\n", + /*203*/ "Alaskan Air Base\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|The President's airplane\n", + /*205*/ "Crash Site\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Specialized deep-sea research ship\n", + /*207*/ "Cetan Ship\0|The most alien environment on Earth\n", + /*208*/ "Skedar Assault Ship\0|Troop carrying spacecraft\n", + /*209*/ "Skedar Homeworld\0|The planet of the Battle Shrine\n", + /*210*/ "Jumpship\0|Agile troop craft\n", + /*211*/ "HoverCrate\0|Gravity-negation device\n", + /*212*/ "HoverBike\0|Low altitude vehicle\n", + /*213*/ "Cleaning Hovbot\0|Your helpful buddy\n", + /*214*/ "Hovercopter\0|Urban AG gunship\n", + /*215*/ "G5 Robot\0|Urban combat droid\n", + /*216*/ "A51 Interceptor\0|Robotic air interceptor\n", + /*217*/ "Maian Vessel\0|Scout and patrol vessel\n", + /*218*/ "Skedar Shuttle\0|Alien troop dropship\n", + /*219*/ "The Institute building comprises many different areas: offices and laboratories, workshops and hangars. It is quite isolated from the outside world, which helps keep the operations covert.\n", + /*220*/ "In the midst of the business district, the austere skyscraper of the dataDyne Corporation stands out from the surroundings.\n", + /*221*/ "These heavily guarded, well-hidden labs hold the key to dataDyne's future. Within them, techs work on top-secret projects aimed at putting dataDyne on the top of the heap.\n", + /*222*/ "Owned by the Institute, this secluded residence is used by Daniel Carrington as a retreat from the pressures of the Institute. As well as an observatory, it has a power generator and an extensive wine cellar.\n", + /*223*/ "A seedy, grimy part of the city of Chicago, now closed to ground traffic. It is here that the G5 Corporation has its headquarters.\n", + /*224*/ "Inside the G5 Building is a meeting room protected by anti-recording safeguards. This is the safest place for dataDyne to formulate confidential plans.\n", + /*225*/ "This section of the extensive facility known as Area 51 is based in the foothills around Groom Dry Lake. Exterior helipads and communication towers hint at the size of the complex beneath ground level.\n", + /*226*/ "One of a series of reinforced air bases available as staging posts for Air Force One. Typically, the air base is remote, in an inhospitable region, far away from prying eyes.\n", + /*227*/ "This particular Air Force One is optimized for cold climates, useful when it is based in the north of Alaska. The flight destination is Oslo, Norway.\n", + /*228*/ "In the rocky snow-covered landscape of the Arctic Circle, the wreckage of the stricken plane has come to rest.\n", + /*229*/ "Owned by the U.S. government, the Pelagic II is capable of staging deep-sea diving operations in all weather conditions. It is the only fully integrated ocean floor research vessel in the world.\n", + /*230*/ "A huge ship of alien construction that has lain on the ocean floor for millions of years.\n", + /*231*/ "An interplanetary assault ship that carries Skedar warriors to their war zones. Part of the much-reduced Skedar battle fleet.\n", + /*232*/ "A highly arid planet, racked by earthquakes, sandstorms, and hurricanes. It is part of a complex solar system that includes three suns.\n", + /*233*/ "A small, fast, highly maneuverable agent-deployment craft designed for use in urban areas. Can be either computer controlled or remote piloted. It has enough room inside for three to four agents, plus equipment.\n", + /*234*/ "An antigrav device designed to aid warehouse workers. It is attached to the side of a crate. When activated, the AG field lifts the crate and removes some of the inertia.\n", + /*235*/ "A low-altitude patrol bike. Uses a small AG unit to hover, then a small but powerful turbine with vectored thrust to move and provide directional control.\n", + /*236*/ "Keeps the place clean and tidy. Tends to have access to all areas of a building - agents are advised to leave such robots intact where possible, as they can unwittingly provide a means of ingress to sensitive zones.\n", + /*237*/ "An urban patrol and suppression vehicle. Two-man crew, armed with a vulcan cannon on the nose pod, and two wingtip-mounted dumbfire missile pods. Can be taken out with sustained gunfire or, preferably, one well-aimed rocket.\n", + /*238*/ "A combat robot designed for urban warfare. Uses an antigrav unit to hover; heavily armed and shielded. Often used to keep out unwanted visitors, due to the 'shoot first and don't ask questions later' programming.\n", + /*239*/ "A robotic variant of the HoverBike, with more powerful AG and turbine units; it can reach Mach 2 with ease and yet can cruise for hours at walking pace. Although quite well armed, it relies on maneuverability rather than shielding.\n", + /*240*/ "Designed to carry a single Maian pilot. A passenger would find themselves cramped - a human passenger even more so.\n", + /*241*/ "Capable of carrying ten fully armed and armored Skedar warriors to battle. Undetectable by conventional radar. It can broadcast powerful jamming waves over a considerable area - these disrupt communications as well as detection equipment.\n", + /*242*/ "Description\n- A good agent notices everything around him or her.\n\nTraining Instructions\n- Examine all of the objects by looking directly at them.\n\nOperation\n-Look up- Press the Down C Button\n-Look down- Press the Up C Button\n-Free Look- Hold down the R Button to enter Aim mode, and use the Control Stick to look.\n", + /*243*/ "Description\n- Sidestepping and strafing can get you out of trouble.\n\nTraining Instructions\n- Activate all of the switches in front. Be quick, though, as each switch will reset on a time limit.\n\nOperation\n- Sidestep left- Left C Button\n- Sidestep right- Right C Button\n\n", + /*244*/ "Description\n- Ducking and crouching can open up new areas for exploration.\n\nTraining Instructions\n- Work your way through the obstacles using the moves available to you. Activate the switches.\n\nOperation\n- Duck- Hold the R Button, then press the Down C Button.\n- Crouch- When ducking, hold the R Button, then press the Down C Button.\n- Get up- Tap the R Button.\n\n", + /*245*/ "Description\n- Fighting multiple opponents in hand-to-hand combat can be difficult.\n\nTraining Instructions\n- Knock out all enemies without getting hit.\n\nOperation\n- Punch - Press the Z Button repeatedly when unarmed to launch a flurry of punches.\n\n", + /*246*/ "Description\n- Disarming an enemy can get you a new weapon.\n\nTraining Instructions\n- Knock out/disarm all enemies without getting hit.\n\nOperation\n- Disarm - Hold the B Button, then press the Z Button to disarm an enemy.\n- Knockout Punch - Punch an unaware enemy from behind.\n", + /*247*/ "Description\n- Fighting multiple opponents in hand-to-hand combat.\n\nTraining Instructions\n- Beat all the unarmed enemies without getting hit.\n\n", + /*248*/ "Description\n- Fighting multiple opponents, both armed and unarmed.\n\nTraining Instructions\n- Beat all the armed enemies without getting hit.\n\n", + /*249*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*250*/ "Think about where you want to go before attempting the test. Set yourself up in a place that will require the least amount of movement between targets.\n", + /*251*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move through the test as fast as possible, try ducking only when you have to.\n", + /*252*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*253*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*254*/ "Don't hang around and wait to get hit, move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*255*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*256*/ "For greater precision and freedom when looking around, use the Aiming mode.\n", + /*257*/ "Sidestepping and strafing can get you out of trouble.\n", + /*258*/ "Ducking enables you to reach places normally inaccessible to you, but remember that you move quickest when standing upright. To move as fast as possible, try ducking only when you have to.\n", + /*259*/ "Attacking opponents from behind may be dishonorable, but doing so makes it easier to take them down. Only close to fighting distance when you have to, and be prepared to step back out of range when they attack you.\n", + /*260*/ "Only stay close long enough to grab the weapon. Back out of range of any retribution and use your new weapon.\n", + /*261*/ "Don't hang around and wait to get hit; move! Don't focus on one opponent; try to be aware of where all of them are. If you can't see all of them, move until you can.\n", + /*262*/ "Go for the armed opponents once you are confident of your hand-to-hand skills. Back away from the disarmed enemies and use their weapons on them before they get too close to you.\n", + /*263*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*264*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*265*/ "The CamSpy can be difficult to control, so take your time.\n", + /*266*/ "Useful in combat, but can cause problems when overloading.\n", + /*267*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*268*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*269*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*270*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*271*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*272*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you.\n", + /*273*/ "Always keep the target object in view when using the Data Uplink, and stay close to prevent the connection from being severed.\n", + /*274*/ "Be sure the mine will land in the correct place by getting as close as you can to the target. Adjust your aim using the C Buttons or the R Button Aiming mode.\n", + /*275*/ "The CamSpy is not invisible - enemies may spot it - so be careful when entering an inhabited area. Remember that the CamSpy will remain where you left it unless you pick it up.\n", + /*276*/ "Useful in combat, but can cause problems when overloading. Try to anticipate such situations and react before the enemy.\n", + /*277*/ "If you are having trouble attaching the Decoder, try standing closer to the target and facing it.\n", + /*278*/ "The Tracker only indicates direction and relative height; it doesn't display a map guiding you to the target. Pay attention to your surroundings, and be prepared to explore.\n", + /*279*/ "The visor narrows your peripheral vision, which can cause problems in combat. Be sure of your situation before you use it.\n", + /*280*/ "If you use this device at the wrong time, it could cost you your life, since it can prevent you from seeing anything beyond a certain distance. Use sparingly.\n", + /*281*/ "A disguise is not just the clothing, it is the manner of the person wearing it. Don't behave out of character for the person you are trying to be.\n", + /*282*/ "Preserve the supply of the Cloaking Device when there is no one around to observe you. Avoid firing unless absolutely necessary and until you are assured of the success of your attack.\n", + /*283*/ "The Falcon 2 is a very accurate handgun, so any error in this test is your own. The secondary mode is a pistol-whip and is, therefore, useless in a firing range.\n", + /*284*/ "To make better use of the accuracy of the Falcon 2, a scope has been attached to the pistol. As with the unmodified Falcon 2, the pistol-whip secondary mode is useless during the firing range test.\n", + /*285*/ "The silenced version of the Falcon 2 is an excellent stealth weapon, designed to give you the advantage of surprise over your opponents. Test your accuracy to ensure you never waste your chances.\n", + /*286*/ "The MagSec 4 has excellent shot power at the cost of accuracy, especially when used in the 3-round burst secondary mode. The only serious drawback to the weapon is a limited magazine size.\n", + /*287*/ "This is a typical Skedar weapon, brutal and powerful. By sacrificing some of the magazine, the shot can be charged up to give a devastating blast. The large ammo capacity is a bonus.\n", + /*288*/ "This versatile pistol gives two different delivery systems for the rounds it fires: a standard shot or an explosive round. Maian engineers managed to do this without compromising the energy usage of the weapon, though the fire rate is reduced.\n", + /*289*/ "The key to the DY357 is in knowing when to reload. A six-round magazine means that you must always be alert in a firefight. The weight of the handgun can be useful if you have to club someone with it.\n", + /*290*/ "Trent Easton is always looking for that extra edge, and this gun is no exception. The bullets are as special as the rest of the gun; they are designed to shatter inside opponents to take them down quickly.\n", + /*291*/ "A reliable and effective submachine gun, it is not difficult to see why this is the best-selling dataDyne weapon of the past two years even if the secondary mode is not taken into account. The target designate and lock-on system is excellent, and you should familiarize yourself with the complete operation of the weapon.\n", + /*292*/ "The Cyclone submachine gun was specifically designed NOT to be accurate, though it is worth your time practicing. It can put a lot of bullets out in a short time, however, and is an excellent suppression weapon because of it.\n", + /*293*/ "Maian flexibility in design has produced this submachine gun with an interesting secondary mode - a high-velocity bullet that can penetrate objects easily. The fire rate, as with the Phoenix, is reduced during the secondary mode; this is to prevent damage to the firing mechanism and barrel.\n", + /*294*/ "The RC-P120 fires a special mineral bullet that, coupled with a high fire rate and a huge magazine, makes this a perfect tool to be used against the Skedar, should the need arise. The bullets can be used to fuel a prototype Cloaking Device - the training has been altered to reflect this particular characteristic.\n", + /*295*/ "Not only can the gun fold up to resemble a laptop PC, but it can be deployed as a sentry gun in secondary mode to cover an escape route or protect a location.\n", + /*296*/ "This is the model that dataDyne successfully submitted to the U.S. military, though it has yet to be widely adopted. In keeping with the tendency of dataDyne to give people nasty surprises, the basic model assault rifle carries a proximity mine below the barrel. Using the secondary mode rather obviously means you have to throw the weapon away.\n", + /*297*/ "As far as we can ascertain, the secondary mode of the weapon seems to be a threat identifier, targetting mines, hidden explosive devices (such as the Dragon in secondary mode), and automatic guns. Though a powerful gun, the assault rifle's magazine is perhaps too small. \n", + /*298*/ "The Institute's first attempt at a support weapon, the AR34 is a fairly basic assault rifle. The secondary mode is a permanent zoom. Testing is weighted towards accuracy training.\n", + /*299*/ "The heavier variant of the Dragon, with the proximity mine removed and replaced by a small grenade launcher. Adopted by the U.S. military as a squad heavy support weapon - it is not hard to see why. Use the tests to get used to the grenade trajectory.\n", + /*300*/ "Subtlety is not an option here. There are two modes, single or double blast. The magazine is quite large for a shotgun, but be aware of the long reload times and plan your movements accordingly.\n", + /*301*/ "A finely engineered, silenced sniper rifle with a high-powered zoom. The only part of the operation that can interfere with the accuracy of the weapon is the sniper. Make sure you use the secondary mode to crouch down and steady your aim.\n", + /*302*/ "Even though the engineering techniques are beyond us, we can still appreciate the effects of the FarSight rifle. The shot is almost unstoppable, and the scope can penetrate walls to a great depth, locking on to targets if need be.\n", + /*303*/ "The primary function of the crossbow is a nonlethal drugged shot, while the secondary is an instant kill. It is a stealth weapon first and foremost, so the reloading can be time-consuming and inconvenient in a firefight.\n", + /*304*/ "The tranquilizer gun is a common design, found in many medical laboratories and hospitals worldwide. It can be switched from the tranquilizer pellets to a short-range lethal dose, which uses up a lot more of the reservoir of sedative.\n", + /*305*/ "Try to control this weapon as best you can. It was designed for a far stronger user than a human, that much is certain. Kneeling down may help steady your aim, but not refine it. If any opponents do make it past the hail of fire, then the barrels can be used as a grinder to inflict damage.\n", + /*306*/ "A recent dataDyne product, with interesting technology inside it. The secondary mode activates a magnetic field around the bomb, providing adhesion for a limited amount of time. When a certain amount of time has passed, the field is reversed and the bomb falls from the impact point and explodes.\n", + /*307*/ "A compact, reuseable missile launcher - reloads after each shot. The secondary mode uses a variant of the lock-on system from the CMP150 submachine gun, with a single designated target. The missile travels at a slower speed as it tracks the target, so plan for this and time your shots carefully.\n", + /*308*/ "This Skedar handheld missile launcher can fire either an unguided rocket or a user-controlled remote rocket. Presumably this gave the Skedar some perverse satisfaction when the warhead camera closed on the target, but a Carrington Institute agent is beyond such things. The guided rocket speeds up automatically, but can be slowed down for greater maneuverability. Detonation occurs on contact or when the trigger is pressed.\n", + /*309*/ "A finely tempered fighting knife, which is also balanced for throwing. Practice is essential to get accustomed to the range and trajectory of the thrown blade.\n", + /*310*/ "The experimental weapons department has come up with a small but effective wrist-mounted laser with two beam settings. The primary mode fires a blast out to a considerable range, while the secondary mode provides a continual beam for as long as the trigger is pressed.\n", + /*311*/ "The fragmentation anti-personnel grenade has four seconds from activation to detonation on the basic fuse. For your entertainment and delight, we have included a secondary mode - proximity pinball. The grenade will bounce around until the charge wears off or the proximity detector is triggered.\n", + /*312*/ "This Maian grenade plays havoc with the neurons in sentient creatures. If you wander into the blast radius, your vision will blur and you will lose your grip on whatever you're holding. The grenade can be set to go off on impact or by proximity trigger. Make sure you throw it far enough away.\n", + /*313*/ "A degree of judgement is required for the effective use of timed mines, otherwise the intended target may overrun the explosion range and come after you. Hone your skills in the tests before you make a critical error in the field. The secondary function is a threat detector identical to that found on the K7 Avenger assault rifle.\n", + /*314*/ "The key to successful placement of proximity mines is to put them where your opponent doesn't expect to encounter them. If you find yourself on the receiving end of proximity mines, use the threat detector secondary mode to make sure of your surroundings. It may be wasting your time, but if it isn't, it could save your life.\n", + /*315*/ "The latest variety of remote detonated mines, essentially the same as all that have gone before. The primary mode is placing the mines, while the secondary mode is giving the detonation command. If you can't see the mine, you'll have to rely on old-fashioned guesswork and timing. \n", + /*316*/ "Holo 1 - Looking Around\n", + /*317*/ "Holo 2 - Movement 1\n", + /*318*/ "Holo 3 - Movement 2\n", + /*319*/ "Holo 4 - Unarmed Combat 1\n", + /*320*/ "Holo 5 - Unarmed Combat 2\n", + /*321*/ "Holo 6 - Live Combat 1\n", + /*322*/ "Holo 7 - Live Combat 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_f.c b/src/files/lang/pal-final/dish_str_f.c new file mode 100644 index 000000000..0b877e455 --- /dev/null +++ b/src/files/lang/pal-final/dish_str_f.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Prendre la Vue nocturne sur la table pour commencer.\n", + /* 9*/ "Activer la Vue nocturne.\nTrouver l'interrupteur.\nRétablir la lumière.\n", + /* 10*/ "Prendre le récepteur sur la table pour commencer.\n", + /* 11*/ "Se tenir près du terminal et utiliser le récepteur.\n", + /* 12*/ "Il faut tenir le récepteur.\n", + /* 13*/ "Connexion établie...\n", + /* 14*/ "Terminal piraté avec succès.\n", + /* 15*/ "Connexion perdue - trop loin du PC.\n", + /* 16*/ "Prendre la mine CME sur la table pour commencer.\n", + /* 17*/ "Trouver le relais et lancer la mine CME sur le relais.\n", + /* 18*/ "Mine CME mal placée.\n", + /* 19*/ "Mine CME placée correctement.\n", + /* 20*/ "Prendre la CamSpy sur la table pour commencer.\n", + /* 21*/ "Trouver PC de salle Info et holographier.\n", + /* 22*/ "Empreinte holographique de PC correcte.\n", + /* 23*/ "Lumières réactivées.\n", + /* 24*/ "Prendre le décodeur porte sur la table pour commencer.\n", + /* 25*/ "Utiliser le décodeur sur la porte pour l'ouvrir.\n", + /* 26*/ "Il faut tenir le décodeur porte.\n", + /* 27*/ "Décodeur fixé. Commandes de piratage lancées...\n", + /* 28*/ "Décodage terminé. Porte déverrouillée.\n", + /* 29*/ "Prendre le pisteur sur la table pour commencer.\n", + /* 30*/ "Trouver le scanner IR grâce au pisteur.\n", + /* 31*/ "Scanner IR localisé avec succès.\n", + /* 32*/ "Prendre le scanner IR sur la table pour commencer.\n", + /* 33*/ "Trouver la porte secrète grâce au scanner IR.\n", + /* 34*/ "Porte secrète localisée avec succès.\n", + /* 35*/ "Prendre le scanner rayons X sur la table pour commencer.\n", + /* 36*/ "Trouver interrupteurs cachés pour couper grille laser.\n", + /* 37*/ "Toutes les grilles laser sont désactivées.\n", + /* 38*/ "Prendre le costume sur la table pour commencer.\n", + /* 39*/ "Tromper quelqu'un pour obtenir un occulteur.\n", + /* 40*/ "Occulteur récupéré avec succès.\n", + /* 41*/ "Grille laser 1 désactivée.\n", + /* 42*/ "Grille laser 2 désactivée.\n", + /* 43*/ "Je viens chercher l'équipement.\n", + /* 44*/ "Bonjour, Joanna. Alors comme ça on se déguise?\n", + /* 45*/ "Voilà. Ne le faites pas tomber surtout.\n", + /* 46*/ "Occulteur sécurisé avec succès.\n", + /* 47*/ "N'oubliez pas d'utiliser votre costume, d'accord?\n", + /* 48*/ "Il faudra faire mieux que cela, Joanna.\n", + /* 49*/ "Joanna, d'où sortez-vous?\n", + /* 50*/ "La caméra vous a repérée.\n", + /* 51*/ "Prendre l'occulteur sur la table pour commencer.\n", + /* 52*/ "Utiliser l'occulteur et localiser Carrington.\n", + /* 53*/ "Aucun doute possible, votre entraînement\nest terminé!\n", + /* 54*/ "Mission accomplie - Entraînement équipement terminé!\n", + /* 55*/ "Mission échouée - vous êtes repérée.\n", + /* 56*/ "Choisir le Récepteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le récepteur et relâcher le bouton A.\n", + /* 57*/ "Choisir la CamSpy.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la CamSpy et relâcher le bouton A.\n", + /* 58*/ "Choisir la Vue nocturne.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir Vue nocturne et relâcher A.\n", + /* 59*/ "Choisir le Décodeur porte.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le décodeur porte et relâcher le bouton A.\n", + /* 60*/ "Choisir le Scanner rayons X.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner rayons X et relâcher le bouton A.\n", + /* 61*/ "Choisir le costume.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le costume et relâcher le bouton A.\n", + /* 62*/ "Choisir le Scanner IR.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le scanner IR et relâcher le bouton A.\n", + /* 63*/ "Choisir le Pisteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir le pisteur et relâcher le bouton A.\n", + /* 64*/ "Choisir l'Occulteur.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir l'occulteur et relâcher le bouton A.\n", + /* 65*/ "Choisir la Mine CME.\n- Maintenir le bouton A.\n- Utiliser le Stick pour changer de sélection.\n- Choisir la mine CME et relâcher le bouton A.\n", + /* 66*/ "Joanna, quel plaisir de vous voir.\n", + /* 67*/ "Suivez-moi, Joanna.\nJe vous emmène aux salles d'entraînement.\n", + /* 68*/ "Le centre d'information est derrière cette porte.\n", + /* 69*/ "Ici se trouve le labo d'équipement.\n", + /* 70*/ "Par ici se trouve la salle d'entraînement et de simulation.\n", + /* 71*/ "Par là se trouve le champ de tir.\n", + /* 72*/ "Ce couloir mène au hangar.\n", + /* 73*/ "CAISSE ANTI-GRAV \nAppuyer sur B près de la caisse pour la prendre...\n", + /* 74*/ "Appuyer sur B pour relâcher une caisse en main.\n", + /* 75*/ "HOVERBIKE \nDeux fois sur B près de l'Hoverbike pour l'utiliser...\n", + /* 76*/ "Deux fois sur B pour descendre de l'Hoverbike.\n", + /* 77*/ "OUVRIR PORTES \nAppuyer sur B près d'une porte pour l'ouvrir.\n", + /* 78*/ "Le bouton B active aussi un objet proche.\n", + /* 79*/ "ASCENSEURS \nAppuyer sur B près de la porte pour appeler l'ascenseur.\n", + /* 80*/ "Sortie impossible pendant un entraînement.\n", + /* 81*/ "Code interrupteur 1 obtenu.\n", + /* 82*/ "Code interrupteur 2 obtenu.\n", + /* 83*/ "Code interrupteur 3 obtenu.\n", + /* 84*/ "Code interrupteur 4 obtenu.\n", + /* 85*/ "REGARDER HAUT\n- Appuyer sur C Bas pour regarder en haut.\n", + /* 86*/ "REGARDER BAS\n- Appuyer sur C Haut pour regarder en bas.\n", + /* 87*/ "Holoprogramme 2 terminé avec succès.\n", + /* 88*/ "Holoprogramme 4 terminé avec succès.\n", + /* 89*/ "Holoprogramme 5 terminé avec succès.\n", + /* 90*/ "Garde désarmé avec succès.\n", + /* 91*/ "Garde neutralisé avec succès.\n", + /* 92*/ "Désarmez cette cible mouvante si possible.\n", + /* 93*/ "Assomez la cible - mot-clé: furtivité.\n", + /* 94*/ "Et le dernier garde...\n", + /* 95*/ "S'ACCROUPIR\n- Maintenir R puis appuyer sur C Bas pour s'accroupir.\n", + /* 96*/ "RAMPER\n- Une fois accroupie, maintenir R et appuyer sur C bas.\n", + /* 97*/ "Holoprogramme 3 terminé avec succès.\n", + /* 98*/ "Activer tous les interrupteurs.\n", + /* 99*/ "Activer tous les interrupteurs muraux.\n- Faire vite ou ils s'éteindront tous.\n", + /*100*/ "Examiner les terminaux pour les codes d'accès.\n- Utiliser les codes sur les terminaux muraux.\n", + /*101*/ "Code 1 obtenu.\n", + /*102*/ "Code 2 obtenu.\n", + /*103*/ "Code 3 obtenu.\n", + /*104*/ "Code 4 obtenu.\n", + /*105*/ "Entraînement échoué - regarder vers l'avant.\n", + /*106*/ "Holoprogramme 1 terminé avec succès.\n", + /*107*/ "Combat sans armes - assommer la cible.\n- Appuyer sur Z plusieurs fois pour se battre.\n", + /*108*/ "Essayer maintenant sur une cible mouvante...\n", + /*109*/ "Et maintenant contre une cible offensive.\n", + /*110*/ "Battre tous les ennemis sans subir de dégâts.\n", + /*111*/ "Entraînement échoué - dégâts subis.\n", + /*112*/ "Holoprogramme 6 terminé avec succès.\n", + /*113*/ "Holoprogramme 7 terminé avec succès.\n", + /*114*/ "TERMINAUX\n- Appuyer sur B près d'un terminal pour l'utiliser.\n", + /*115*/ "Activer maintenant les terminaux muraux rouges.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "OK, Joanna, je vous laisse vous préparer.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humain (Femelle)\n", + /*127*/ "23 ans 2 mois\n", + /*128*/ "|Fichier IC #027 -\n\nStatut entraînement: Complet\nNote entraînement: A++\nStatut actuel: Assignée\n\n|Profil -\n\nBien entraînée mais sans expérience. Formidables réactions. A l'aise avec un bon nombre d'armes. Adaptation remarquable. Meilleur score à l'entraînement. A l'origine d'un nouveau système de notation. Etant la représentation de l'agent idéal de l'Institut Carrington, on lui donna le surnom de 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Humain (Mâle)\n", + /*131*/ "28 ans 5 mois\n", + /*132*/ "|Fichier IC #009 -\n\nStatut entraînement: Complet\nNote entraînement: A+\nStatut actuel: Infiltré\n\n|Profil -\n\nNotre agent infiltré à la plus grande expérience. Très habile avec son arme de choix (Magnum). Plus qualifié pour des missions d'infiltration plutôt que pour le combat ouvert. Avant Joanna Dark, il détenait le meilleur score d'entraînement.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humain (Mâle)\n", + /*135*/ "62 ans 8 mois\n", + /*136*/ "|Fichier IC #000 -\n\nStatut entraînement: Non disp.\nNote entraînement: Non disp.\nStatut actuel: Non disp.\n\n|Profil -\n\nPatriarche scientifique/entrepreneur de génie, fondateur de l'Institut Carrington. Il planifie toutes les missions conduites par ses agents et dirige les opérations depuis son bureau par lien direct. Il a un goût vestimentaire étrange.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humain (Femelle)\n", + /*139*/ "39 ans ? mois\n", + /*140*/ "|Notes de l'analyste -\n\nDirectrice de la dataDyne Corp. Fanatique du pouvoir. Déteste recevoir des ordres et perdre l'initiative. Est prête à des actes cruels pour éliminer toute concurrence. Haine conséquente envers Daniel Carrington.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humain (Mâle)\n", + /*143*/ "46 ans ? mois\n", + /*144*/ "|Notes de l'analyste -\n\nDirecteur de la National Security Agency. Est lié par une certaine amitié à Cassandra De Vries ou partage des intérêts/affaires avec cette dernière. Obéit à Cassandra, dotée d'une personnalité plus dominante que la sienne déjà colossale. Est la figure de proue d'opérations occultes conduites par la NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Le sapiens Caroll (IA)\n", + /*147*/ "6 mois\n", + /*148*/ "|Profil -\n\n Une intelligence artificielle créée par la dataDyne Corp. gratifiée d'un penchant pour la lexicographie et les codes à cracker. Il est par chance doté d'une morale, et grâce à son incroyable intelligence, il a pu prédire les plans de la dataDyne. Sa voix et sa prononciation sont impeccables, renforçant son aspect de docteur en lettres.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Mâle)\n", + /*151*/ "320 ans\n", + /*152*/ "|Profil -\n\nUn extraterrestre de la race Maian. Il est un 'Protecteur' (garde du corps) de l'ambassadeur Maian en déplacement sur la Terre à la demande de Daniel Carrington. Les Protecteurs sont tous d'excellents maîtres d'armes. Elvis adore la Terre, qu'il trouve fascinante.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humain (Mâle)\n", + /*155*/ "20-30 ans\n", + /*156*/ "|Profil -\n\nUn homme blond platine. Très grand, il porte des vêtements blancs et d'habitude un imperméable. Il semble contrôler la conspiration impliquant Cassandra et Trent. Telles sont les seules informations recueillies sur ce personnage.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (travesti)\n", + /*159*/ "inconnu\n", + /*160*/ "|Profil mis à jour -\n\nUn guerrier skedar se dissimulant derrière la projection holographique d'un homme blond d'une vingtaine d'années. Un modulateur vocal donne au Skedar une voix précise, convaincante et intelligente. Cet appareil de propagande Skedar est assez subtile pour fonctionner à merveille.\n", + /*161*/ "Le Président des Etats-Unis\n", + /*162*/ "Humain (Mâle)\n", + /*163*/ "50 ans\n", + /*164*/ "|Profil -\n\nUn Afro-Américain de bonne éducation, très intelligent et perspicace. Il tente constamment de faire le bien mais il est malheureusement conseillé par des gens comme Trent Easton. Il pense maîtriser Trent depuis qu'il lui a refusé le Pelagic II pour la dataDyne Corp. Il ne bénéficie pas d'une grande popularité: on suppose, peut-être à tort, que la majorité politique a tout contrôle sur lui.\n", + /*165*/ "Maians\n", + /*166*/ "Les Maians sont les extraterrestres connus sur Terre sous le nom de 'Petits Gris'. Ils observent la Terre depuis longtemps (plusieurs siècles) et ayant détecté chez les humains un certain potentiel, ils apprécient notre monde et en sont les généreux mécènes. Leur contact sur Terre est Daniel Carrington. Un contact politique officiel reste encore à établir.\n", + /*167*/ "Guerrier skedar\n", + /*168*/ "Les Skedars sont des guerriers extraterrestres qui ont combattu les Maians pendant des siècles jusqu'au récent cessez-le-feu. Ils utilisent de colossales armures mécaniques pour se déplacer et combattre: ils sont en fait de petite taille et ressemblent à des reptiles. Etant très agressifs, la guerre est leur religion et ils y sont tous dévoués.\n", + /*169*/ "Briefing\n", + /*170*/ "Il y a des millions d'années, un croiseur d'une puissance colossale fut sabordé dans l'Océan Pacifique par une race extraterrestre, les Cetans. Il était équipé d'une arme jamais utilisée: un découpleur nucléaire, pouvant en théorie briser les liens entre les molécules. Pour que les témoins croient à la destruction du vaisseau, une balise fut envoyée vers la planète mère, et ils détruisirent les sondes couvrant le système solaire dans lequel ils décidèrent de se cacher.\n\nLes Maians découvrirent des signes de vie sur Terre. Bien que disposant d'un certain potentiel, les humains primitifs ne furent pas contactés: les Maians décidèrent d'attendre qu'ils se développent.\n\nLes Maians rencontrèrent les Skedars et s'enlisèrent dans un conflit sans fin. Après des centaines d'années de guerre, ils arrivèrent finalement à une paix fragile. Les fanatiques skedars éprouvent constamment la résistance de cette paix en se livrant à des activités terroristes, mais les Maians refusent de se laisser entraîner.\n\nLes Maians se méfient des humains, conscients que de trop nombreuses crises sont survenues sur Terre à cause de conflits technologiques et de malentendus. Ils craignent que l'annonce de leur présence n'entraîne d'autres conflits sur la planète. Ils ont donc décidé d'observer la race humaine jusqu'à ce qu'elle devienne plus mature.\n\nDaniel Carrington anticipa le cours des évènements en contactant un vaisseau maian en orbite autour de la Terre. Il avait un plan qui aiderait humains et Maians, en accélérant la prise de contact entre les deux peuples. Les Maians, qui trouvèrent le plan judicieux et Carrington honnête, aidèrent ce dernier à diffuser leur technologie sur Terre.\n\nLes Skedars fanatiques trouvèrent la sonde messagère provenant du croiseur Cetan. Ils envoyèrent immédiatement des éclaireurs sur Terre pour enquêter de façon brutale, kidnappant les gens et mutilant les animaux dans leur tentative de récupération du croiseur. Leur enquête les mène dans l'Océan Pacifique, où ils localisent le vaisseau. Cependant, ils ont besoin d'aide pour y accéder.\n\nIls mènent leur propre étude de la Terre et établissent une liste des sociétés qui possèdent les ressources nécessaires pour les aider à retrouver le vaisseau sabordé. En tête de cette liste figure la dataDyne Corporation. Ils prennent contact avec le P-DG de la corporation, Cassandra De Vries et lui font une proposition qui semble trop belle pour être honnête - ce qui est vrai. En échange d'une aide pour sortir 'leur' vaisseau de l'océan, ils donneront à la dataDyne assez de technologie pour en faire la plus importante corporation sur Terre. Tout ce que la dataDyne doit faire est de construire une intelligence artificielle avec des capacités linguistiques et de décodage. La dataDyne se met donc au travail.\n\nCassandra De Vries contacte Trent Easton, le dirigeant de la NSA, et lui expose les détails. Il tente d'obtenir l'approbation du Président pour le prêt d'un bâtiment de recherche océanique à la dataDyne mais échoue. Il n'existe aucun moyen pour les Skedars ou la dataDyne de voler le bateau sans provoquer la colère du gouvernement américain. Ils conçoivent donc un nouveau plan : remplacer le Président par un clone sous leur contrôle. Cela promet à Easton et De Vries une récompense supplémentaire une fois l'opération skedar terminée.\n\nCependant, ils ne disposent pas de beaucoup de temps pour se réjouir puisque les Skedars ont l'intention de tester le découpleur nucléaire sur la Terre avant d'annihiler les Maians. Mais Cassandra, aveuglée par la possibilité de gagner autant de pouvoir, ne pense même pas à l'éventualité de se faire doubler. Il en va de même pour Trent.\n\nMais la dataDyne crée la seule chose qui puisse prévoir l'apparition de tels dangers en analysant le flot d'informations dont elle dispose. Cette création, c'est l'IA mise au point pour craquer les codes du croiseur cetan. Lorsque l'IA exprime ses inquiétudes quant à cette mission, De Vries ordonne que l'on modifie sa personnalité. En d'autres termes, la création pense trop. Désespérée, l'IA - sous le pseudonyme du Dr. Caroll - contacte l'Institut Carrington pour demander de l'aide.\n", + /*171*/ "L'histoire\n", + /*172*/ "Joanna Dark, agent novice, se voit confier une mission d'extraction. Elle doit aider un savant à s'échapper d'un complexe scientifique de haute sécurité, situé sous l'immeuble de la dataDyne. Elle est surprise de découvrir que le Dr. Caroll est en fait une IA créée par la dataDyne mais poursuit néanmoins sa mission de sauvetage. L'alarme donnée, Joanna doit se frayer un chemin jusqu'à l'héliport au sommet de la tour, afin de s'enfuir par la voie des airs.\n\nEn réponse à cette agression, la dataDyne capture Daniel Carrington deux jours plus tard et le retient en otage dans sa propre villa. La corporation réclame en échange le retour de leur IA, leur 'propriété'. Mais ce qu'ils ne savent pas, c'est que l'IA se trouve dans la villa, où Carrington discutait avec elle des plans de la dataDyne. Joanna délivre Daniel, mais ne peut empêcher la dataDyne de récupérer le Dr. Caroll. L'IA en a cependant assez dit à Carrington pour que celui-ci convoque sur Terre un groupe de spécialistes maians.\n\nJoanna est envoyée à Chicago pour espionner les conspirateurs dans l'immeuble du G5, une façade de la dataDyne Corp. Elle apprend l'implication de Trent Easton, directeur de la NSA et celle de l'étrange homme d'origine nordique qui semble tout contrôler. Une fois le plan concernant le Président révélé par Trent, Joanna rapporte la situation, mais découvre qu'il y a quelque chose de plus urgent à accomplir en premier lieu.\n\nLes spécialistes ont été interceptés par les conspirateurs. Les survivants du crash et l'épave ont été transportés dans le Secteur 51, dans le Nevada. Joanna est larguée dans le secteur afin de contacter un autre agent de l'Institut Carrington, de secourir d'éventuels survivants et de retrouver leur équipement. Lorsqu'elle pénètre dans le labo, Joanna découvre le secret de l'Institut : ses alliés sont des Maians, les extraterrestres connus sous le nom de Petits Gris. L'extraterrestre qu'elle sauve s'appelle Elvis. Il était garde du corps de l'ambassadeur qui était à la tête de l'équipe de spécialistes.\n\nAprès avoir aidé les survivants de la délégation Maian, Joanna peut s'occuper des plans de la dataDyne concernant le Président. Elle se fait passer pour un membre de l'entourage du Président pour accéder à la base aérienne où Air Force One est stationné. Elle réussit ensuite à se cacher à bord de l'avion. Une fois en vol, Trent et les Skedars occultés se manifestent, mais Joanna est là pour les arrêter. Elle escorte le Président jusqu'à la capsule de sauvetage, tandis que des hommes de Trent parcourent l'avion à la recherche du Président. Ils désirent entraîner ce dernier à bord de l'OVNI skedar, arrimé à AF1 par une passerelle amovible. Joanna endommage la passerelle, mais ne parvient pas à la détruire. Elle appelle Elvis à la rescousse et celui-ci décide de s'écraser sur Air Force One. La capsule de sauvetage est éjectée et les trois appareils s'écrasent dans le désert glacé de l'Alaska.\n\nJoanna reprend connaissance et essaie de faire son rapport, mais elle s'aperçoit que sa communication est brouillée par une transmission provenant de l'appareil skedar. Elle se met en route dans la neige pour retrouver le Président et Elvis. Elle rencontre des escouades de Skedars occultés qui recherchent le Président, Elvis, elle-même et certaines possessions du Président. Elle suit un groupe jusqu'au vaisseau skedar abattu, où elle découvre un clone du Président. Elle le détruit et coupe le brouilleur, puis appelle la cavalerie. Les plans skedars ont été déjoués une fois de plus, le Président est sauf et Trent est exécuté de façon atroce par les Skedars pour son incompétence.\n\nAu mépris de toute prudence, la dataDyne et les Skedars s'emparent du Pelagic II - le bâtiment d'études océaniques du gouvernement - et se dirigent vers le lieu où se trouve le vaisseau cetan. Joanna et Elvis s'introduisent à bord du bateau pour y semer le désordre et découvrir quel est le grand projet. Après avoir saboté les opérations de plongée et rappelé le sous-marin, ils plongent vers les profondeurs de l'océan, où ils aperçoivent le croiseur cetan pour la première fois. Ils pénètrent dans le vaisseau via le passage ouvert par les Skedars et tombent sur un guerrier skedar mort... Apparemment, l'escouade d'assaut n'a pas eu la partie facile. Après avoir combattu les Skedars et évité les Cetans, Joanna et Elvis atteignent le coeur du vaisseau. Là, ils découvrent l'IA qui était le Dr. Caroll. Une fois sa personnalité restaurée, le Dr. Caroll presse Joanna et Elvis de quitter le vaisseau, qu'il a l'intention de détruire une bonne fois pour toutes.\n\nDe retour à l'Institut Carrington, Joanna est sur le point de partir à un cocktail présidentiel à la Maison Blanche lorsque l'enfer se déchaîne. Les survivants de l'équipe d'assaut skedar libèrent leur vengeance sur les responsables de leur échec. Joanna parcourt l'Institut en essayant d'escorter un maximum d'employés vers les hangars, tandis que les Skedars attaquent différentes parties du bâtiment. Tandis que la majorité des employés quittent les lieux, Joanna retient les Skedars avant de se faire assommer et capturer.\n\nElle se réveille dans une pièce à bord du croiseur skedar avec Cassandra comme compagnon de cellule. Cette dernière se sacrifie pour permettre à Joanna de s'échapper. Elle parvient à abaisser les boucliers des zones d'amarrage et Elvis arrive avec quelques amis pour une petite partie de tir aux pigeons.\n\nLe vaisseau capturé se place en orbite autour de la planète où se trouve l'Autel de Bataille skedar. Elvis est abasourdi : les Maians n'ont jamais réussi à trouver cet endroit, le saint des saints des Skedars. Si l'Autel était détruit, cela anéantirait le moral des Skedars et une véritable paix pourrait être instaurée à la place d'un cessez-le-feu instable. Joanna se charge du chef des Skedars, le Grand Prêtre de l'Autel de Bataille tandis qu'Elvis retourne au croiseur pour contacter la flotte Maian.\n\nL'histoire se termine avec le temple en ruine... Elvis demande un répit dans le bombardement afin de pouvoir trouver Joanna. Elle est vivante, coincée sous des gravats et retenue par un Skedar accroché à sa jambe. Elvis lui tend une arme pour convaincre le Skedar de la laisser partir. Les deux héros quittent ensuite la planète.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ " La corporation tentaculaire qu'est devenue dataDyne a commencé dans la programmation d'IA Lorsqu'il devint évident que la plupart de leurs revenus provenaient de leur travail pour l'armée américaine, une jeune directrice aux dents longues, Cassandra De Vries, se mit à traiter avec des fabricants d'armes et à ignorer les offres de collaboration de Daniel Carrington et de l'Institut, pour la programmation quantique et la recherche sur les IA. Après le rachat par dataDyne de la troisième corporation d'armement, les bénéfices devinrent astronomiques. Dans le mois qui suivit la réception d'un contrat gouvernemental d'armement, Cassandra De Vries fut nommée PDG une part importante des bénéfices furent injectés dans la recherche sur les IA, avec d'excellents résultats.\n", + /*175*/ "Institut Carrington\n", + /*176*/ "Brièvement considéré comme un inventeur cinglé, Daniel Carrington fut le premier à diffuser la technologie anti-gravité dans le monde. Les revenus générés par cette nouvelle technologie et ses dérivés l'ont aidé à créer l'Institut Carrington, un réservoir des connaissances technologiques situé dans une partie reculée des USA. Mais l'Institut est également une base d'entraînement pour ses agents, qui sont envoyés à travers le monde pour suivre les développements technologiques, pour des raisons connues de Carrington uniquement.\n", + /*177*/ "Description\n- Une minuscule caméra contrôlable à distance, parfaite pour l'exploration furtive. Elle est équipée pour l'holographie. Elle peut ouvrir les portes en projetant une zone de chaleur humaine.\n\nInstructions d'entraînement\n- Prenez un hologramme du terminal informatique de la salle Info voisine.\n\nManipulation\n- Appuyez sur Z pour prendre un hologramme. Appuyez sur B pour ouvrir n'importe quelle porte. Maintenez R pour regarder autour de vous.\n", + /*178*/ "Description\n- Amplifie la lumière ambiante pour fournir une image de la zone. Révèle également les formes de vie. L'utilisation avec une luminosité normale entraîne des surtensions, qui 'blanchissent' l'affichage.\n\n Instructions d'entraînement\n- Déplacez-vous dans le noir, trouvez l'interrupteur et actionnez-le pour faire revenir la lumière.\n\n Manipulation\n- Sélectionnez la Vue nocturne dans votre inventaire pour l'activer. Sélectionnez-là à nouveau pour la désactiver.\n", + /*179*/ "Description\n\n- Appareil autonome de décodage. S'attache au panneau de contrôle et passe en revue les différentes combinaisons jusqu'à l'ouverture.\n\n Instructions d'entraînement\n- Trouvez le panneau à côté de la porte et utilisez le décodeur pour la déverrouiller.\n\nManipulation\n- Tenez-vous près de la porte et appuyez sur le Bouton tout en tenant le décodeur.\n", + /*180*/ "Description\n\n- Utilisé pour voir à travers les murs et les objets solides. Peut voir des choses que la Vue nocturne et les lunettes IR ne peuvent détecter.\n\n Instructions d'entraînement\n- Le scanner allumé, recherchez les deux interrupteurs cachés et activez-les pour éteindre la grille laser.\n\nManipulation\n- Choisir le scanner dans l'inventaire pour l'activer. Le choisir à nouveau pour le désactiver.\n", + /*181*/ "Description\n\n- Endormez les soupçons en utilisant un costume. Soyez vigilant cependant, certains ennemis peuvent vous démasquer.\n\n Instructions d'entraînement\n- Grimshaw possède un occulteur qui attend d'être utilisé. Dirigez-vous vers la porte suivante et procurez-vous-le.\n\nOpération\n- Sélectionnez le costume pour le porter.\n", + /*182*/ "Description\n\n- Convertit les informations thermiques en images. Peut être utilisé dans le noir. Révèle également des anomalies telles que portes secrètes et les pans de mur peu solides.\n\n Instructions d'entraînement\n- Allumez le scanner IR, trouvez la porte cachée et ouvrez-la.\n\nManipulation\n- Sélectionnez le scanner IR dans votre inventaire pour l'activer. Sélectionnez-le à nouveau pour le désactiver.\n", + /*183*/ "Description\n- Localise un objet particulier dans une carte radar HUD. Indique la distance et l'équipement.\n\n Instructions d'entraînement\n- Activez le Pisteur et suivez l'écho radar pour retrouver l'objet.\n\nOperation\n- Sélectionnez le Pisteur dans votre inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*184*/ "Description\n- Crée une disruption du spectre lumineux autour du porteur, ce qui entraîne un effet caméléon presque parfait. L'effet est annulé lorsque le porteur fait feu.\n\n Instructions d'entraînement\n- Activez l'occulteur et dirigez-vous vers le bureau de Carrington pour le surprendre!\n\nManipulation\n- Sélectionnez l'occulteur dans l'inventaire. Sélectionnez-le à nouveau pour le désactiver.\n", + /*185*/ "Description\n- Emet un signal alternatif pour brouiller les communications électroniques. Doit être placé sur l'appareil pour être efficace.\n\n Instructions d'entraînement\n- Jetez la mine CME sur le voyant lumineux au-delà de la porte secrète.\n\n Manipulation\n- Appuyez sur le Bouton Z pour jeter la mine. Maintenez le Bouton R enfoncé et ajustez votre visée avec le Stick analogique avant de jeter la mine.\n", + /*186*/ "Description\n- Relie l'agent sur le terrain et les informaticiens de l'Institut. Ils peuvent ensuite pirater des données ou ouvrir les serrures électroniques à distance.\n\n Instructions d'entraînement\n- Utilisez le Récepteur pour pirater le terminal dans le coin, pour déverrouiller une porte secrète.\n\nManipulation\n- Tenez-vous à côté du terminal et appuyez sur le Bouton B lorsque vous avez le Récepteur en main.\n", + /*187*/ "TIRER\n Appuyez sur le Bouton Z pour faire feu.\n", + /*188*/ "AUTO RECHARGE\n Relâchez le Bouton Z quand vous êtes à court de munitions.\n", + /*189*/ "RECHARGE MANUELLE\n Appuyez sur le Bouton B pour recharger avant la fin du chargeur.\n", + /*190*/ "Viser: Maintenez le Bouton R enfoncé pour le mode visée.\n", + /*191*/ "Utilisez le Stick analogique pour déplacer le curseur de visée.\n", + /*192*/ "AUTO FIRE\n Maintenez le Bouton Z enfoncé pour tirer en mode automatique.\n", + /*193*/ "CHANGER VUE\n Appuyez sur le Bouton C haut ou bas pour regarder en haut ou en bas.\n", + /*194*/ "ZOOM\n Maintenez le Bouton R enfoncé pour le mode zoom.\n", + /*195*/ "TIR RAPIDE\n Appuyez rapidement sur le Bouton Z pour tirer plus vite.\n", + /*196*/ "Institut Carrington\0|Base d'opérations\n", + /*197*/ "Tour Lucerne\0|QG suprême\n", + /*198*/ "Sous-sol laboratoire\0|Labos de recherche souterrains\n", + /*199*/ "Villa Carrington \0|Résidence côtière privée\n", + /*200*/ "Chicago\0|Coins louches de la ville\n", + /*201*/ "Immeuble G5\0|Façade commerciale de la dataDyne\n", + /*202*/ "Secteur 51\0|Près du lac Groom Dry, Nevada\n", + /*203*/ "Base aérienne en Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'avion présidentiel\n", + /*205*/ "Lieu du crash\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Bâtiment de recherche sous-marine\n", + /*207*/ "Vaisseau Cetan \0|Un autre univers sur Terre\n", + /*208*/ "Croiseur Skedar \0|Vaisseau de transport de troupes\n", + /*209*/ "Monde natal Skedar\0|La planète de l'Autel de Bataille\n", + /*210*/ "Largueur\0|Transport de troupes\n", + /*211*/ "Caisse antigrav\0|Appareil d'antigravité\n", + /*212*/ "Hoverbike\0|Véhicule de basse altitude\n", + /*213*/ "Robot de nettoyage\0|Votre copain pour la vie\n", + /*214*/ "Hovercopter\0|Hélico antigrav de combat urbain\n", + /*215*/ "Robot G5\0|Droïde de combat urbain\n", + /*216*/ "Intercepteur S51\0|Robot aérien d'interception\n", + /*217*/ "Vaisseau Maian\0|Vaisseau de reconnaissance et de patrouille\n", + /*218*/ "Navette Skedar\0|Vaisseau de largage de troupes\n", + /*219*/ "Le bâtiment de l'Institut comprend de nombreuses zones différentes: bureaux et laboratoires, ateliers et hangars. Il est isolé du monde extérieur ce qui aide à garder le secret des différentes opérations.\n", + /*220*/ "Au beau milieu du quartier des affaires, l'austère bâtiment de la dataDyne Corporation, se détache du reste du paysage.\n", + /*221*/ "Ces laboratoires, bien cachés et sous haute surveillance, sont la clé de l'avenir de la dataDyne. Dans ces labos, des techniciens travaillent avec acharnement pour propulser la dataDyne au sommet.\n", + /*222*/ "Propriété de l'Institut, cette résidence retirée est le refuge de Daniel Carrington pour échapper au stress de l'Institut. La résidence, équipée d'un générateur, sert d'observatoire et possède une cave à vin bien remplie.\n", + /*223*/ "Un coin glauque et miteux de Chicago, fermé à la circulation terrestre. C'est ici que la Corporation G5 possède son QG.\n", + /*224*/ "A l'intérieur de l'immeuble du G5, il existe une salle de réunion protégée par des dispositifs anti-mouchards. C'est le lieu le plus sûr de dataDyne pour les discussions hautement confidentielles.\n", + /*225*/ "Cette section du complexe connu sous le nom de Secteur 51, se trouve sur les contreforts du lac Groom Dry. Les aires d'atterrissage pour hélicos et les tours de communications donnent une idée de la taille du complexe souterrain.\n", + /*226*/ "L'une des nombreuses bases aériennes renforcées, servant de points de ravitaillement pour Air Force One. Ces bases sont isolées et se trouvent dans des régions inhospitalières, loin des yeux indiscrets.\n", + /*227*/ "Cet Air Force One est optimisé pour les climats froids, plutôt utile lorsqu'il est basé au nord de l'Alaska. Le vol est à destination d'Oslo, Norvège.\n", + /*228*/ "Dans le paysage rocheux et enneigé du cercle polaire arctique repose l'épave de l'avion abattu.\n", + /*229*/ "Propriété du gouvernement des USA, le Pelagic II a été conçu pour les missions de plongée dans les profondeurs abyssales, et ce dans n'importe quelles conditions climatiques. C'est le seul bâtiment au monde à pouvoir étudier les grands fonds océaniques.\n", + /*230*/ "Un gigantesque vaisseau extraterrestre qui repose au fond de l'océan depuis des millions d'années.\n", + /*231*/ "Un vaisseau d'assaut interplanétaire qui transporte les guerriers skedars vers les zones de conflit. Fait partie de la très diminuée flotte skedar.\n", + /*232*/ "Une planète aride, secouée par des tremblements de terre, des tempêtes de sable et des tornades. Fait partie d'un système solaire complexe à trois soleils.\n", + /*233*/ "Un véhicule de transport d'agents. Petit, rapide et très maniable, il a été conçu pour une utilisation urbaine. Peut être contrôlé par ordinateur ou piloté à distance. Il peut transporter trois à quatre agents, plus leur équipment.\n", + /*234*/ "Un appareil antigrav conçu pour aider les manutentionnaires qui se fixe à une caisse. Lorsqu'il est activé, le champ antigrav soulève la caisse en réduisant son inertie.\n", + /*235*/ "Moto de patrouille à basse altitude. Utilise une petite unité AG pour flotter, ainsi qu'une petite -mais puissante- turbine à poussée vectorielle pour la propulsion et la direction.\n", + /*236*/ "Il maintient une maison propre et en ordre. Il a souvent accès à toutes les zones d'un bâtiment, il est donc sage de le laisser intact autant que possible. Il peut ainsi fournir l'accès malgré lui à certaines zones importantes.\n", + /*237*/ "Véhicule de patrouille et d'élimination. Equipage de deux hommes, armé d'un canon Vulcain à l'avant, et d'un lance-missiles sur chaque aile. Peut être descendu avec un feu nourri, ou mieux, avec une roquette bien placée.\n", + /*238*/ "Robot de combat urbain. Utilise une unité antigrav pour flotter. Lourdement protégé et armé. Utilisé pour éloigner les visiteurs indiscrets, avec son programme 'tirer d'abord et ne pas poser de questions plus tard'.\n", + /*239*/ "Variante robotique de l'Hoverbike, avec une turbine et une unité AG beaucoup plus puissantes. Peut atteindre Mach 2 sans problème et peut avancer au pas pendant des heures. En dépit de son armement, ce véhicule compte plus sur sa maniabilité que sur ses boucliers.\n", + /*240*/ "Conçu pour un seul pilote maian. Un passager se sentirait à l'étroit, et un passager humain encore plus.\n", + /*241*/ "Capable de transporter au combat dix guerriers skedars en armure et armés jusqu'aux dents. Indétectable par des radars conventionnels. Il peut émettre de puissantes ondes de brouillage qui couvrent une zone importante : ces ondes brouillent les communications, ainsi que les équipements de détection.\n", + /*242*/ "Description\n- Un bon agent remarque chaque détail autour de lui.\n\n Instructions d'entraînement\n- Examinez tous les objets directement.\n\nManipulation\n- Regarder vers le haut- Appuyez sur le Bouton C bas\n- Regarder vers le bas- Appuyez sur le Bouton C haut\n- Observation- Maintenez enfoncé le Bouton R pour passer en mode visée et utilisez le Stick pour regarder dans une direction.\n", + /*243*/ "Description\n- Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n\n Instructions d'entraînement\n- Activez tous les interrupteurs devant vous. Soyez rapide, car chaque interrupteur reviendra dans sa position initiale au bout d'un certain temps.\n\nManipulation\n- Pas à gauche- Bouton C gauche\n- Pas à droite- Bouton C droit\n\n", + /*244*/ "Description\n- Se baisser et s'accroupir permet d'accéder à de nouvelles zones.\n\n Instructions d'entraînement\n- Frayez-vous un chemin en utilisant les mouvements qui vous sont disponibles. Activez les interrupteurs.\n\n Manipulation\n- Se baisser- Maintenez R et appuyez sur C bas.\n- S'accroupir- Une fois baissé, maintenez R et appuyez sur C bas.\n- Se relever- Appuyez brièvement sur R.\n\n", + /*245*/ "Description\n- Combattre plusieurs adversaires au corps-à-corps peut s'avérer difficile.\n\n Instructions d'entraînement\n- Assommez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Coup de poing - Appuyez rapidement sur le Bouton Z pour une rafale de coups de poing.\n\n", + /*246*/ "Description\n- Désarmer votre adversaire peut vous permettre d'obtenir de nouvelles armes.\n\n Instructions d'entraînement\n- Assommez/désarmez tous les ennemis sans vous faire toucher.\n\nManipulation\n- Désarmer - Maintenez le Bouton B enfoncé, puis appuyez sur le Bouton Z.\n- Assommer- Assommez un ennemi inattentif par derrière.\n", + /*247*/ "Description\n- Combattre plusieurs adversaires à mains nues.\n\n Instructions d'entraînement\n- Battez tous les ennemis désarmés sans vous faire toucher.\n\n", + /*248*/ "Description\n- Combattre plusieurs adversaires, armés ou non.\n\n Instructions d'entraînement\n- Battez tous les ennemis armés sans vous faire toucher.\n\n", + /*249*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode visée.\n", + /*250*/ "Pensez à l'endroit où vous souhaitez aller avant de commencer le test. Placez-vous à un endroit qui demandera le moins de mouvement possible entre les cibles.\n", + /*251*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour passer le test le plus vite possible, baissez-vous seulement lorsque c'est nécessaire.\n", + /*252*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire, et soyez prêt à reculer lorsque l'ennemi riposte.\n", + /*253*/ "Restez au contact le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*254*/ "Ne restez pas immobile en attendant de vous faire toucher; bougez! Ne vous fixez pas sur un seul adversaire; essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*255*/ "Neutralisez les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme dérobée avant qu'il ne s'approche de vous.\n", + /*256*/ "Pour plus de précision et de liberté lorsque vous regardez autour de vous, utilisez le mode Visée.\n", + /*257*/ "Les pas de côté et les déplacements latéraux peuvent vous sortir de situations difficiles.\n", + /*258*/ "Vous baisser permet d'atteindre des endroits normalement inaccessibles, mais souvenez-vous que vous vous déplacez plus vite debout. Pour bouger le plus rapidement possible baissez-vous lorsque c'est réellement nécessaire.\n", + /*259*/ "Attaquer vos ennemis dans le dos peut être déshonorant, mais c'est un moyen beaucoup plus sûr de les éliminer. N'allez au corps-à-corps que lorsque c'est vraiment nécessaire et soyez prêt à reculer avant que l'ennemi ne riposte.\n", + /*260*/ "Restez rapproché juste le temps d'attraper l'arme. Reculez hors de portée de l'ennemi et utilisez votre nouvelle acquisition.\n", + /*261*/ "Ne restez pas immobile en attendant de vous faire toucher: bougez! Ne vous fixez pas sur un seul adversaire, essayez de tous les localiser. Si vous ne pouvez pas tous les voir, bougez jusqu'à ce que vous le puissiez.\n", + /*262*/ "Allez chercher les adversaires armés une fois que vous maîtrisez le combat rapproché. Lorsque vous venez de désarmer un ennemi, reculez et utilisez l'arme que vous venez de voler avant qu'il ne s'approche de vous.\n", + /*263*/ "Veillez à ce que l'objet ciblé soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*264*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*265*/ "La CamSpy peut être difficile à contrôler, alors prenez votre temps.\n", + /*266*/ "Utile en combat, mais peut vous causer des ennuis en cas de surcharge.\n", + /*267*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*268*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*269*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*270*/ "Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*271*/ "Un costume n'est pas seulement le vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*272*/ "Economisez votre camouflage lorsqu'il n'y a personne pour vous voir.\n", + /*273*/ "Veillez à ce que l'objet cible soit toujours dans votre champ de vision quand vous utilisez le Récepteur, et restez suffisamment proche pour éviter que la connexion ne soit interrompue.\n", + /*274*/ "Assurez-vous que la mine se fixe bien où vous voulez en vous approchant le plus possible de la cible. Ajustez votre visée en utilisant les Boutons C ou le Bouton R pour la visée.\n", + /*275*/ "La CamSpy n'est pas invisible - les ennemis peuvent la repérer : alors soyez prudent en entrant dans une zone déserte. Souvenez-vous que la CamSpy reste là où vous l'avez laissée jusqu'à ce que vous la ramassiez.\n", + /*276*/ " Utile en combat, mais peut vous causer des ennuis en cas de surcharge. Anticipez ces situations et réagissez avant l'ennemi.\n", + /*277*/ "Si vous avez des problèmes pour fixer le Décodeur, rapprochez-vous de la cible en lui faisant face.\n", + /*278*/ "Le Pisteur n'indique que la direction et la hauteur approximative; il n'affiche pas de carte vous menant à la cible. Attention à votre environnement et soyez prêt à explorer.\n", + /*279*/ "Le viseur réduit votre vision périphérique, ce qui peut être un handicap en combat. Soyez certain de la situation avant de l'utiliser.\n", + /*280*/ " Si vous utilisez cet appareil au mauvais moment, cela peut vous coûter la vie, puisque cela vous empêche de voir quoi que soit au delà d'un certain point. A utiliser avec modération.\n", + /*281*/ " Un costume n'est pas seulement un vêtement, c'est également la manière dont la personne le porte. N'imitez pas une personne, soyez cette personne.\n", + /*282*/ " Economisez votre camouflage lorsqu'il n'y a personne pour vous voir. Evitez de tirer, sauf en cas d'absolue nécessité et si vous êtes sûr du résultat.\n", + /*283*/ "Le Falcon 2 est une arme de poing très précise. Par conséquent, toute erreur dans ce test est de votre faute. Le mode secondaire est un coup de crosse et est donc inutile à distance.\n", + /*284*/ "Pour rendre le Falcon 2 encore plus efficace, une lunette a été ajoutée à l'arme. Tout comme pour le Falcon 2 de base, le mode coup de crosse est inutile à distance.\n", + /*285*/ "La version du Falcon 2 avec silencieux est une excellente arme pour les opérations furtives, conçue pour vous donner l'avantage de la surprise sur vos ennemis. Testez votre précision pour vous assurer de ne jamais gâcher votre chance.\n", + /*286*/ "Le Magsec 4 privilégie la puissance de feu au détriment de la précision, particulièrement en mode rafale de trois. La seule contrainte importante est la taille du chargeur.\n", + /*287*/ "Voici une arme Skedar typique, brutale et puissante. En sacrifiant une partie des munitions, la puissance peut être concentrée en un tir dévastateur. La quantité importante de munitions est un avantage.\n", + /*288*/ "Ce pistolet très versatile possède deux types de munitions: standard ou explosives. Les ingénieurs maians ont réussi cette prouesse sans sacrifier la consommation d'énergie, bien que la cadence de tir soit réduite.\n", + /*289*/ "L'art du DY357 est de savoir quand recharger. Un chargeur de six balles influe donc sur l'issue d'un combat. Le poids de l'arme peut s'avérer utile pour assommer quelqu'un.\n", + /*290*/ "Trent Easton est toujours à la recherche du nec plus ultra et cette arme ne fait pas exception. Les balles sont aussi particulières que l'arme. Elles sont conçues pour se fragmenter à l'intérieur de la cible et l'éliminer rapidement.\n", + /*291*/ "Un pistolet-mitrailleur fiable et efficace. On comprend pourquoi il reste la meilleure vente de la dataDyne depuis les deux dernières années, et ceci grâce à son mode secondaire. Le système d'acquisition et de verrouillage de cible est en effet excellent: familiarisez-vous avec la manipulation complète de cette arme.\n", + /*292*/ "Le pistolet-mitrailleur Cyclone a été conçu pour ne PAS être précis, mais c'est une excellente distraction à l'entraînement. Sa cadence de tir est cependant extrêmement élevée, faisant de cette arme un atout dévastateur.\n", + /*293*/ "Cette mitraillette est issue de la flexibilité de conception maian. Son mode secondaire est intéressant: un projectile à haute vélocité qui peut pénétrer n'importe quoi. Pour éviter d'endommager le canon ou le mécanisme de mise à feu, la cadence de tir - tout comme pour le Phoenix - est réduite en mode secondaire.\n", + /*294*/ "Le RC-P120 tire un projectile minéral spécial qui, couplé à une grande cadence de tir et un chargeur important, en fait une arme parfaite contre les Skedars. Les balles peuvent être utilisées pour alimenter un prototype d'occulteur. L'entraînement a été modifié pour mettre en valeur cette caractéristique particulière.\n", + /*295*/ "Non seulement cette arme peut être pliée pour ressembler à un PC portable, mais elle peut en plus être transformée en arme sentinelle en mode secondaire. Cela vous sera utile pour couvrir une retraite ou protéger une zone.\n", + /*296*/ "C'est le modèle que la dataDyne a réussi à vendre à l'armée américaine, bien qu'elle ne soit pas encore largement répandue. Conçue dans l'esprit de la dataDyne pour faire de mauvaises surprises, le modèle de base est pourvu d'une mine de proximité sous le canon. Vous devez vous débarrasser de votre arme pour utiliser le mode secondaire.\n", + /*297*/ "Le mode secondaire de cette arme semble être un 'détecteur de danger' repérant mines, appareils explosifs (tels que Dragon en mode secondaire) et armes sentinelles. Bien que puissante, cette arme dispose d'un chargeur trop petit.\n", + /*298*/ "Premier essai de l'Institut pour créer une arme de soutien, l'AR34 est un fusil d'assaut de base. Le mode secondaire est un zoom permanent. Optez plutôt pour le tir de précision.\n", + /*299*/ "La version lourde du Dragon. La mine a été remplacée par un petit lance-grenades. Il a été adopté par l'armée américaine comme arme de soutien d'escouade. Entraînez-vous à utiliser le lance-grenades.\n", + /*300*/ "La subtilité n'est pas de mise ici. Le premier mode est un tir simple et le second un tir double. Le chargeur est grand pour un fusil à pompe, mais méfiez-vous du long temps de rechargement et calculez vos mouvements en fonction de celui-ci.\n", + /*301*/ "Un fusil de sniper bien construit et pourvu d'un silencieux ainsi que d'un zoom à fort grossissement. Seul le tireur peut influer sur la précision du fusil. Utilisez le mode secondaire pour vous accroupir et stabiliser votre visée.\n", + /*302*/ "Bien que la technologie employée pour élaborer ce fusil soit au-delà de notre compréhension, nous pouvons toujours apprécier les effets du FarSight. Le tir est presque impossible à arrêter et la lunette peut inspecter à travers les murs sur une grande profondeur, verrouillant la cible si besoin est.\n", + /*303*/ "Le premier mode de l'arbalète est un tir de projectile soporifique, le second un tir de poison mortel à effet immédiat. C'est avant tout une arme pour les missions demandant une grande discrétion. Recharger cette arme prend du temps, attention donc à son utilisation en combat.\n", + /*304*/ "Le pistolet tranquillisant est de conception banale. On le trouve dans de nombreux laboratoires et hôpitaux à travers le monde. Le second mode projette des doses mortelles consommant beaucoup plus de sédatif.\n", + /*305*/ "Essayez de maîtriser cette arme du mieux que vous pouvez. Ce qui est certain, c'est qu'elle a été conçue pour un utilisateur beaucoup plus fort qu'un humain. Agenouillez-vous pour stabiliser votre visée. Si un ennemi réussit à passer à travers le rideau de feu, utilisez les canons comme broyeur pour hacher votre adversaire.\n", + /*306*/ "Un nouveau produit dataDyne pourvu d'une technologie intéressante. Le mode secondaire active un champ magnétique autour d'une grenade, lui permettant d'adhérer à une surface. Au bout d'un certain temps, le champ s'inverse et la grenade tombe de son point d'impact et explose.\n", + /*307*/ "Un lance-roquettes compact et réutilisable, qui se recharge après chaque tir. Le mode secondaire utilise une variante limitée du système de verrouillage de cible du CMP150, avec la possibilité de verrouiller une seule cible. Le missile se déplace plus lentement en traquant sa cible, un bon timing est donc essentiel.\n", + /*308*/ "Ce lance-roquettes skedar peut soit tirer des roquettes classiques soit des missiles guidés par l'utilisateur. Les Skedars éprouvent une satisfaction perverse lorsque la caméra située dans la tête du missile se rapproche de la cible. Le missile guidé accélère automatiquement mais peut être ralenti pour plus de maniabilité. L'explosion se produit au contact ou lorsque la détente est pressée.\n", + /*309*/ "Un couteau de combat bien trempé, également équilibré pour le lancer. La pratique est essentielle pour s'habituer à la portée et à la trajectoire de la lame.\n", + /*310*/ "Le département des armes expérimentales a développé ce laser de poignet avec deux rayons différents. Le premier mode envoie une salve à une distance considérable, tandis que le mode secondaire projette un rayon continu tant que le tir est maintenu.\n", + /*311*/ "La grenade anti-personnelle possède un détonateur réglé sur 4 secondes. Pour votre plaisir est inclus un mode secondaire: une grenade de proximité à effet de ricochet. La grenade rebondit partout et explose au bout d'un certain temps ou si une cible est détectée.\n", + /*312*/ "Cette grenade Maian sème le chaos dans l'esprit des créatures soumises à son effet. Si vous vous trouvez dans l'aire d'effet votre vision deviendra floue et vous lâcherez ce que vous tenez. La grenade peut être réglée pour exploser à l'impact ou déclenchée par détecteur de proximité. Prenez garde à la lancer assez loin.\n", + /*313*/ "L'utilisation des mines à retardement nécessite jugement et calcul. La cible peut dépasser la zone d'effet et vous seriez en danger. Exercez-vous avant de commettre une erreur fatale en situation de combat. La seconde fonction est un détecteur de danger identique à celui du K7 Avenger.\n", + /*314*/ "Le secret de l'efficacité des mines de proximité est de savoir les placer là où votre adversaire les attend le moins. Si vous pensez vous trouver dans une zone truffée de mines, utilisez le détecteur de danger pour les repérer. Cela vous fera peut-être perdre du temps, mais si ce n'est pas le cas, cela vous sauvera la vie.\n", + /*315*/ "La dernière génération de mines contrôlées à distance, identiques aux modèles plus anciens. Le premier mode place une mine et le second la fait exploser. Si vous ne voyez pas la mine, utilisez les bonnes vieilles techniques du hasard et du timing. \n", + /*316*/ "Holo 1 - Inspecter\n", + /*317*/ "Holo 2 - Mouvement 1\n", + /*318*/ "Holo 3 - Mouvement 2\n", + /*319*/ "Holo 4 - Lutte 1\n", + /*320*/ "Holo 5 - Lutte 2\n", + /*321*/ "Holo 6 - Combat réel 1\n", + /*322*/ "Holo 7 - Combat réel 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_g.c b/src/files/lang/pal-final/dish_str_g.c new file mode 100644 index 000000000..cb9b761da --- /dev/null +++ b/src/files/lang/pal-final/dish_str_g.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Nehmen Sie das Nachtsicht-Gerät vom Tisch, um zu beginnen.\n", + /* 9*/ "Aktivieren Sie die Nachtsicht.\nFinden Sie den Lichtschalter.\nSchalten Sie das Licht wieder ein.\n", + /* 10*/ "Nehmen Sie das Data Uplink-Gerät vom Tisch, um zu beginnen.\n", + /* 11*/ "Stellen Sie sich neben das Terminal und setzen Sie den Uplink ein.\n", + /* 12*/ "Sie müssen das Gerät bereithalten.\n", + /* 13*/ "Verbindung wurde hergestellt...\n", + /* 14*/ "Das Terminal wurde erfolgreich infiltriert.\n", + /* 15*/ "Verbindung abgebrochen - Entfernung zum PC ist zu groß.\n", + /* 16*/ "Nehmen Sie die ECM-Mine vom Tisch, um zu beginnen.\n", + /* 17*/ "Finden Sie den Schaltblock und platzieren Sie die ECM-Mine.\n", + /* 18*/ "Die ECM-Mine wurde nicht korrekt platziert.\n", + /* 19*/ "Die ECM-Mine wurde korrekt platziert.\n", + /* 20*/ "Nehmen Sie den CamSpy vom Tisch, um zu beginnen.\n", + /* 21*/ "Finden Sie den PC im Info-Raum und holografieren Sie ihn.\n", + /* 22*/ "Der PC wurde erfolgreich holografiert.\n", + /* 23*/ "Das Licht wurde wieder eingeschaltet.\n", + /* 24*/ "Nehmen Sie den Tür-Decoder vom Tisch, um zu beginnen.\n", + /* 25*/ "Setzen Sie den Decoder an der Konsole ein, um die Tür zu entriegeln.\n", + /* 26*/ "Sie müssen den Tür-Decoder bereithalten.\n", + /* 27*/ "Decoder wurde angebracht. Crack-Routine wurde initiiert...\n", + /* 28*/ "Decodierung abgeschlossen - Tür wurde entriegelt.\n", + /* 29*/ "Nehmen Sie den Tracker vom Tisch, um zu beginnen.\n", + /* 30*/ "Orten Sie den IR-Scanner mit Hilfe des Trackers.\n", + /* 31*/ "Der IR-Scanner wurde geortet.\n", + /* 32*/ "Nehmen Sie den IR-Scanner vom Tisch, um zu beginnen.\n", + /* 33*/ "Orten Sie die geheime Tür mit Hilfe des IR-Scanners.\n", + /* 34*/ "Die geheime Tür wurde erfolgreich geortet.\n", + /* 35*/ "Nehmen Sie den Röntgen-Scanner vom Tisch, um zu beginnen.\n", + /* 36*/ "Finden Sie die versteckten Schalter, um das Laser-Netz abzuschalten.\n", + /* 37*/ "Das gesamte Laser-Netz wurde abgeschaltet.\n", + /* 38*/ "Nehmen Sie die Verkleidung vom Tisch, um zu beginnen.\n", + /* 39*/ "Täuschen Sie jemanden, um an die Tarnkappe zu gelangen.\n", + /* 40*/ "Die Tarnkappe wurde erlangt.\n", + /* 41*/ "Laser-Netz 1 wurde deaktiviert.\n", + /* 42*/ "Laser-Netz 2 wurde deaktiviert.\n", + /* 43*/ "Ich bin hier, um die Ausrüstung abzuholen.\n", + /* 44*/ "Ach, Joanna. So täuschen Sie niemanden!\n", + /* 45*/ "Da, nehmen Sie das. Lassen Sie es nicht fallen!\n", + /* 46*/ "Die Tarnkappe wurde erfolgreich gesichert.\n", + /* 47*/ "Es war vorgesehen, dass Sie eine Verkleidung tragen.\n", + /* 48*/ "Sie müssen sich ein wenig mehr anstrengen, Joanna.\n", + /* 49*/ "Joanna, wo sind Sie denn rausgekrochen?\n", + /* 50*/ "Sie wurden von einer Kamera erfasst.\n", + /* 51*/ "Nehmen Sie die Tarnkappe vom Tisch, um zu beginnen.\n", + /* 52*/ "Setzen Sie die Tarnkappe ein und orten Sie Carrington.\n", + /* 53*/ "Ich kann ruhigen Gewissens behaupten,\ndass Ihr Training abgeschlossen ist!\n", + /* 54*/ "Mission abgeschlossen - Geräte-Training bestanden!\n", + /* 55*/ "Mission fehlgeschlagen - Sie wurden entdeckt.\n", + /* 56*/ "Wählen Sie den Uplink aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 57*/ "Wählen Sie den CamSpy aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Uplink und lassen Sie den A-Knopf los.\n", + /* 58*/ "Wählen Sie das Nachtsicht-Gerät aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie das Gerät und lassen Sie den A-Knopf los.\n", + /* 59*/ "Wählen Sie den Tür-Decoder aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tür-Decoder und lassen Sie den A-Knopf los.\n", + /* 60*/ "Wählen Sie den Röntgen-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Scanner und lassen Sie den A-Knopf los.\n", + /* 61*/ "Wählen Sie die Verkleidung aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Verkleidung und lassen Sie den A-Knopf los.\n", + /* 62*/ "Wählen Sie den IR-Scanner aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den IR-Scanner und lassen Sie den A-Knopf los.\n", + /* 63*/ "Wählen Sie den Tracker aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie den Tracker und lassen Sie den A-Knopf los.\n", + /* 64*/ "Wählen Sie die Tarnkappe aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die Tarnkappe und lassen Sie den A-Knopf los.\n", + /* 65*/ "Wählen Sie die ECM-Mine aus.\n- Halten Sie den A-Knopf gedrückt.\n- Ändern Sie die Auswahl mit dem analogen 3D-Stick.\n- Markieren Sie die ECM-Mine und lassen Sie den A-Knopf los.\n", + /* 66*/ "Joanna, schön, Sie zu sehen.\n", + /* 67*/ "Kommen Sie mit, Joanna.\nIch führe Sie herum.\n", + /* 68*/ "Das Informations-Center befindet sich hinter dieser Tür.\n", + /* 69*/ "Hier haben wir das Entwicklungs-Labor.\n", + /* 70*/ "Hier geht es zum Simulations-Raum.\n", + /* 71*/ "Das ist der Schießstand, Jo.\n", + /* 72*/ "Dieser Korridor führt zum Hangar.\n", + /* 73*/ "HOVERCRATE \nStellen Sie sich neben die Hovercrate und drücken Sie den B-Knopf.\n", + /* 74*/ "Drücken Sie den B-Knopf erneut, um die Hovercrate loszulassen.\n", + /* 75*/ "HOVERBIKE \nDrücken Sie den B-Knopf zweimal, um das Bike zu fliegen.\n", + /* 76*/ "Drücken Sie den B-Knopf zweimal, um wieder abzusteigen.\n", + /* 77*/ "ÖFFEN VON TÜREN \nDrücken Sie den B-Knopf, um eine Tür zu öffnen.\n", + /* 78*/ "Mit Hilfe des B-Knopfs können auch andere Objekte aktiviert werden.\n", + /* 79*/ "AUFZÜGE \nDrücken Sie den B-Knopf, um den Aufzug zu rufen.\n", + /* 80*/ "Während des Trainings können Sie nicht hinausgehen.\n", + /* 81*/ "Code 1 wurde erlangt.\n", + /* 82*/ "Code 2 wurde erlangt.\n", + /* 83*/ "Code 3 wurde erlangt.\n", + /* 84*/ "Code 4 wurde erlangt.\n", + /* 85*/ "BLICK NACH OBEN \n- Drücken Sie den C-Knopf unten, um nach oben zu schauen.\n", + /* 86*/ "BLICK NACH UNTEN \n- Drücken Sie den C-Knopf oben, um nach unten zu schauen.\n", + /* 87*/ "Holoprogramm 2 wurde erfolgreich abgeschlossen.\n", + /* 88*/ "Holoprogramm 4 wurde erfolgreich abgeschlossen.\n", + /* 89*/ "Holoprogramm 5 wurde erfolgreich abgeschlossen.\n", + /* 90*/ "Die Wache wurde erfolgreich entwaffnet.\n", + /* 91*/ "Die Wache wurde erfolgreich KO geschlagen.\n", + /* 92*/ "Entwaffnen Sie diese Person.\n", + /* 93*/ "Schlagen Sie diese Person KO. Tarnung ist der Schlüssel.\n", + /* 94*/ "Und die letzte Wache...\n", + /* 95*/ "DUCKEN\n- Halten Sie die R-Taste gedrückt, und drücken Sie den C-Knopf unten.\n", + /* 96*/ "HOCKEN\n- Ducken Sie sich, und halten Sie den C-Knopf unten gedrückt.\n", + /* 97*/ "Holoprogramm 3 wurde erfolgreich abgeschlossen.\n", + /* 98*/ "Betätigen Sie alle Schalter.\n", + /* 99*/ "Betätigen Sie alle Schalter an der Wand.\n- Sie müssen schnell sein, da sie rasch zurückspringen.\n", + /*100*/ "Erlangen Sie die Codes, indem Sie die Terminals untersuchen.\n- Wenden Sie die Codes an den Wand-Terminals an.\n", + /*101*/ "Code 1 wurde erlangt.\n", + /*102*/ "Code 2 wurde erlangt.\n", + /*103*/ "Code 3 wurde erlangt.\n", + /*104*/ "Code 4 wurde erlangt.\n", + /*105*/ "Aufgabe nicht erfüllt - Sie müssen nach vorne schauen.\n", + /*106*/ "Holoprogramm 1 wurde erfolgreich abgeschlossen.\n", + /*107*/ "Unbewaffneter Kampf - Schlagen Sie das Ziel KO.\n- Drücken Sie den Z-Trigger in rascher Abfolge.\n", + /*108*/ "Versuchen Sie sich jetzt gegen ein bewegliches Ziel.\n", + /*109*/ "Und abschließend ein Ziel, das sich auch wehrt.\n", + /*110*/ "Besiegen Sie alle Gegner, ohne selbst getroffen zu werden.\n", + /*111*/ "Aufgabe nicht erfüllt - Sie wurden getroffen.\n", + /*112*/ "Holoprogramm 6 wurde erfolgreich abgeschlossen.\n", + /*113*/ "Holoprogramm 7 wurde erfolgreich abgeschlossen.\n", + /*114*/ "TERMINALS\n- Drücken Sie den B-Knopf, um ein Terminal zu aktivieren.\n", + /*115*/ "Aktiveren Sie die roten Terminals an den Wänden.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Okay, Jo, ich lasse Sie allein, damit Sie sich vorbereiten können.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Menschlich (weiblich)\n", + /*127*/ "23 Jahre 2 Monate\n", + /*128*/ "|CI File #027 -\n\nTrainings-Status: Komplettiert\nBewertung: A++\nAktiver Status: im Einsatz\n\n|Profil -\n\nBestens trainiert, aber unerfahren. Herausragende Reaktionen. Vertraut mit verschiedensten Waffen. Sehr kompetenter All-round-Agent. Durch die Erreichung der besten Trainingsergebnisse musste eine neue Bewertung erdacht werden. Die Verkörperung des idealen Agenten des Carrington Instituts, daher die Bezeichnung 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Menschlich (männlich)\n", + /*131*/ "28 Jahre 5 Monate\n", + /*132*/ "|CI File #009 -\n\nTrainings-Status: Komplettiert\nBewertung: A+\nAktiver Status: Undercover\n\n|Profil -\n\nUnser erfahrenster Undercover-Agent. Hervorragend im Umgang mit der Waffe seiner Wahl (ein Magnum Revolver). Eignet sich perfekt für Undercover- Missionen, weniger geeignet für Kampfeinsätze. Vor Joanna Dark hatte er die Ehre, das beste Trainingsergebnis erreicht zu haben.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Menschlich (männlich)\n", + /*135*/ "62 Jahre 8 Monate\n", + /*136*/ "|CI File #000 -\n\nTrainings-Status: K/A\nBewertung: K/A\nAktiver Status: K/A\n\n|Profil -\n\nIntelligenter, patriarchischer Wissenschaftler/Unternehmer und Gründer des Carrington Instituts. Plant alle Missionen, in die seine Agenten entsandt werden, und betreut jede Operation selber von seinem Büro aus. Kleidet sich mitunter etwas eigenartig.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Menschlich (weiblich)\n", + /*139*/ "39 Jahre ? Monate\n", + /*140*/ "|Analytische Daten -\n\nDer Kopf von dataDyne. Süchtig nach Macht; möchte niemandem untergeben sein. Sie hasst es, die Initiative zu verlieren. Ist in der Lage, äußerst skrupellose Aktionen durchzuführen, um die Konkurrenz hinter sich zu lassen. Hat vor allem gegenüber Daniel Carrington, den sie verabscheut, keine Skrupel.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Menschlich (männlich)\n", + /*143*/ "46 Jahre ? Monate\n", + /*144*/ "|Analytische Daten -\n\nChef der Nationalen Sicherheit. Es besteht eine Verbindung zu Cassandra De Vries, obwohl es eher nach einer Interessensgemeinschaft aussieht. Er wird tun, was Cassandra ihm sagt, da selbst seine dominante Persönlichkeit durch die von De Vries in den Schatten gestellt wird. Die Graue Eminenz hinter einigen der subversiven Elemente innerhalb der NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Der Caroll-Sapient (AI)\n", + /*147*/ "6 Monate\n", + /*148*/ "|Profil -\n\n Eine von dataDyne entwickelte künstliche Intelligenz mit einer Vorliebe für Fremdsprachen und Decodierung. Er war in der Lage, eigene Moral zu entwickeln, und konnte aufgrund seiner überragenden Intelligenz die Pläne von dataDyne erahnen. Seine Stimme ist äußerst präzise moduliert, und simuliert den Charakter eines Akademikers.\n", + /*149*/ "Elvis\n", + /*150*/ "Maianer (männlich)\n", + /*151*/ "320 Jahre\n", + /*152*/ "|Profil -\n\nEin Alien aus der Rasse der Maianer. Er ist der 'Protektor' (Bodyguard) des Maianischen Botschafters, der auf die Bitte von Carrington zur Erde reist. Protektoren sind im Umgang mit verschiedenen Waffen trainiert. Elvis ist terraphil. Er findet die Erde und alles, was mit ihr in Zusammenhang steht, ausgesprochen faszinierend.\n", + /*153*/ "Mr. Blond\n", + /*154*/ "Menschlich (männlich)\n", + /*155*/ "Endzwanziger\n", + /*156*/ "|Profil -\n\n Ein hellblonder, menschlicher Mann. Sehr groß, trägt weiße Kleidung, meistens einen Regenmantel. Scheint hinter der Verschwörung zu stecken, in die Cassandra und Trent verwickelt sind. Mehr ist nicht bekannt.\n", + /*157*/ "Mr. Blond\n", + /*158*/ "Skedar (verkleidet)\n", + /*159*/ "unbekannt\n", + /*160*/ "|Neuestes Profil -\n\nEs handelt sich um einen Skedar-Krieger, der durch eine holografische Projektion als hellblonder, junger Mann in den späten Zwanzigern erscheint. Eine orale Modulationseinheit verleiht ihm eine präzise, intelligente Stimme. Dieses Gerät ist übrigens ein hervorragendes Manipulations-Werkzeug der Skedar.\n", + /*161*/ "Der US-Präsident\n", + /*162*/ "Menschlich (männlich)\n", + /*163*/ "50 Jahre\n", + /*164*/ "|Profil -\n\nEin gebildeter, scharfsinniger Afro-Amerikaner, der ständig versucht, die beste Entscheidung zu finden. Ist allerdings von Leuten wie Trent Easton umgeben, den er unter Kontrolle zu haben glaubt, nachdem er untersagt hat, die Pelagic II an dataDyne zu vergeben. Ihn als 'lenkbar' zu bezeichnen, wie es die Mehrheit der politischen Kommentatoren ist, wäre allerdings nichts anderes als ein Akt der Unfairness.\n", + /*165*/ "Maianer\n", + /*166*/ "Die Maianer sind eine außerirdische Rasse, die auf der Erde unter dem Namen 'die Grauen' bekannt sind. Sie beobachten die Erde schon seit langer Zeit. Der Menschheit gegenüber sind sie wohlgesonnen, und erkennen großes Potential in der Erdbevölkerung. Ihre irdische Kontaktperson ist Daniel Carrington. Ein formeller politischer Kontakt muss aber erst eingeleitet werden.\n", + /*167*/ "Skedar-Krieger\n", + /*168*/ "Die Skedar sind eine kriegerische Rasse von Aliens, die schon seit Jahrhunderten gegen die Maianer kämpfen. Erst kürzlich haben sie einem Waffenstillstand zugestimmt. Da sie selbst sehr klein und schlangenähnlich sind, benutzen sie zur Fortbewegung und im Kampf mechanische Armaturen. Sehr aggressiv! Sie haben Krieg zu einer Religion erhoben und sind extrem devot.\n", + /*169*/ "Hintergrund\n", + /*170*/ "Vor Millionen von Jahren wurde vom Volk der Cetaner ein gewaltiges außerirdisches Schlachtschiff auf dem Grunde des Pazifischen Ozeans versenkt. Auf dem Schiff befindet sich eine nicht erprobte Waffe, die theoretisch in der Lage ist, die nukleare Verbindung zwischen jeglichen Molekülen aufzuheben. Um etwaige Beobachter in dem Glauben zu lassen, das Schiff wäre zerstört worden, wurde ein Satellit in das Heimatsystem der Cetaner geschickt. Denn in Wirklichkeit handelt es sich bei dem Schiff um einen lebenden Organismus...\n\nEine andere Rasse, die Maianer, entdeckt im Jahr 2000 das Leben auf der Erde. Sie erkennen zwar ein gewisses Potential in der menschlichen Rasse, beschließen aber, die für sie primitiv wirkenden Menschen sich ohne ihre Einmischung entwickeln zu lassen.\nDie Maianer trafen im Jahr 1650 (Erdzeitrechnung) auf die Skedar. Es kommt zu einem Kampf, der sich zu einem langwierigen Krieg ausweitet. Nach Jahrhunderten des Kampfs entsteht ein unsicherer Frieden. Fanatische Skedar versuchen ständig, diesen Frieden durch terroristische Aktionen zu stören. Aber die Maianer lassen sich auf keine Kampfhandlungen ein.\n\nDie Maianer erkennen, dass aufgrund fortschreitender Technologien und gewissen 'äußeren Einflüssen' immer mehr Krisenherde auf der Erde entstehen. Sie befürchten, dass noch mehr Unruhe entstehen könnte, wenn sie ihre Existenz offenbaren würden. Daher beschließen sie, den Planeten weiter zu beobachten, bis die Menschen ein höheres Entwicklungsstadium erreicht haben.\n\n1985 greift Daniel Carrington dem Plan der Maianer vor, indem er eines ihrer Schiffe kontaktiert, das die Erde vom Orbit aus beobachtet. Er hat einen Plan, der beiden Parteien von Nutzen sein könnte. Das Resultat wäre eine schnellere Annäherung zwischen Menschen und Maianern. Die Maianer haben Vertrauen in Carrington und erlauben ihm, ihre Technologien auf der Erde einzuführen.\n\n2006 entdecken die fanatischen Skedar den Satelliten der Cetaner. Daraufhin suchen sie die Erde nach dem Schlachtschiff ab. Dabei setzen sie ihre wenig subtilen Methoden ein, zu denen auch die Entführung von Menschen und die Verstümmelung von Tieren gehören. Ihre Untersuchungsergebnisse weisen auf einen Ort im Pazifischen Ozean hin, wo sie das Schiff auch finden. Allerdings sind sie nicht in der Lage, es ohne Hilfe zu bergen.\n\nNun beginnen die Skedar selbst damit, die Erde zu erforschen. Sie erstellen eine Liste mit Firmen, die über die nötigen Ressourcen verfügen, um ihnen bei der Bergung behilflich zu sein. An der Spitze dieser Liste steht der Name dataDyne. Cassandra De Vries, der Vorstand der Firma, wird von den Skedar kontaktiert. Ihr wird ein Deal vorgeschlagen, der sich zu gut anhört, um wahr zu sein - und genauso ist es auch. Als Dank für die Bergungsarbeiten versprechen die Skedar, dass sie dataDyne mit genügend Technologien versorgen, um die Firma zum mächtigsten Konzern des Planeten zu machen. Alles, was dataDyne tun muss, ist eine künstliche Intelligenz zu erschaffen. Sie sollte in der Lage sein, jeglichen Cetanischen Code knacken zu können. Keine leichte Aufgabe, aber durchaus im Bereich des Möglichen. Die Arbeiten beginnen.\n\nCassandra De Vries kontaktiert den Kopf der NSA, Trent Easton, und informiert ihn über alle Details. Er soll versuchen, ein Tiefsee-Forschungsschiff der Regierung zu leihen. Aber der Präsident verweigert seine Zusage. Es gibt keine Möglichkeit das Schiff zu stehlen, ohne dass die Aufmerksamkeit der US-Regierung auf dataDyne gelenkt wird. Daher wird ein Plan ausgeheckt, demzufolge der Präsident durch einen Klon ersetzt werden soll. Auf diese Weise wäre die Kontrolle in den Händen von Easton und De Vries. Außerdem würden dadurch noch einige Extra-Vergünstigungen für die Verschwörer herausspringen, nachdem die Operation der Skedar erst durchgeführt worden ist.\n\nAllerdings hätten die beiden nicht viel Zeit, sich mit ihrem Triumpf zu brüsten, denn die Skedar beabsichtigen, die Cetanische Waffe an der Erde zu testen, bevor sie damit gegen die Maianer vorgehen. Cassandra ist durch ihre Machtgier zu sehr geblendet, als dass sie diese Taktik durchschauen könnte. Leider betrifft dieses Verhalten auch Trent Easton, der ebenso durch Visionen von Luxus und Macht hindurch die Tatsachen nicht mehr erkennen kann.\n\nAber dataDyne hat etwas produziert, das durchaus in der Lage ist, diese Gefahr zu erkennen: Der Sapient, die künstliche Intelligenz, die dafür vorgesehen war, die Zutrittscodes des Cetanischen Schiffs zu knacken. Als die Maschine wagt, ihre Bedenken zu äußern, veranlasst Cassandra De Vries, dass dem Sapienten seine Persönlichkeit entzogen werden soll. In einem Akt der Verzweiflung tritt die Maschine mit dem Carrington Institut in Kontakt. Unter dem Namen Dr. Caroll dringt ein Hilferuf an Daniel Carringtons Ohr...\n", + /*171*/ "Die Geschichte\n", + /*172*/ "Joanna Dark, eine frischgebackene Agentin, wird damit beauftragt, einen Wissenschaftler aus der Forschungsabteilung tief unter dem dataDyne-Gebäude zu befreien. Ihr Erstaunen ist groß, als sie erkennt, dass es sich bei Dr. Caroll um eine KI handelt. Nichtsdestotrotz setzt sie ihre Mission fort, und bringt ihn/es in Sicherheit. Während der Mission wird der Alarm ausgelöst, und Joanna muss sich bis ins oberste Stockwerk vorkämpfen, um dort von einem Fluchtschiff abgeholt zu werden.\n\ndataDyne erkennt in Daniel Carrington den Drahtzieher dieser Aktion. Zwei Tage später wird er in seiner eigenen Villa als Geisel genommen. Verlangt wird die Aushändigung der KI im Austausch für Daniel Carringtons Leben. Was dataDyne nicht weiß, ist die Tatsache, dass sich die KI bereits in der Villa befindet. Carrington wollte im Gespräch mit Dr. Caroll mehr über die von dataDyne geplanten Aktivitäten erfahren. Joanna rettet Daniel, kann aber nicht verhindern, dass Dr. Caroll in die Hände des Konzerns fällt. Allerdings konnte Carrington genug Information in Erfahrung bringen, um ein Team Maianischer Spezialisten auf die Erde zu bestellen.\n\nJoanna wird nach Chicago geschickt, um bei einem Meeting der Verschwörer im G5-Building zu spionieren. Sie erfährt, dass Trent Easton, der Chef der NSA, ebenso in diese Konspiration verwickelt ist, wie ein seltsamer skandinavischer Mann, der offensichtlich der Kopf des ganzen Plots ist. Nachdem von Trent erörtert worden ist, wie er gegen den Präsidenten vorgehen möchte, sendet Jo einen Hilferuf an das Institut. Allerdings erfährt sie, dass noch eine dringendere Aufgabe auf sie wartet.\n\nDas Spezialisten-Team wurde von den Verschwörern abgefangen. Die Überlebenden des Absturzes sowie die Trümmer der Maschine wurden in die Area 51 nach Nevada gebracht. Joanna wird dort abgesetzt, um mit einem anderen Agenten des Instituts Kontakt aufzunehmen. Zusammen sollen sie alle Überlebenden und deren Ausrüstung in Sicherheit bringen. Nachdem es Joanna gelingt, ins medizinische Labor einzudringen, lüftet sie das größte Geheimnis des Carrington Instituts: Bei den Verbündeten handelt es sich um Maianer. Aliens, die als ‚die Grauen' bekannt sind. Der Außerirdische, den sie retten kann, wird Elvis genannt. Er war ein Bodyguard des Maianischen Botschafters, der das Spezialistenteam anführen sollte.\n\nNachdem es Joanna gelungen ist, den einzigen Überlebenden der Maianischen Delegation zu retten, wendet sie sich wieder dem Präsidenten und seiner Bedrohung durch dataDyne zu. Sie gibt sich als Crew-Mitglied aus, um in die Basis zu gelangen, wo die Air Force One stationiert ist. Es gelingt ihr auch, an Bord zu gelangen. Während des Flugs treten Trent und der getarnte Skedar in Aktion. Aber wiederum gelingt es Joanna, beide aufzuhalten. Während Trents Leute das Flugzeug nach dem Präsidenten absuchen, wird dieser von Joanna zu einer Fluchtkapsel gebracht. Trents Plan wäre gewesen, den glücklosen Politiker an Bord eines Skedar-UFO zu bringen, das an der Air Force One angedockt hat. Jo gelingt es zwar, die Halterung zu beschädigen, sie schafft es aber nicht, sie zu zerstören. Die Agentin verständigt Elvis, der einen Kamikaze-Angriff auf das UFO durchführt. Alle drei Vehikel stürzen über Alaska ab. Die Fluchtkapsel kann die AF1 aber noch verlassen.\n\nAls Jo erwacht und versucht, das Insitut zu erreichen, muss sie feststellen, dass ihre Übertragung durch ein Störsignal der Skedar unterbrochen wird. Sie macht sich auf, um Elvis und den Präsidenten zu finden. Dabei trifft sie auf getarnte Skedar-Trupps, die nach ihr suchen. Sie folgt einem dieser Trupps bis zu einem Skedar-Schiff, wo sie einen Klon des Präsidenten findet. Joanna Dark zerstört den Klon, deaktiviert das Störsignal und ruft die Kavallerie. Einmal mehr wurden die dunklen Machenschaften der Skedar vereitelt, der Präsident wurde gerettet, und Trent wird von den Skedar für seine Inkompetenz grausam bestraft.\n\ndataDyne und die Skedar geben nun nichts mehr auf verdeckte Operationen. Sie stehlen das Tiefsee-Forschungsschiff 'Pelagic II' und machen sich auf den Weg zur Absturzstelle des Cetanischen Raumschiffs. Joanna und Elvis unterbrechen die Aktion und finden heraus, worum es ihren Gegnern eigentlich geht. Anschließend gelangen sie mit einem Tauchboot zum Grund des Meeres und sehen zum ersten Mal das außerirdische Schlachtschiff. Das Team betritt das Schiff durch den Eingang, der von den Skedar erschaffen wurde und treffen auf einen leblosen Skedar. Offenbar scheint außer ihnen noch jemand an Bord zu sein. Nach zahllosen Kämpfen gegen Skedar und Cetaner, erreichen Joanna und Elvis das Herz des Schiffs. Dort angekommen finden sie die KI, die einst Dr. Caroll war. Nachdem seine Persönlichkeit wieder hergestellt wurde, drängt er Joanna und Elvis, das Schiff zu verlassen, da er es endgültig zerstören möchte.\n\nZurück im Carrington Institut bereitet sich Joanna für einen Empfang im Weißen Haus vor, als sich die Ereignisse plötzlich überstürzen. Die überlebenden Skedar richten ihren Zorn nun gegen jene Personen, die sie für das Scheitern ihrer Mission verantwortlich machen. Joanna durchkämmt das Institut, um so viele Angestellte wie möglich zu retten. Währenddessen attackieren die Skedar alle Teile des Gebäudes. Der Mehrheit der anwesenden Personen gelingt die Flucht. Joanna jedoch wird bewusstlos geschlagen, bevor sie sich in Sicherheit bringen kann.\n\nAls sie das Bewusstsein wiedererlangt, befindet sich Joanna in einer Zelle an Bord eines Skedar-Schlachtschiffs. Auch Cassandra De Vries hat das Schicksal ereilt. Allerdings stirbt der Kopf von dataDyne bei dem Versuch, ein Ablenkungsmanöver zu starten, um Joanna die Flucht zu ermöglichen. Jo gelingt es, die Schutzschilde zu deaktivieren. Elvis erscheint mit einigen Freunden, und eine fulminante 'Party' beginnt.\n\nDas gekaperte Schiff gelangt in den Orbit über dem Kriegsschrein der Skedar. Elvis kann seinen Augen nicht trauen, da es den Maianern niemals gelungen ist, diesen heiligen Ort der Skedar zu finden. Wird der Schrein zerstört, wäre dies auch ein harter Schlag gegen die Moral der Skedar. Auf diese Weise könnte ein anhaltender Frieden, anstatt eines unsicheren Waffenstillstands erzielt werden. Jo macht sich auf die Suche nach dem Anführer der Skedar, während Elvis die Maianische Flotte zu Hilfe ruft.\n\nLetztendlich liegt der Schrein in Trümmern. Elvis bittet um eine Unterbrechung des Bombardements, um nach Joanna zu suchen. Glücklicherweise ist sie am Leben, begraben unter Schutt und Asche. Allerdings hält noch ein Skedar ihren Fuß umklammert. Elvis gibt ihr eine Waffe, um dieses letzte Hindernis zu beseitigen. Der Schrein wurde zerstört, die Verschwörung wurde gestoppt, und beide können ruhigen Gewissens in den Orbit zurückkehren.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "Die monolithische Firma, zu der dataDyne geworden ist, begann als Systemprogrammierer für künstliche Intelligenzen. Als klar wurde, dass die Firma ihr Haupteinkommen durch die Zusammenarbeit mit dem Militär bezieht, begann eine junge, aufstrebende Managerin namens Cassandra De Vries Geschäfte mit Waffenherstellern abzuwickeln. Angebote von Daniel Carrington bezüglich einer Zusammenarbeit mit dem Institut im Bereich der Quantentechnik, lehnte sie stets ab. Nach der Fusion mehrerer Firmen schossen die Profite in astronomische Höhen. Nach einem Monat stand ein Vertrag mit der Regierung zur Entwicklung von Waffen. Ein hoher Prozentsatz des Ertrags wurde der Entwicklung von KI-Systemen zugeführt. Wie sich zeigt, mit hervorragenden Resultaten.\n", + /*175*/ "Carrington Institut\n", + /*176*/ "Als Pfuscher verschrien, schaffte es Daniel Carrington, die erste Anti-Grav-Technologie zu entwickeln. Die dadurch erhaltenen Einkünfte trugen dazu bei, das Carrington Institut aufzubauen, eine hochtechnisierte Denkfabrik mitten in den USA. Das Institut ist auch die Ausbildungsstätte für Agenten, die in alle Länder der Welt entsandt werden, um die Fortschritte verschiedener Technologien zu verfolgen. Diese Überwachungsfunktion hat, schon mehrfach Missbrauch verhindert.\n", + /*177*/ "Beschreibung\n- Eine kleine, ferngesteuerte Kamera für verdeckte Untersuchungen. Ausgerüstet für spektroskopische Holografie. Öffnet Türen durch Projektion von Körperwärme.\n\nTraining\n- Holgrafieren Sie das Terminal des Hackers im Raum nebenan.\n\nBedienung\n- Drücken Sie den Z-Trigger um zu holografieren. Durch Drücken des B-Knopfs werden Türen geöffnet. Drücken Sie die R-Taste, um sich umzusehen.\n", + /*178*/ "Beschreibung\n- Verstärkt Licht, um die Umgebung besser wahrnehmen zu können. Lebensformen werden hervorgehoben. Unter normaler Beleuchtung ist die Wahrnehmung überlastet.\n\nTraining\n- Finden Sie den Lichtschalter im Dunkeln und betätigen Sie ihn.\n\nBedienung\n- Wählen Sie das Nachtsichtgerät aus Ihrem Inventar. Wählen Sie es nochmals, um es zu deaktivieren.\n", + /*179*/ "Beschreibung\n\n- Vorrichtung um Codes zu knacken. Wird an den jeweiligen Kontrollen angebracht, und geht alle Varianten durch, bis das Schloss geöffnet wird.\n\nTraining\n- Setzen Sie den Decoder an der Konsole neben der Tür ein, um sie zu öffnen.\n\nBedienung\n- Stellen Sie sich neben die Konsole und drücken Sie den B-Knopf, nachdem Sie den Decoder ausgewählt haben.\n", + /*180*/ "Beschreibung\n\n- Dient dazu, durch feste Objekte zu sehen. Macht Dinge sichtbar, die das Nachtsichtgerät und die IR-Brillen nicht erfassen können.\n\nTraining\n- Suchen Sie mit dem Röntgen-Scanner die zwei versteckten Schalter, und schalten Sie mit ihnen die Laser ab.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*181*/ "Beschreibung\n\n- Verkleiden Sie sich, um nicht erkannt zu werden. Achten Sie aber darauf, nicht von einem scharfsinnigen Gegner demaskiert zu werden.\n\nTraining\n- Grimshaw hat eine Tarnkappe, die mal zum 'Service' müsste. Gehen Sie zu ihm und 'erlangen' Sie sie.\n\nBedienung\n- Um die Verkleidung zu tragen, wählen Sie sie aus Ihrem Inventar.\n", + /*182*/ "Beschreibung\n\n- Verwandelt thermische Daten in sichtbare Bilder. Kann auch in der Dunkelheit benutzt werden. Zeigt auch Anomalien, wie versteckte Türen und brüchige Wände.\n\nTraining\n- Aktivieren Sie den Scanner, finden Sie die Tür und öffnen Sie sie.\n\nBedienung\n- Wählen Sie den Scanner aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*183*/ "Beschreibung\n- Ortet ein bestimmtes Objekt auf einer Radar-Karte. Zeigt auch die relative Lage und Entfernung.\n\nTraining\n- Aktivieren Sie den Tracker und folgen Sie der Signatur, um den Gegenstand zu finden.\n\nBedienung\n- Wählen Sie den Tracker aus Ihrem Inventar. Wählen Sie ihn nochmals, um ihn zu deaktivieren.\n", + /*184*/ "Beschreibung\n- Unterbricht das sichtbare Lichtspektrum rund um den Träger. Erschafft einen chamäleonähnlichen Effekt. Das Feld bricht zusammen, wenn der Träger eine Waffe abfeuert.\n\nTraining\n- Aktivieren Sie die Tarnkappe und gehen Sie zu Carrington, um ihn zu überraschen!\n\nBedienung\n- Wählen Sie die Tarnkappe aus Ihrem Inventar. Wählen Sie sie nochmals, um sie zu deaktivieren.\n", + /*185*/ "Beschreibung\n- Sendet ein ständig wechselndes Signal, um jegliche elektronische Kommunikation zu stören. Muss direkt am Objekt platziert werden.\n\nTraining\n- Werfen Sie die ECM-Mine an den Schaltblock hinter der versteckten Tür.\n\nBedienung\n- Drücken Sie den Z-Trigger, um die Mine zu werfen. Halten Sie den R-Knopf gedrückt und zielen Sie mit dem analogen 3D-Stick.\n", + /*186*/ "Beschreibung\n- Stellt eine Verbindung zwischen dem Agenten und den Hackern des Instituts her, die dann Daten kopieren oder elektronisch gesicherte Schlösser knacken können.\n\nTraining\n- Hacken Sie sich mit dem Data Uplink in das Terminal in der Ecke, um eine geheime Tür zu öffnen.\n\nBedienung\n- Stellen Sie sich neben das Terminal und drücken Sie den B-Knopf, nachdem Sie den Uplink ausgewählt haben.\n", + /*187*/ "SCHIESSEN\n Drücken Sie den Z-Trigger, um eine Waffe abzufeuern.\n", + /*188*/ "AUTO RELOAD\n Lassen Sie den Z-Trigger los, wenn Sie keine Munition mehr haben.\n", + /*189*/ "MANUELLER RELOAD\n Drücken Sie den B-Knopf, um manuell nachzuladen.\n", + /*190*/ "Zielen: Halten Sie die R-Taste gedrückt, um den Ziel-Modus zu aktivieren.\n", + /*191*/ "Justieren Sie Ihr Visier, indem Sie den analogen 3D-Stick bewegen.\n", + /*192*/ "AUTO FEUER\n Halten Sie den Z-Trigger gedrückt, um automatisch zu feuern.\n", + /*193*/ "ZIELHÖHE\n Drücken Sie die C-Knöpfe oben oder unten, um die Sicht anzupassen.\n", + /*194*/ "ZOOM\n Halten sie die R-Taste gedrückt, um den Zoom-Modus zu aktivieren.\n", + /*195*/ "SCHNELLFEUER\n Drücken Sie den Z-Knopf in rascher Abfolge, um schneller zu feuern.\n", + /*196*/ "Carrington Institut\0|Basis der Operationen\n", + /*197*/ "Lucerne Tower\0|Globales Hauptquartier\n", + /*198*/ "Laboratorgeschoss\0|Unterirdisches Forschungslabor\n", + /*199*/ "Carrington Villa\0|Private Residenz\n", + /*200*/ "Chicago\0|Die dunklen Gassen der Stadt\n", + /*201*/ "G5-Building\0|Deckmantel der dataDyne Corporation\n", + /*202*/ "Area 51\0|Nahe dem Groom Dry Lake, Nevada\n", + /*203*/ "Stützpunkt Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Das Flugzeug des Präsidenten\n", + /*205*/ "Absturzstelle\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Tiefsee-Forschungsschiff\n", + /*207*/ "Cetanisches Schiff\0|Das größte außerirdische Schiff\n", + /*208*/ "Skedar-Schiff\0|Raumfschiff für Truppentransporte\n", + /*209*/ "Heimat der Skedar\0|Der Planet des Kriegs-Schreins\n", + /*210*/ "Jumpship\0|Agiler Truppentransporter\n", + /*211*/ "HoverCrate\0|Antigraviations-Vorrichtung\n", + /*212*/ "HoverBike\0|Niedrigfliegendes Vehikel\n", + /*213*/ "Reinigungs-Roboter\0|Dein hilfreicher kleiner Freund\n", + /*214*/ "Hovercopter\0|Urbanes Gunship\n", + /*215*/ "G5-Roboter\0|Urbaner Kampf-Droid\n", + /*216*/ "A51 Interceptor\0|Robotische Abfang-Einheit\n", + /*217*/ "Maianisches Schiff\0|Späh- und Patrouillen-Schiff\n", + /*218*/ "Skedar-Shuttle\0|Truppen-Landungsschiff\n", + /*219*/ "Das Instituts-Gebäude beinhaltet viele verschiedene Bereiche: Büros und Laboratorien, Workshops und Hangars. Da es von der Außenwelt relativ isoliert ist, können die Operationen leichter verdeckt werden.\n", + /*220*/ "Mitten im Geschäftsviertel hebt sich der dataDyne-Wolkenkratzer durch seine enorme Größe von der Umgebung ab.\n", + /*221*/ "Die schwer bewachten, gut versteckten Labors beinhalten den Schlüssel zu dataDynes Zukunft. In ihnen arbeiten Techniker an streng geheimen Projekten, die dataDyne noch weiter nach oben bringen sollen.\n", + /*222*/ "Daniel Carringtons Residenz ist quasi sein Fluchtort vor dem Stress innerhalb des Instituts. Neben einem Observatorium verfügt die Villa über einen Windkraft-Generator und einen gut ausgestatteten Weinkeller.\n", + /*223*/ "Ein schmutziger, verkommener Stadtteil Chicagos, abgeschnitten vom Bodenverkehr. Hier hat die G5-Corporation ihr Hauptquartier.\n", + /*224*/ "Im G5-Building befindet sich ein Meetingraum, der durch Anti-Aufnahme-Geräte geschützt wird. Dies ist für dataDyne der sicherste Ort, um vertrauliche Pläne zu besprechen.\n", + /*225*/ "Diese Sektion des als Area 51 bekannten Luftwaffenstützpunktes befindet sich nahe des Groom Dry Lake. Helipads und Kommunikationstürme lassen Rückschlüsse auf die Größe des unterirdischen Komplexes zu.\n", + /*226*/ "Eine von mehreren Luftbasen, die als Etappenziele der Air Force One dienen. Typischerweise befindet sich die Basis in einer sehr unwirtlichen Umgebung, geschützt vor nicht autorisierten Augen.\n", + /*227*/ "Diese spezielle Air Force One wurde für kalte Klimata optimiert. Sehr nützlich, wenn sie in Nord-Alaska eingesetzt wird. Die Destination ist Oslo, Norwegen.\n", + /*228*/ "Das abgeschossene Flugzeug kam in einem felsigen, eisbedeckten Landstrich im Arktischen Kreis zu einem abrupten Stillstand.\n", + /*229*/ "Die Pelagic II befindet sich im Besitz der US-Regierung. Das Schiff ist in der Lage, Tiefsee-Operationen unter allen meteorologischen Bedingungen durchzuführen. Dies ist das einzige Schiff seiner Art.\n", + /*230*/ "Ein riesenhaftes Schiff extraterrestrischer Herkunft, das schon seit Millionen von Jahren auf dem Meeresgrund liegt.\n", + /*231*/ "Ein interplanetares Schiff, das Skedar-Krieger zu ihrem Einsatzort bringt. Teil der stark reduzierten Skedar-Kampfflotte.\n", + /*232*/ "Ein sehr trockener, von Erdbeben, Sandstürmen und Hurricanes zerfurchter Planet. Teil eines komplexen Sonnensystems, in dessen Zentrum sich drei Sonnen befinden.\n", + /*233*/ "Ein kleines, schnelles und gut manövrierbares Fluggerät. Geeignet, um Agenten in urbanen Gebieten abzusetzen. Kann sowohl computergesteuert, als auch ferngesteuert werden. Bietet Platz für bis zu vier Agenten.\n", + /*234*/ "Ein Antigravitations-System zur Unterstützung bei Verladearbeiten. Wird an der Seite einer Kiste angebracht. Ein AG-Feld hebt die Kiste an, und hebt ein wenig der Trägheit auf.\n", + /*235*/ "Eine niedrigfliegende Patrouillen-Einheit. Setzt ein kleines AG-Gerät ein, um zu schweben. Der Antrieb erfolgt über zwei starke Turbinen.\n", + /*236*/ "Hält alles rein und sauber. Hat Zugang zu allen Bereichen eines Gebäudes. Es wird geraten, diese Roboter nicht zu beschädigen, da sie teilweise einen alternativen Zugang zu stark bewachten Räumen ermöglichen.\n", + /*237*/ "Ein urbanes Patrouillen-Vehikel. Die Besatzung besteht aus zwei Mann, bewaffnet mit einer Vulcan-Kanone und zwei Raketenwerfern. Kann durchaus durch MG-Feuer oder einer gut gezielten Rakete abgeschossen werden.\n", + /*238*/ "Ein Kampfroboter für urbane Einsätze. Setzt AG-Technik ein, um zu schweben. Schwer bewaffnet und gepanzert. Wird meist eingesetzt, um unwillkommene Gäste fernzuhalten. Frei nach dem Motto: Zuerst schießen, dann fragen.\n", + /*239*/ "Eine robotische Variante des Hoverbike, verfügt über stärkere AG-Technik und Turbinen. Erreicht alle Geschwindigkeiten von Schrittgeschwindigkeit bis Mach 2. Obwohl gut bewaffnet, liegt sein Vorteil in der Manövrierbarkeit.\n", + /*240*/ "Designed für einen Maianischen Piloten. Ein Passagier würde sich sehr eingeengt fühlen - ein menschlicher Passagier noch mehr!\n", + /*241*/ "Kann bis zu zehn voll bewaffnete und ausgerüstete Skedar transportieren. Unsichtbar für konventionelles Radar. Sendet starke Störsignale über eine weite Entfernung aus, um Kommunikation und Erfassung unmöglich zu machen.\n", + /*242*/ "Beschreibung\n- Ein guter Agent bemerkt alles um ihn herum.\n\nTraining\n- Untersuchen Sie alle Objekte, indem Sie sie betrachten.\n\nBedienung\n-nach oben schauen - Drücken Sie den C-Knopf unten\n-nach unten schauen - Drücken Sie den C-Knopf oben.\n-Individuelle Sicht - Halten Sie die R-Taste gedrückt und verändern sie die Sicht mit dem analogen 3D-Stick.\n", + /*243*/ "Beschreibung\n- Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n\nTraining\n- Betätigen Sie alle Schalter. Sie müssen schnell sein, da sich die Schalter rasch zurücksetzen.\n\nBedienung\n- Sidestep links - Drücken Sie den C-Knopf links.\n- Sidestep rechts - Drücken Sie den C-Knopf rechts.\n\n", + /*244*/ "Beschreibung\n- Durch Ducken und Hocken können Sie neue Bereiche finden.\n\nTraining\n- Arbeiten Sie sich an den Hindernissen vorbei, und betätigen Sie die Schalter.\n\nBedienung\n- Ducken - Halten Sie die R-Taste gedrückt und drücken Sie den C-Knopf unten.\n- Hocken - Halten Sie beim Ducken den C-Knopf unten gedrückt.\n- Aufstehen - R-Taste\n\n", + /*245*/ "Beschreibung\n- Ein unbewaffneter Kampf gegen mehrere Gegner kann mitunter sehr schwierig sein.\n\nTraining\n- Schlagen Sie alle Gegner KO, ohne selbst getroffen zu werden.\n\nBedienung\n- Schlag - Drücken Sie den Z-Trigger in schneller Abfolge, um dem Gegner mehrere Schläge zu verpassen.\n\n", + /*246*/ "Beschreibung\n- Wenn Sie einen Gegner entwaffnen, bringt Ihnen das vielleicht eine neue Waffe.\n\nTraining\n- Entwaffen Sie alle Gegner, ohne selbst getroffen zu werden.\n\nBedienung\n- Entwaffnen - Halten sie den B-Knopf gedrückt und drücken Sie den Z-Trigger, um einen Gegner zu entwaffnen.\n- KO-Schlag - Schlagen Sie einen unachtsamen Gegner von hinten nieder.\n", + /*247*/ "Beschreibung\n- Unbewaffneter Kampf gegen mehrere Gegner.\n\nTraining\n- Besiegen Sie alle unbewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*248*/ "Beschreibung\n- Unbewaffneter Kampf gegen bewaffnete und unbewaffnete Gegner.\n\nTraining\n- Besiegen Sie alle bewaffneten Gegner, ohne selbst getroffen zu werden.\n\n", + /*249*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*250*/ "Überlegen Sie sich, wohin Sie gehen wollen, bevor sie loslegen. Stellen Sie sich so auf, dass Sie ein Minimum an Bewegung aufbringen müssen, wenn Sie sich zwischen den Zielen bewegen.\n", + /*251*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*252*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*253*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*254*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*255*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*256*/ "Nutzen Sie den Zielmodus, um größere Präzision und Bewegungsfreiheit zu erlangen, wenn Sie sich umsehen.\n", + /*257*/ "Sidesteps und Strafing können Ihnen aus der Patsche helfen.\n", + /*258*/ "Wenn Sie sich ducken, erreichen Sie Orte, die für Sie ansonsten unzugänglich sind. Aber vergessen Sie nicht, dass Sie sich in aufrechter Haltung schneller bewegen können. Ducken Sie sich nur, wenn es nicht anders geht.\n", + /*259*/ "Einen Gegner von hinten zu attackieren ist zwar nicht ehrenhaft, aber es ist wesentlich leichter, ihn auszuschalten. Verringern Sie die Distanz zum Gegner nur, wenn Sie müssen. Halten Sie sich für einen raschen Rückzug bereit, wenn der Gegner seinerseits zum Angriff übergeht.\n", + /*260*/ "Bleiben Sie nur solange in der Nähe des Gegners, bis Sie ihn entwaffnet haben. Gehen Sie anschließend außer Reichweite und setzen Sie Ihre neue Waffe ein.\n", + /*261*/ "Stehen Sie nicht als lebende Zielscheibe herum. Fokusieren Sie sich nicht auf einen Gegner, versuchen Sie herauszufinden, woher er kommt. Wenn Sie die anderen Gegner nicht sehen können, bewegen Sie sich weiter, bis Sie die anderen finden.\n", + /*262*/ "Wenn Sie glauben, Ihre waffenlosen Kampftechniken voll im Griff zu haben, dann greifen Sie die bewaffneten Gegner an. Setzen Sie anschließend ihre eigenen Waffen gegen sie ein, bevor sie Ihnen zu nahe kommen.\n", + /*263*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*264*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*265*/ "Der CamSpy kann schwierig zu steuern sein. Lassen Sie sich Zeit.\n", + /*266*/ "Nützlich im Kampf, aber achten Sie auf Überladung.\n", + /*267*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*268*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*269*/ "Der Visor verengt ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*270*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, setzen Sie daher dieses Gerät nur im Bedarfsfall ein.\n", + /*271*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*272*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig.\n", + /*273*/ "Behalten Sie das jeweilige Objekt, an dem Sie das Data Uplink-Gerät anbringen, stets im Blickfeld. Passen Sie auf, dass die Verbindung nicht unterbrochen wird.\n", + /*274*/ "Stellen Sie sicher, dass die Mine am richtigen Ort landet, indem Sie so nahe ans Ziel herangehen, wie möglich. Adjustieren Sie Ihr Ziel mit den C-Knöpfen oder gehen Sie in den Ziel-Modus.\n", + /*275*/ "Der CamSpy ist nicht unsichtbar. Er könnte entdeckt werden, also Vorsicht, wenn Sie in belebtem Gebiet operieren. Vergessen Sie nicht, dass der CamSpy an dem Ort bleibt, an dem Sie ihn abgelegt haben.\n", + /*276*/ "Nützlich im Kampf, aber achten Sie auf Überladung. Versuchen Sie, die Situation abzuschätzen, und reagieren Sie, bevor es der Gegner tut.\n", + /*277*/ "Wenn Sie Probleme mit der Befestigung des Decoders haben, stellen Sie sich näher ans Zielobjekt.\n", + /*278*/ "Der Tracker gibt nur die Richtung und relative Höhe an. Er verfügt über keine Kartenfunktion, die Sie direkt zum Ziel führt. Achten Sie auf Ihre Umgebung und untersuchen Sie alles akribisch genau.\n", + /*279*/ "Der Visor verengt Ihre periphere Sicht, was in Kampfsituationen zu Problemen führen kann. Schätzen Sie Ihre Situation richtig ein, bevor Sie den Scanner einsetzen.\n", + /*280*/ "Setzen Sie diese Vorrichtung zum falschen Zeitpunkt ein, bringen Sie sich mitunter in Lebensgefahr. Die Sichtweite ist stark eingeschränkt, daher setzen Sie dieses Gerät nur im Bedarfsfall ein.\n", + /*281*/ "Eine überzeugende Verkleidung besteht nicht nur aus Kleidern, sondern auch aus dem Verhalten des Trägers. Benehmen Sie sich entsprechend dem Charakter der Person, die Sie vorgeben zu sein.\n", + /*282*/ "Setzen Sie die Tarnkappe nur ein, wenn es sich auch lohnt. Energiesparen ist auch hier äußerst wichtig. Vermeiden Sie es, eine Waffe abzufeuern, bevor Sie sich nicht 100 %ig sicher sind, einen Treffer zu landen.\n", + /*283*/ "Die Falcon 2 ist eine sehr genaue Handfeuerwaffe. Jeden Fehlschuss verantworten Sie daher selbst. Die Sekundär-Funktion ist der Schlag mit der Waffe und somit am Schießstand nutzlos.\n", + /*284*/ "Zur Erhöhung der Genauigkeit wurde ein Zielfernrohr an der Waffe montiert. Ebenso wie bei der nicht modifizierten Version, ist die Sekundär-Funktion am Schießstand leider nutzlos.\n", + /*285*/ "Die schallgedämpfte Version der Falcon 2 eignet sich hervorragend dazu, gegenüber Ihren Gegnern den Überraschungsmoment zu nutzen. Testen Sie Ihre Genauigkeit, um sicherzugehen, keine Chance zu verpassen.\n", + /*286*/ "Die MagSec 4 stellt Feuerkraft in den Vordergrund. Dies zeigt sich speziell im Dreifach-Schuß Sekundär-Modus. Der einzige Nachteil ist das kleine Magazin.\n", + /*287*/ "Eine typische Skedar-Waffe, brutal und kraftvoll. Wenn Sie bereit sind, ein wenig mehr Munition zu opfern, können Sie den Schuß um ein Vielfaches verstärken.\n", + /*288*/ "Diese vielseitige Pistole hat zwei verschiedene Feuer-Modi. Ein Standard-Schuss, oder ein Explosiv-Geschoss. Die Maianischen Ingenieure haben es geschafft, diese Funktion nicht auf Kosten der Munition, sondern der Feuerrate zu integrieren.\n", + /*289*/ "Der Schlüssel zur DY357 ist das Wissen, wann nachzuladen ist. Ein sechs Schuss umfassendes Magazin erfordert Ihre Aufmerksamkeit. Das Gewicht der Waffe kann sich als nützlich erweisen, wenn Sie jemanden damit niederschlagen.\n", + /*290*/ "Trent Easton sucht immer nach dem gewissen Etwas, und diese Waffe ist keine Ausnahme. Das gleiche gilt für die Kugeln. Sind sie ins Ziel eingedrungen, zerbersten sie in tausend Stücke.\n", + /*291*/ "Ein verlässliches und effektives Maschinengewehr. Es steht wohl fest, warum diese Waffe der dataDyne-Bestseller der letzten zwei Jahre ist. Dabei ist die Sekundär-Funktion noch gar nicht mit in Betracht gezogen. Das Zielauswahl-System ist ein exzellentes Feature, dass Ihnen viel Ärger ersparen kann.\n", + /*292*/ "Das Cyclone-Maschinengewehr wurde speziell dafür designed, NICHT genau zu sein. Sie sollten trotzdem ausgiebig damit trainieren. Die weite Streuung der Kugeln eignet sich hervorragend, Feuerschutz zu geben.\n", + /*293*/ "Dieses Maschinengewehr entsprang Maianischer Flexibilität und verfügt über eine interessante Sekundär-Funktion: ein Hochgeschwindigkeits-Schuss, der feste Objekte leicht durchdringt. In diesem Modus wird die Feuerrate natürlich reduziert, um den Mechanismus zu schonen.\n", + /*294*/ "Die RC-P120 verwendet spezielle Mineral-Kugeln, gepaart mit hoher Feuerrate und einem großen Magazin. Die perfekte Waffe im Einsatz gegen die Skedar. Die Kugeln können auch als Energielieferant für die integrierte Tarnfuktion eingesetzt werden. Das Training wurde diesem Umstand angepasst.\n", + /*295*/ "Die Waffe kann nicht nur als Laptop getarnt werden, als Sekundär-Funktion kann sie auch als Selbstschussanlage an der entsprechenden Postion installiert werden.\n", + /*296*/ "Dieses Modell wurde von dataDyne erfolgreich im US-Militär eingeführt. In Übereinstimmung mit dataDynes Tendenz, den Leuten böse Überraschungen zu bereiten, wurde dem Basismodell eine Annäherungs-Mine eingebaut. Wird der Sekundär-Modus aktiviert, bedeutet das, dass die Waffe fortgeworfen werden muss.\n", + /*297*/ "So weit wir es beurteilen können, verfügt die Waffe als Sekundär-Funktion über einen Sensor, der mögliche Gefahrenquellen ortet und anzeigt. Obwohl die Waffe sehr stark ist, verfügt das Magazin über ein nur kleines Fassungsvermögen. \n", + /*298*/ "Der erste Versuch des Instituts, eine unterstützende Zweitwaffe zu kreieren, resultierte in diesem Modell. Der Sekundär-Modus ist ein permanenter Zoom.\n", + /*299*/ "Die schwerere Variante des Dragon. Die Annäherungsmine wurde durch einen kleinen Granatwerfer ersetzt. Im US-Militär hat diese Waffe klarerweise großen Anklang gefunden. Gewöhnen Sie sich im Training an die Flugbahn der Granaten.\n", + /*300*/ "Subtilität zählt hier nicht. Zwei Modi stehen zur Verfügung: einfacher Schuss und Doppelschuss. Das Magazin ist relativ groß, die Ladezeiten jedoch eher lang.\n", + /*301*/ "Ein gut verarbeitetes, schallgedämpftes Sniper-Gewehr mit hervorragendem Zoom. Das Einzige, was die Genauigkeit mindern könnte, ist der Schütze. Gehen Sie in die Hocke, um Ihr Ziel besser fixieren zu können.\n", + /*302*/ "Obwohl die Technologie schon etwas überholt ist, schätzen wir noch immer die Fähigkeiten des Fernsicht-Gewehrs. Der Schuss ist nahezu unaufhaltbar, die Zielerfassung geht bis zu einem gewissen Grad sogar durch Wände.\n", + /*303*/ "Die Primär-Funktion feuert einen vergifteten Bolzen ab, der allerdings nicht viel Schaden anrichtet. Sehrwohl aber der Sekundär-Schuss. Es handelt sich um eine Tarn-Waffe mit langer Ladezeit. Daher eher unpraktisch im Feuergefecht.\n", + /*304*/ "Das Betäubungsgewehr findet in seinen Grundzügen in vielen medizinischen Labors und Krankenhäusern Verwendung. Die Dosis des Betäubungsmittels kann, bei kurzen Distanzen, erhöht werden, um die Wirkung zu vervielfachen.\n", + /*305*/ "Versuchen Sie, diese Waffe unter Kontrolle zu halten. Sie wurde definitiv nicht für einen menschlichen Schützen konzipiert. Wenn Sie in die Knie gehen, können Sie Ihr Ziel leichter erfassen. Es ist stark zu bezweifeln, dass auch nur ein Feind an den Feuerstößen vorbeikommt.\n", + /*306*/ "Ein neueres dataDyne-Produkt mit einer sehr interessanten Technologie. Die Sekundär-Funktion legt ein magnetisches Feld um die Bombe, wodurch eine Haftung an Wänden ermöglicht wird. Nach einiger Zeit fällt die Bombe zu Boden und detoniert.\n", + /*307*/ "Ein kompakter, wiederverwendbarer Raketenwerfer. Lädt nach jedem Schuss selbst nach. Die Sekundär-Funktion ermöglicht die Aufschaltung auf ein Ziel. Die Rakete bewegt sich in diesem Modus langsamer. Planen Sie dies beim Timing Ihrer Schüsse ein.\n", + /*308*/ "Der handliche Skedar-Raketenwerfer feuert entweder eine normale Rakete, oder eine ferngelenkte Rakete ab. Vermutlich verschafft diese Funktion den Skedar eine perverse Befriedigung, da sie das flüchtende Ziel durch eine Kamera beobachten können. Ein Agent des Carrington Instituts findet dafür natürlich keine Verwendung. Die Detonation erfolgt bei Zielkontakt oder via Auslöser.\n", + /*309*/ "Ein gut ausgewogenes Kampfmesser, das sich auch als Wurfmesser eignet. Übung ist unumgänglich, wenn Sie diese Waffe meistern wollen.\n", + /*310*/ "Die Experimentalwaffen-Abteilung hat einen kleinen, aber sehr effektiven Laser entwickelt. Zwei Feuermodi sind verfügbar. Einerseits kann ein Langstrecken-Laser abgefeuert werden, andererseits ist auch ein wesentlich stärkerer Kurzstrecken-Laser verfügbar.\n", + /*311*/ "Diese Splitter-Granate detoniert vier Sekunden nach Aktivierung. Zu Ihrer Unterhaltung haben wir eine zweite Funktion integriert: Annäherungs-Pinball! Die Granate wird umherspringen, bis der Timer abgelaufen ist, oder der Sensor eine Bewegung erfasst und die Granate zur Detonation bringt.\n", + /*312*/ "Diese Maianische Granate vergreift sich an den Neuronen denkender Kreaturen. Sollten Sie sich im Detonationsradius befinden, verschwimmt Ihre Sicht und Sie lassen alles fallen, was sich in Ihren Händen befindet. Die Detonation erfolgt bei Kontakt oder bei Annäherung.\n", + /*313*/ "Um Zeitzünder-Minen effektiv einzusetzen, ist gutes Timing Voraussetzung. Andernfalls könnte das Ziel einfach an der Mine vorbeilaufen. Verbessern Sie Ihre Fähigkeiten im Training, bevor Sie im Einsatz einen kritischen Fehler begehen. Bei der Sekundär-Funktion handelt es sich um den allseits beliebten Gefahren-Anzeiger.\n", + /*314*/ "Der Schlüssel zur erfolgreichen Platzierung von Annäherungs-Minen ist, sie dort zu platzieren, wo sie der Gegner nicht erwartet. Sollten Sie selbst in so ein Minenfeld geraten, nutzen Sie den Sekundär-Modus, der einen Gefahren-Anzeiger beinhaltet. Etwas zeitaufwendig, aber mitunter überlebensnotwendig.\n", + /*315*/ "Wiederum eine neue Variante ferngezündeter Minen, die aber auf dem üblichen Prinzip aufbaut. Die Primär-Funktion platziert die Mine, die Sekundär-Funktion lässt sie detonieren. Können Sie die Mine nicht sehen, müssen Sie sich auf Ihr Gefühl verlassen. \n", + /*316*/ "Holo 1 - Umschauen\n", + /*317*/ "Holo 2 - Bewegung 1\n", + /*318*/ "Holo 3 - Bewegung 2\n", + /*319*/ "Holo 4 - Unbewaffnet 1\n", + /*320*/ "Holo 5 - Unbewaffnet 2\n", + /*321*/ "Holo 6 - Live-Kampf 1\n", + /*322*/ "Holo 7 - Live-Kampf 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_i.c b/src/files/lang/pal-final/dish_str_i.c new file mode 100644 index 000000000..537d0b08f --- /dev/null +++ b/src/files/lang/pal-final/dish_str_i.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Innanzitutto prendi la Vista Notturna dal tavolo.\n", + /* 9*/ "Attiva la Vista Notturna.\nTrova interruttore.\nRiaccendi le luci.\n", + /* 10*/ "Prendi il Connettore Dati dal tavolo.\n", + /* 11*/ "Avvicinati al terminale e usa il Connettore Dati.\n", + /* 12*/ "Devi tenere in mano il Connettore Dati.\n", + /* 13*/ "Stabilito collegamento...\n", + /* 14*/ "Il codice del terminale è stato decifrato.\n", + /* 15*/ "Collegamento interrotto: sei troppo lontano dal PC.\n", + /* 16*/ "Prendi la mina ECM dal tavolo.\n", + /* 17*/ "Trova la centralina e piazzale sopra una mina ECM.\n", + /* 18*/ "Mina ECM in posizione errata.\n", + /* 19*/ "Mina ECM piazzata correttamente.\n", + /* 20*/ "Prendi la TeleSpia dal tavolo.\n", + /* 21*/ "Trova il PC sala informazioni per l'olografia.\n", + /* 22*/ "Olografia riuscita.\n", + /* 23*/ "Riattivate le luci.\n", + /* 24*/ "Prendi il decodificatore porta dal tavolo.\n", + /* 25*/ "Usa il decodificatore per sbloccare la porta.\n", + /* 26*/ "Devi tenere in mano il decodificatore porta.\n", + /* 27*/ "Applicato decodificatore. Decodifica in corso...\n", + /* 28*/ "Decodifica completata. La porta è stata sbloccata.\n", + /* 29*/ "Prendi il puntatore dal tavolo.\n", + /* 30*/ "Trova lo scanner a infrarossi con il puntatore.\n", + /* 31*/ "Trovato lo scanner a infrarossi.\n", + /* 32*/ "Prendi lo scanner a infrarossi dal tavolo.\n", + /* 33*/ "Trova la porta segreta con lo scanner a infrarossi.\n", + /* 34*/ "Trovata la porta segreta.\n", + /* 35*/ "Prendi lo scanner a raggi X dal tavolo.\n", + /* 36*/ "Trova gli interruttori e disattiva le griglie laser.\n", + /* 37*/ "Disattivate tutte le griglie laser.\n", + /* 38*/ "Prendi il travestimento dal tavolo.\n", + /* 39*/ "Convinci qualcuno a darti il dispositivo mimetico.\n", + /* 40*/ "Trovato il dispositivo mimetico.\n", + /* 41*/ "Disattivata la griglia laser 1.\n", + /* 42*/ "Disattivata la griglia laser 2.\n", + /* 43*/ "Sono qui per prendere l'attrezzatura.\n", + /* 44*/ "Vattene, Joanna. Non mi farò fregare da te!\n", + /* 45*/ "Ecco a te! E adesso non perderlo!\n", + /* 46*/ "Ricevuto il dispositivo mimetico.\n", + /* 47*/ "Devi usare il travestimento, ricordi?\n", + /* 48*/ "Puoi fare di meglio, Joanna.\n", + /* 49*/ "Joanna, da dove te ne sei sbucata?\n", + /* 50*/ "Sei stata scoperta dalle telecamere!\n", + /* 51*/ "Prendi il dispositivo mimetico dal tavolo.\n", + /* 52*/ "Usa il dispositivo mimetico e trova Carrington.\n", + /* 53*/ "Credo proprio che il tuo addestramento\nsia completo!\n", + /* 54*/ "Missione compiuta - Addestramento superato!\n", + /* 55*/ "Missione fallita - Sei stata scoperta!\n", + /* 56*/ "Seleziona il Connettore Dati.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il Connettore Dati e rilascia A.\n", + /* 57*/ "Seleziona la TeleSpia.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la TeleSpia e rilascia A.\n", + /* 58*/ "Seleziona la Vista Notturna.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la Vista Notturna e rilascia A.\n", + /* 59*/ "Seleziona il decodificatore porta.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il decodificatore porta e rilascia A.\n", + /* 60*/ "Seleziona lo scanner a raggi X.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli lo scanner a raggi X e rilascia A.\n", + /* 61*/ "Seleziona il travestimento.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il travestimento e rilascia A.\n", + /* 62*/ "Seleziona lo scanner a infrarossi.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli scanner a infrarossi e rilascia A.\n", + /* 63*/ "Seleziona il puntatore.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il puntatore e rilascia A.\n", + /* 64*/ "Seleziona il dispositivo mimetico.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli il dispositivo mimetico e rilascia A.\n", + /* 65*/ "Seleziona la mina ECM.\n- Tieni premuto il pulsante A.\n- Usa il Control Stick per cambiare selezione.\n- Scegli la mina ECM e rilascia A.\n", + /* 66*/ "Joanna, vedo che stai bene!\n", + /* 67*/ "Seguimi!\nTi condurrò al reparto addestramento.\n", + /* 68*/ "Il centro informazioni è oltre questa porta.\n", + /* 69*/ "Qui abbiamo il laboratorio strumentazioni.\n", + /* 70*/ "Questo porta al reparto addestramento replicanti.\n", + /* 71*/ "Questo è il poligono di tiro.\n", + /* 72*/ "Questo corridoio porta all'hangar.\n", + /* 73*/ "ANTIGRAVITÀ\nPremi B vicino all'Antigravità per prenderlo...\n", + /* 74*/ "Premi B di nuovo per lasciarlo.\n", + /* 75*/ "AEROMOTO\nPremi B due volte vicino all'Aeromoto per salire...\n", + /* 76*/ "Premi B due volte per scendere dall'aeromoto.\n", + /* 77*/ "PORTE\nPremi B vicino ad una porta per aprirla.\n", + /* 78*/ "Il pulsante B attiverà anche qualsiasi strumento lì vicino.\n", + /* 79*/ "ASCENSORI\nPremi B vicino all'ascensore per chiamarlo.\n", + /* 80*/ "Impossibile uscire durante l'addestramento.\n", + /* 81*/ "Ottenuto codice di accesso 1.\n", + /* 82*/ "Ottenuto codice di accesso 2.\n", + /* 83*/ "Ottenuto codice di accesso 3.\n", + /* 84*/ "Ottenuto codice di accesso 4.\n", + /* 85*/ "GUARDA IN SU\n- Premi C verso il basso per guardare in alto.\n", + /* 86*/ "GUARDA IN GIÙ\n- Premi C verso l'alto per guardare in basso.\n", + /* 87*/ "Completato l'oloprogramma 2.\n", + /* 88*/ "Completato l'oloprogramma 4.\n", + /* 89*/ "Completato l'oloprogramma 5.\n", + /* 90*/ "La guardia è stata disarmata.\n", + /* 91*/ "La guardia è stata messa KO.\n", + /* 92*/ "Disarma quest'avversario in movimento se ci riesci.\n", + /* 93*/ "Metti KO quest'avversario... ci vuole agilità!\n", + /* 94*/ "Ecco l'ultima guardia...\n", + /* 95*/ "SCHIVA\n- Tieni premuto R, poi premi C verso il basso.\n", + /* 96*/ "ACCUCCIATI\n- Tieni premuto R, poi premi e tieni premuto C verso il basso.\n", + /* 97*/ "Completato l'oloprogramma 3.\n", + /* 98*/ "Attiva tutti gli interruttori.\n", + /* 99*/ "Attiva tutti gli interruttori a parete.\n Fai presto o saranno resettati.\n", + /*100*/ "Scopri i codici d'accesso esaminando i terminali.\n Usa i codici per i terminali a parete.\n", + /*101*/ "Scoperto codice 1.\n", + /*102*/ "Scoperto codice 2.\n", + /*103*/ "Scoperto codice 3.\n", + /*104*/ "Scoperto codice 4.\n", + /*105*/ "Addestramento fallito - Devi guardare avanti.\n", + /*106*/ "Completato l'oloprogramma 1.\n", + /*107*/ "Combattimento a amni nude: stendi l'avversario.\n Premi Z ripetutamente per sferrare i colpi.\n", + /*108*/ "Ora prova contro un avversario in movimento...\n", + /*109*/ "E infine contro un avversario che contrattacca.\n", + /*110*/ "Sconfiggi tutti i nemici senza essere colpita.\n", + /*111*/ "Addestramento fallito: sei stata colpita!\n", + /*112*/ "Completato l'oloprogramma 6.\n", + /*113*/ "Completato l'oloprogramma 7.\n", + /*114*/ "TERMINALI\n- Premi B vicino al terminale per usarlo.\n", + /*115*/ "Ora attiva il terminale rosso alla parete.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bene, Jo, ora preparati per la missione!\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Umano (femmina)\n", + /*127*/ "23 anni 2 mesi\n", + /*128*/ "|File CI n°027 -\n\nStadio addestramento: Completo\nGrado addestramento: A++\nStato attivo: Assegnato\n\n|Profilo -\n\nAddestramento avanzato ma inesperta. Reazione eccellente. Abilissima con svariate armi. Agente molto competente e versatile. Massimo punteggio di addestramento registrato nella creazione di un nuovo grado di formazione. Incarna l'agente ideale del Carrington Institute, da cui il nome 'Perfect Dark.'\n", + /*129*/ "Jonathan\n", + /*130*/ "Umano (maschio)\n", + /*131*/ "28 anni 5 mesi\n", + /*132*/ "|File CI n°009 -\n\nStadio addestramento: Completo\nGrado addestramento: A+\nStato attivo: Segreto\n\n|Profilo -\n\nIl nostro agente segreto più capace. Molto preciso con la sua arma preferita (Magnum Revolver). Perfetto per le missioni in incognito. Meno adatto alla lotta aperta. Prima di Joanna Dark, deteneva il punteggio più alto nell'addestramento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Umano (maschio)\n", + /*135*/ "62 anni 8 mesi\n", + /*136*/ "|File CI n°000 -\n\nStadio addestramento: N/D\nGrado addestramento: N/D\nStato attivo: N/D\n\n|Profilo -\n\nIntelligente scienziato/imprenditore e fondatore del Carrington Institute. Pianifica tutte le missioni che affida ai suoi agenti e esegue ogni operazione dal computer del suo ufficio. Strano gusto in fatto di abbigliamento.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Umano (femmina)\n", + /*139*/ "39 anni ? mesi\n", + /*140*/ "|Scheda psicanalitica -\n\nLa mente della dataDyne Corp. Assetata di potere, detesta non essere il capo. Odia perdere il comando. È senza scrupoli e pronta a tutto pur di vincere la sua battaglia contro Daniel Carrington, che disprezza con tutte le sue forze.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Umano (maschio)\n", + /*143*/ "46 anni ? mesi\n", + /*144*/ "|Scheda psicanalitica -\n\nCapo del National Security Agency, è legato a Cassandra De Vries da una strana amicizia, che sembra più che altro un'alleanza d'interesse. Tende a fare tutto ciò che dice Cassandra, forse perché, pur avendo una forte personalità, non basta a sovrastarla. Riferimento per molte teste calde dell'NSA.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "Il Sapiente Caroll (AI)\n", + /*147*/ "6 mesi\n", + /*148*/ "|Profilo -\n\nUn'intelligenza artificiale creata dalla dataDyne Corp. con spiccate abilità linguistiche e di lettura codici. Fortunatamente ha principi morali e, grazie al suo formidabile livello di intelligenza, ha fiutato alcuni piani futuri della dataDyne. Dispone di proprietà di linguaggio e di stile, tanto da sembrare un docente universitario.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (maschio)\n", + /*151*/ "320 anni\n", + /*152*/ "|Profilo -\n\nUn alieno della razza Maian. È il 'difensore' (guardia del corpo) dell'ambasciatore Maian invitato sulla Terra da Daniel Carrington. I difensori sono addestrati per l'uso preciso di una vasta gamma di armi. Elvis è un terrafilo: per lui il mondo terrestre è incredibilmente affascinante.\n", + /*153*/ "Mr Blonde\n", + /*154*/ "Umano (maschio)\n", + /*155*/ "Va per i 30\n", + /*156*/ "|Profilo -\n\nUn umano maschio con capelli biondissimi. Molto alto, sempre vestito di bianco, porta spesso un impermeabile. Sembra che orchestri il complotto in cui sono coinvolti Cassandra e Trent. Di lui non si sa altro.\n", + /*157*/ "Mr Blonde\n", + /*158*/ "Skedar (in incognito)\n", + /*159*/ "Sconosciuta\n", + /*160*/ "|Profilo Aggiornato -\n\nSi tratta di un guerriero Skedar che si aggira entro la proiezione olografica di un uomo biondissimo sui 30 anni. Il dispositivo di modulazione orale gli conferisce un tono di voce chiaro, piacevole e convincente. È un subdolo mezzo di propaganda per gli Skedar.\n", + /*161*/ "Il Presidente degli USA\n", + /*162*/ "Umano (maschio)\n", + /*163*/ "50 anni\n", + /*164*/ "|Profilo -\n\nUn afro-americano istruito e astuto che cerca di fare la cosa giusta ma è attorniato da gente come Trent Easton. Dopo aver respinto la richiesta di prestito del Pelagic II avanzata dalla dataDyne, crede di avere Trent sotto controllo. La maggioranza dei commentatori politici lo ritiene facilmente influenzabile, giudizio forse azzardato.\n", + /*165*/ "I Maian\n", + /*166*/ "I Maian sono la razza di alieni noti sulla Terra come i 'Grigi'. Hanno studiato la Terra molto a lungo, per svariati secoli, e sono bendisposti verso gli umani, comprendendone il grande potenziale. Il loro contatto sulla Terra è Daniel Carrington, però manca ancora un contatto politico formale.\n", + /*167*/ "Guerriero Skedar\n", + /*168*/ "Gli Skedar sono una razza aliena bellicosa, da sempre in lotta contro i Maian. Solo di recente hanno firmato un armistizio. Lottano e si muovono in enormi armature meccanizzate, poiché non sono altro che piccole creature simili ai rettili. Sono molto aggressivi: hanno fatto della guerra la loro religione... e sono molto devoti.\n", + /*169*/ "Situazione\n", + /*170*/ "Milioni di anni fa un'enorme e potente nave aliena si inabissò nell'Oceano Pacifico. Era dotata di un'arma molto pericolosa, ma ancora sconosciuta, in grado di rompere i legami nucleari che tengono assieme le molecole. Affinché possibili occhi indiscreti credessero che la nave fosse andata distrutta, fu diffuso nella galassia da cui era partita un apposito messaggio e vari componenti del sistema di propulsione furono distrutti proprio nel sistema solare che era stato scelto come nascondiglio. In realtà questa astronave era un Cetan, una creatura possente, vigile e aliena.\n\nUn'altra razza extraterrestre, i Maian, scoprirono la vita sulla terra nel 2000 a.C. Ne videro un enorme potenziale, ma decisero di lasciare che la primitiva razza umana si sviluppasse senza la loro intrusione.\n\nI Maian incontrarono gli Skedar vicino al Delta Eridano nel 1650 d.C. (data terrestre) e le schermaglie iniziali si trasformarono presto in una guerra sanguinosa. Solo dopo centinaia di anni di lotta si arrivò ad una pace molto delicata che frange di Skedar continuavano a ledere con attacchi terroristici, a cui i Maian non capitolarono mai.\n\nMa anche l'umanità continuava ad essere una preoccupazione per i Maian che guardavano delusi come la Terra subisse continue crisi causate dall'avvento della tecnologia e da 'agenti estranei'. Temevano che annunciare la loro presenza potesse solo scatenare altre guerre sul pianeta e così decisero di continuare pazientemente le loro osservazioni finché gli umani non si fossero dimostrati più 'maturi'.\n\nDaniel Carrington fu sicuramente 'precoce' e nel 1985 d.C. contattò una nave Maian in orbita sopra la terra, proponendo un piano vantaggioso per tutti che avrebbe accelerato i contatti tra gli umani e i Maian. Ritenendo Carrington un uomo onesto, i Maian approvarono il suo piano e acconsentirono a che egli diffondesse la loro tecnologia tramite il suo rinomato Istituto di Ricerca e Sviluppo.\n\nMa nel 2006 d.C. alcuni estremisti Skedar rintracciarono l'antico messaggio Cetan. Cominciarono subito a perlustrare la Terra con minuzia e con ogni mezzo, rapendo persone e mutilando animali per arrivare a scoprire il luogo in cui era dispersa la nave da guerra. Col tempo riuscirono inevitabilmente a scovare il punto esatto in cui l'incrociatore riposava sul fondo del Pacifico, ma per raggiungerlo avrebbero avuto bisogno dell'aiuto degli umani.\n\nConducendo i loro studi sulla Terra, gli Skedar compilarono una lista di aziende con le risorse necessarie per il recupero della nave. Capolista era la dataDyne Corporation. Ne contattarono il presidente, Cassandra De Vries e le proposero un accordo troppo bello per essere vero, ed ovviamente non lo era. In cambio dell'aiuto per recuperare la 'loro' nave dal fondo dell'Oceano, gli Skedar promisero di cedere alla dataDyne tutta la tecnologia aliena necessaria per diventare la più grande azienda sul pianeta. La dataDyne doveva solo costruire un automa con abilità linguistiche e di decodifica... compito sospetto, ma di sicuro alla loro altezza. I lavori cominciarono immediatamente.\n\nCassandra De Vries riferì i dettagli del piano a Trent Easton, direttore dell'NSA, che cercò invano di ottenere l'approvazione del Presidente al prestito di un sottomarino per ricerche sul fondo oceanico. Né gli Skedar né la dataDyne avrebbero potuto rubare il sommergibile senza scatenare la furia del governo USA, quindi elaborarono un piano ben più sinistro per la sostituzione del Presidente con un clone che solo loro potessero controllare. Una volta consegnata alla storia l'operazione Skedar, Trent e Cassandra sarebbero stati ovviamente ricompensati di tanto rischio.\n\nMa non avrebbero avuto molto tempo per esultare. Il piano finale degli estremisti Skedar era di sperimentare il separatore molecolare sulla Terra prima di eliminare i Maian, e né Cassandra né Trent si accorsero della trappola, accecati com'erano dalla brama di potere e successo.\n\nMa la dataDyne aveva creato inconsapevolmente qualcosa che poteva ben capire il pericolo di questa intricata cospirazione: l'automa Sapiente costruito per infrangere il codice di accesso alla nave Cetan. Quando questo rivelò le sue preoccupazioni sulla missione per cui era progettato, Cassandra ordinò di manipolargli il cervello togliendogli così la personalità. Pensava decisamente troppo... Disperato, il Sapiente decise di reagire ai complotti della dataDyne e degli Skedar, e con una mossa coraggiosa adottò lo pseudomino di Dr. Caroll e contattò il Carrington Institute chiedendo aiuto...\n", + /*171*/ "La storia\n", + /*172*/ "L'inesperta agente Joanna Dark è incaricata di una missione consistente nel prelevare uno scienziato dall'area ad alta sicurezza nei sotterranei della dataDyne. Quando trova il Dr. Caroll rimane sorpresa nello scoprire che si tratta di un automa creato dalla dataDyne, tuttavia resta fedele al suo incarico di portarlo al sicuro. Durante l'operazione scatta l'allarme e Joanna deve farsi strada per raggiungere sul tetto l'eliporto e la navetta di salvataggio, le uniche vie di scampo.\n\nIn risposta a questa incursione, due giorni dopo la dataDyne prende in ostaggio Daniel Carrington nella sua villa; in cambio della sua vita vogliono la restituzione dell'automa di loro 'proprietà'. A loro insaputa l'automa si trova già nella villa dove Carrington lo stava interrogando sui piani futuri della dataDyne. Joanna riesce a salvare il capo dell'istituto, ma non può impedire che la dataDyne si riprenda il Dr. Caroll. Tuttavia, Carrington ha scoperto abbastanza da decidere di richiedere l'intervento di una squadra di specialisti Maian sulla Terra.\n\nJoanna è inviata a Chicago per spiare una riunione di cospiratori nell'edificio G5, una copertura della dataDyne Corporation. Qui scopre che anche Trent Easton, direttore dell'NSA, è coinvolto nella faccenda, assieme ad alcuni Scandinavi che sembrano avere il controllo della losca situazione. Quando Trent rivela il piano per il rapimento del Presidente, Joanna comunica la notizia alla base, ma scopre che un altro compito più urgente richiede il suo intervento, prima dell'affare Trent.\n\nGli specialisti Maian sono stati intercettati e abbattuti dai cospiratori, che hanno trasportato rottami e sopravvissuti presso l'Area 51 in Nevada. Dopo essere stata istruita su come recuperare i superstiti e le loro attrezzature, a Joanna viene affiancato un altro agente del Carrington Institute. Quando irrompe nel laboratorio, Joanna riesce a scoprire il segreto dell'istituto: i loro alleati sono i Maian, la razza aliena nota come i Grigi. Il Maian che riesce a salvare si chiama Elvis, era la guardia del corpo dell'ambasciatore Maian che era stato inviato sulla Terra come capo della squadra di specialisti.\n\nDopo aver aiutato i superstiti della delegazione Maian, Joanna può tornare a occuparsi del Presidente e dei piani della dataDyne contro di lui. Fingendo di essere un membro dell'entourage del Presidente, riesce ad accedere alla base aerea dove staziona l'Air Force One e addirittura ad imbarcarsi. Dopo il decollo, Trent e uno Skedar in incognito entrano in azione, ma Joanna è lì per fermarli. Porta il Presidente su una capsula di sicurezza, mentre una squadra degli uomini di Trent saccheggia l'aereo e trasborda i politici sull'UFO Skedar che si era agganciato all'Air Force One tramite un cordone ombelicale. Joanna danneggia il cordone ma non riesce a romperlo, allora Elvis fa un ultimo tentativo per distruggerlo lanciadovisi contro ad alta velocità. I tre velivoli precipitano in una regione sperduta dell'Alaska e dall'Air Force One viene lanciata la capsula di salvataggio.\n\nIn seguito Joanna cerca di ristabilire i contatti con l'istituto, ma gli Skedar riescono ad impedire le comunicazioni. Così si incammina tra la neve alla ricerca del Presidente e di Elvis, e incontra squadre di Skedar in incognito in cerca di lei, di Elvis e del Presidente. Decide di seguire un gruppo di Skedar fino alla navicella Skedar affondata e qui scopre il clone del Presidente: riesce a distruggerlo velocemente e a disattivare il dispositivo di disturbo delle comunicazioni, infine chiama i rinforzi. Il Presidente è salvo, gli Skedar hanno fallito e ora Trent dovrà pagare cara la sua incompetenza.\n\nMa non è finita. Ignorando qualsiasi cautela, la dataDyne e gli Skedar rubano il 'Pelagic II', il sottomarino di ricerca del Governo, e si dirigono nel punto in cui affondò la nave Cetan. Joanna e Elvis devono intralciare l'attività a bordo e così scoprono il vero senso del piano Skedar. Dopo aver paralizzato le operazioni di immersione e fatto rientrare i sommergibili, raggiungono il fondo dell'oceano dove scoprono l'incrociatore Cetan affondato. Un varco realizzato dagli Skedar li fa entrare nella nave dove inciampano nel cadavere di un guerriero Skedar... la squadra d'assalto non deve averla passata liscia. Eliminando gli aggressivi Skedar superstiti e sfuggendo ai Cetan, Joanna e Elvis arrivano al centro della nave, dove trovano l'automa una volta noto come Dr. Caroll. Dopo che sono riusciti a ristabilire la sua personalità, l'automa li convince ad abbandonare la nave in modo che lui possa distruggerla una volta per tutte.\n\nRientrati al Carrington Institute, Joanna si appresta ad andare alla Casa Bianca per il ricevimento presidenziale quando scoppia l'inferno. I superstiti dello squadrone d'assalto Skedar si vogliono vendicare dando la caccia ai responsabili del loro fallimento nel recupero della nave Cetan. Joanna aiuta i dipendenti dell'istituto a mettersi in salvo negli hangar, mentre gli Skedar sferrano attacchi in vari punti dell'istituto: la maggioranza dei dipendenti riesce a salvarsi, ma alla fine Joanna viene stordita e fatta prigioniera.\n\nSi ritrova in una cella a bordo della nave Skedar assieme a Cassandra De Vries. In un momento drammatico, il presidente della dataDyne offre volontariamente la sua vita per creare lo scompiglio che sarà necessario a Joanna per fuggire. Facendosi strada nella nave, Joanna riesce a trovare e disattivare gli scudi anti-attracco consentendo a Elvis di portare alcuni amici per la tanto attesa sparatoria.\n\nLa nave d'assalto catturata entra nell'orbita sopra il Tempio di Guerra Skedar, con grande sorpresa di Elvis poiché i Maian non sono mai riusciti a trovare questo 'luogo sacro' in tutti gli anni di guerra interraziale. Distruggere il Tempio significherebbe infliggere un duro colpo agli Skedar e la pace duratura sostituirebbe l'instabile tregua. Così Joanna si concentra sul leader Skedar, il sacerdote a capo del Tempio, mentre Elvis torna alla nave d'assalto per organizzare le flotte Maian.\n\nDopo la furiosa battaglia, del Tempio non rimane che una rovina e Elvis interrompe il bombardamento per cercare Joanna. È viva ma tenuta in trappola sotto le macerie dagli ultimi tenaci Skedar comparsi all'ultimo momento, proprio mentre stava scappando. Elvis le passa un'arma per convincere gli Skedar a lasciarla andare e, a lavoro completato, con il Tempio Skedar raso al suolo, i due eroi possono finalmente rientrare in orbita. La razza Skedar è giunta al capolinea: il morale sotto i piedi e il complotto mandato in fumo per sempre.\n", + /*173*/ "dataDyne Corporation\n", + /*174*/ "L'azienda monolitica che oggi è la dataDyne era stata originariamente creata come impresa di programmazione di sistemi di intelligenza artificiale. Tuttavia, quando emerse che la maggior parte dei profitti scaturiva dalla sua opera di difesa per conto della macchina militare statunitense, un manager giovane e intraprendente di nome Cassandra De Vries iniziò a stringere accordi con produttori di armi, ignorando le offerte di collaborazione di Daniel Carrington e del suo istituto per condurre una ricerca congiunta relativa al computo dei quanti e all'intelligenza artificiale. Dopo la fusione con la terza azienda produttrice di armi, i profitti del gruppo andarono alle stelle. Nel giro di un mese la dataDyne ottenne un appalto governativo per lo sviluppo di nuove armi sotto la guida di Cassandra De Vries. Una buona parte dei profitti del gruppo furono reinvestiti nella ricerca relativa all'intelligenza artificiale con risultati sorprendenti.\n", + /*175*/ "Carrington Institute\n", + /*176*/ "Deriso e considerato un inventore bizzarro, Daniel Carrington fu il primo a divulgare le tecnologia antigravitazionale. Con i proventi ottenuti da questa invenzione e altri sviluppi fondò il Carrington Institute, una fucina tecnologica situata in una sperduta località degli USA. L'istituto è anche il campo di addestramento per la formazione di agenti la cui missione è girare il mondo per tenere sotto controllo lo sviluppo tecnologico, per ragioni ben note a Daniel Carrington.\n", + /*177*/ "Description\n- Una minuscola telecamera per esplorazioni clandestine e l'olografia spettroscopica. Apre le porte emettendo impulsi di calore.\n\nIstruzioni di addestramento\n- Olografa il terminale hacker nella sala informatica a fianco.\n\nFunzionamento\n- Premi Z per l'olografia. Premi B per aprire le porte. Tieni premuto R per guardarti intorno.\n", + /*178*/ "Descrizione\n- Migliora la qualità della luce presente per visualizzare l'area circostante. Rileva le fonti di vita. Sovraccarica in condizioni di luce normale, 'annebbiando' il display.\n\nIstruzioni di addestramento\n- - Procedi al buio, trova l'interruttore e attivalo per riaccendere la luce.\n\nFunzionamento\n- Seleziona Vista Notturna dall'inventario per attivarla. Riselezionala per disattivarla.\n", + /*179*/ "Descrizione\n\n- Sistema indipendente di decodifica. Si applica al quadro comandi e esegue tutte le combinazioni finché non trova quella esatta.\n\nIstruzioni di addestramento\n- Trova la porta chiusa e usa il decodificatore per aprirla.\n\nFunzionamento\n- Stai vicino alla porta e premi B mentre tieni il decodificatore.\n", + /*180*/ "Descrizione\n\n- Usato per guardare attraverso le pareti e gli oggetti. È più potente della Vista Notturna e dello scanner a infrarossi.\n\nIstruzioni di addestramento\n- Con lo scanner a raggi X cerca i due interruttori nascosti e attivali per disattivare le griglie laser.\n\nFunzionamento\n- Seleziona lo scanner a raggi X dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*181*/ "Descrizione\n\n- Il travestimento serve per non destare sospetti, ma fa comunque attenzione a non farti scoprire da qualche nemico perspicace.\n\nIstruzioni di addestramento\n- Grimshaw ha un dispositivo mimetico pronto per essere usato. Vai alla porta accanto e 'compralo' da lui.\n\nFunzionamento\n- Per indossare il travestimento, selezionalo dall'inventario.\n", + /*182*/ "Descrizione\n\n- Trasforma i dati termici in immagini visibili. Può essere usato al buio e rileva anomalie come porte nascoste e pareti sottili.\n\nIstruzioni di addestramento\n- Accendi lo scanner a infrarossi, trova la porta nascosta e aprila.\n\nFunzionamento\n- Seleziona lo scanner a infrarossi dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*183*/ "Descrizione\n- Localizza un oggetto specifico su una mappa radar HUD, mostrandone le dimensioni e la distanza.\n\nIstruzioni di addestramento\n- Attiva il Puntatore e segui il segno del radar per trovare l'oggetto.\n\nFunzionamento\n- Seleziona il Puntatore dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*184*/ "Descrizione\n- Distorce lo spettro visibile della luce attorno a chi lo indossa, creando un effetto camaleontico. Il campo si infrange quando chi lo indossa spara.\n\nIstruzioni di addestramento\n- Attiva il dispositivo mimetico e entra nell'ufficio di Carrington per sorprenderlo!\n\nFunzionamento\n- Seleziona il dispositivo mimetico dall'inventario per attivarlo. Riselezionalo per disattivarlo.\n", + /*185*/ "Descrizione\n- Emette un segnale in continuo movimento studiato per mandare in tilt i dispositivi elettronici di comunicazione. Funziona solo se posto sull'oggetto.\n\nIstruzioni di addestramento\n- Lancia la mina ECM sulla centralina luce dalla porta segreta.\n\nFunzionamento\n- Premi Z per lanciare la mina. Tieni premuto R e muovi il Control Stick per mirare bene prima del lancio.\n", + /*186*/ "Descrizione\n- Crea un collegamento tra l'agente in missione e gli hacker dell'Istituto in sede,che possono così scaricare i dati o decodificare codici elettronici a distanza.\n\nIstruzioni di addestramento\n- Usa il Connettore Dati per accedere al terminale nell'angolo e aprire una porta segreta.\n\nFunzionamento\n- Vai vicino al terminale e premi B tenendo il Connettore Dati.\n", + /*187*/ "SPARO\n Premi Z per far fuoco.\n", + /*188*/ "AUTORICARICA\n Rilascia Z quando non hai più munizioni.\n", + /*189*/ "RICARICA MANUALE\n Premi B per ricaricare prima di rimanere a secco.\n", + /*190*/ "MIRA: Tieni premuto R per accedere alla modalità Mira.\n", + /*191*/ "Usa il Control Stick per spostare la visuale di mira.\n", + /*192*/ "AUTOFUOCO\n Premi Z per fuoco continuo automatico.\n", + /*193*/ "CAMBIA MIRA\n Premi C in alto o in basso per spostare la visuale in alto o in basso.\n", + /*194*/ "ZOOM\n Tieni premuto R per avviare la modalità Zoom.\n", + /*195*/ "FUOCO RAPIDO\n Premi Z velocemente per spari rapidi.\n", + /*196*/ "Carrington Institute\0|Base operativa\n", + /*197*/ "Lucerne Tower\0|Quartier Generale Globale\n", + /*198*/ "Laboratorio sotterraneo\0|Centri di ricerca sotterranei\n", + /*199*/ "Villa Carrington\0|Residenza privata sulla costa\n", + /*200*/ "Chicago\0|Sobborghi delle città\n", + /*201*/ "Edificio G5\0|Sede della dataDyne\n", + /*202*/ "Area 51\0|Vicino al Groom Dry Lake, Nevada\n", + /*203*/ "Base aerea in Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|L'aereo presidenziale\n", + /*205*/ "Luogo del disastro\0|Victoria Island 71N 118W\n", + /*206*/ "Pelagic II\0|Sottomarino per ricerche oceaniche\n", + /*207*/ "Astronave Cetan\0|Segno degli alieni sulla Terra\n", + /*208*/ "Nave d'assalto Skedar\0|Astronave per trasporto truppe\n", + /*209*/ "Patria Skedar\0|Il pianeta del Tempio di Guerra\n", + /*210*/ "Navetta\0|Agile navicella per il trasporto truppe\n", + /*211*/ "Antigravità\0|Dispositivo antigravità\n", + /*212*/ "Aeromoto\0|Veicolo per spostamenti a bassa quota\n", + /*213*/ "PuliRobot\0|Il tuo fedele amico\n", + /*214*/ "Cannoniera\0|Cannoniera urbana AG\n", + /*215*/ "Robot G5\0|Droide da combattimento urbano\n", + /*216*/ "Intercettatore A51\0|Robot intercettatore aereo\n", + /*217*/ "Vascello Maian\0|Vascello di esplorazione e perlustrazione\n", + /*218*/ "Navetta Skedar\0|Navicella aliena per trasporto truppe\n", + /*219*/ "L'edificio dell'istituto comprende svariate aree: uffici e laboratori, aule e hangar. È piuttosto isolato dall'ambiente esterno per garantire il massimo della segretezza.\n", + /*220*/ "Nel bel mezzo del quartiere finanziario si erge il cupo grattacielo della dataDyne Corporation.\n", + /*221*/ "Questi laboratori ben protetti e nascosti conservano la chiave del futuro della dataDyne. Qui dentro alcuni ingegneri lavorano a progetti segreti mirati a garantire la supremazia della dataDyne.\n", + /*222*/ "Di proprietà dell'istituto, questa residenza appartata è usata da Daniel Carrington per sfuggire dallo stress del lavoro. Oltre ad un osservatorio dispone di generatore elettrico e di una cantina ben fornita.\n", + /*223*/ "Un quartiere piuttosto fatiscente di Chicago, immerso nel traffico. Qui si trova la sede della G5 Corporation.\n", + /*224*/ "L'edificio G5 dispone di una sala riunioni segreta protetta contro registrazioni illecite. Questo è il luogo ideale per le cospirazioni e i piani segreti della dataDyne.\n", + /*225*/ "Questa parte del grande complesso noto come Area 51 si trova ai piedi dei colli attorno al lago Groom Dry. Eliscali e torri di comunicazione esterni danno un'idea dell'estensione del complesso sottoterra.\n", + /*226*/ "Una delle tante basi aeree disponibili per lo stazionamento dell'Air Force One. Solitamente la base aerea si trova sperduta in una regione inospitale, al sicuro da sguardi indiscreti.\n", + /*227*/ "Quest'Air Force One è particolarmente adatto ai climi freddi, come quelli dell'Alaska del Nord. La destinazione di volo è Oslo, Norvegia.\n", + /*228*/ "I rottami dell'aereo colpito sono finiti nel paesaggio roccioso innevato del Circolo Polare Artico.\n", + /*229*/ "Di proprietà del governo USA, il Pelagic II può condurre operazioni subacquee in alto mare in ogni condizione climatica. È l'unico sommergibile al mondo per la ricerca sul fondo oceanico.\n", + /*230*/ "Un'enorme nave di costruzione aliena che riposa da milioni di anni sul fondo oceanico.\n", + /*231*/ "Una nave d'assalto interplanetaria che trasporta guerrieri Skedar verso le zone di guerra. Fa parte dell'ormai ridotta flotta Skedar.\n", + /*232*/ "Un pianeta molto arido, sconvolto da terremoti, tempeste di sabbia e uragani. Fa parte di un sistema solare complesso comprendente tre soli.\n", + /*233*/ "Una navetta da trasporto piccola, veloce e facile da manovrare, progettata per l'uso in aree urbane. Può essere comandata dal computer o pilotata a distanza. Può trasportare tre o quattro agenti con l'attrezzatura.\n", + /*234*/ "Un dispositivo antigravità usato dai magazzinieri. È applicato al lato della cassa da imballaggio. Quando attivo, il campo AG innalza la cassa ed elimina parte dell'inerzia.\n", + /*235*/ "Una moto da perlustrazione a bassa quota. Si libra grazie alla piccola unità antigrevità, ma ha un potente motore per gli spostamenti rapidi direzionali.\n", + /*236*/ "Mette in ordine e pulisce. Ha accesso a tutte le aree di un edificio: gli agenti possono avvalersi dell'aiuto di questi robot perché possono facilitare involontariamente l'ingresso a zone riservate.\n", + /*237*/ "Un veicolo di soppressione e perlustrazione urbana: con equipaggio di due persone, armato di cannone sulla punta e di due missili sulle ali. Può essere eliminato con raffiche di spari o un missile ben mirato.\n", + /*238*/ "Un robot da combattimento urbano. Utilizza un'unità antigravità per librarsi; ben armato e schermato. Spesso usato per tenere alla larga i curiosi grazie alla programmazione 'zitto e spara'.\n", + /*239*/ "Versione motorizzata dell'Aeromoto, con dispositivi AG e turbina più potenti; può facilmente raggiungere Mach 2 e ha un'autonomia di molte ore se procede a velocità ridotta. Anche se ben armato il suo punto forte è la manovrablità.\n", + /*240*/ "Progettato per il trasporto del solo pilota Maian. Un passeggero ci starebbe stretto, soprattutto se fosse umano.\n", + /*241*/ "Può portare al campo di battaglia dieci guerrieri Skedar armati fino ai denti. Sfugge ai radar tradizionali. Può trasmettere potenti onde di disturbo su una vasta area mandando in tilt comunicazioni e apparecchi radar.\n", + /*242*/ "Descrizione\n- Un buon agente nota tutto ciò che lo circonda.\n\nIstruzioni di addestramento\n- Esamina tutti gli oggetti guardandoli direttamente.\n\nFunzionamento\n- Guardare su: pulsante C in basso\n- Guardare giù: pulsante C in alto\n- Guardare attorno: pulsante R per attivare la mira e Control Stick.\n", + /*243*/ "Descrizione\n- Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n\nIstruzioni di addestramento\n- Attiva tutti gli interruttori anteriori ma fai presto perché si disattivano a tempo.\n\nFunzionamento\n- Passo a sinistra: pulsante C a sinistra\n- Passo a destra: pulsante C a destra\n\n", + /*244*/ "Descrizione\n- Accucciandoti e strisciando potrai rilevare nuove aree da esplorare.\n\nIstruzioni di addestramento\n- Fatti strada tra gli ostacoli usando le mosse disponibili. Attiva gli interruttori.\n\nFunzionamento\n- Accucciarsi: pulsante R e poi pulsante C verso il basso.\n- Strisciare: quando sei accucciato, pulsante R e poi C verso il basso.\n- Alzarsi: pulsante R.\n\n", + /*245*/ "Descrizione\n- Lottare a mani nude contro più avversari può essere difficile.\n\nIstruzioni di addestramento\n- Metti KO tutti i nemici senza farti colpire.\n\nFunzionamento\n- Pugno: premi Z più volte da disarmato per lanciare una scarica di pugni.\n\n", + /*246*/ "Descrizione\n- Disarmando un nemico potrai impossessarti della sua arma.\n\nIstruzioni di addestramento\n- Metti KO/disarma tutti i nemici senza essere colpito.\n\nFunzionamento\n- Disarmare: tieni premuto B e poi premi Z per disarmare il nemico.\nPugno KO: colpisci il nemico alle spalle.\n", + /*247*/ "Descrizione\n- Lottare a mani nude contro più nemici.\n\nIstruzioni di addestramento\n- Batti tutti i nemici disarmati senza essere colpito.\n\n", + /*248*/ "Descrizione\n- Lottare contro più nemici, sia armati che disarmati.\n\nIstruzioni di addestramento\n- Batti tutti i nemici armati senza essere colpito.\n\n", + /*249*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*250*/ "Pensa a dove vuoi andare prima di effettuare la prova. Poniti in un punto dove dovrai spostarti il meno possibile tra gli obiettivi.\n", + /*251*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*252*/ "Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*253*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*254*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*255*/ "Quando sei sicuro delle tue abilità di lotta a mani nude, va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*256*/ "Per una maggiore precisione e libertà quando ti guardi attorno, usa la modalità Mira.\n", + /*257*/ "Schivando e spostandoti a destra e sinistra potrai tirarti fuori dai guai.\n", + /*258*/ "Accucciandoti potrai raggiungere posti normalmente inaccessibili, ma ricorda che sarai più veloce in piedi. Per spostarti velocemente prova ad accucciarti solo quando è necessario.\n", + /*259*/ "Attaccare gli avversari alle spalle può essere scorretto, ma così sarà più facile eliminarli. Avvicinati all'area di lotta solo se necessario e preparati a indietreggiare e a schivarli quando ti attaccano.\n", + /*260*/ "Avvicinati quel tanto che basta per prendere l'arma. Indietreggia subito per sfuggire al contrattacco e usa la tua nuova arma.\n", + /*261*/ "Non stare lì a prenderle: muoviti! Non concentrarti su un solo avversario: guarda dove sono gli altri. Se non riesci a vederli tutti, spostati e cercali.\n", + /*262*/ "Quando sei sicuro delle tue abilità di lotta a amni nude va in cerca dell'avversario armato. Disarmalo, indietreggia e usa l'arma su di lui prima che si avvicini troppo.\n", + /*263*/ "Tieni sempre d'occhio l'obiettivo quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*264*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*265*/ "La TeleSpia può essere difficile da controllare, abbi pazienza.\n", + /*266*/ "Utile nel combattimento, ma può causare problemi per sovraccarico.\n", + /*267*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*268*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*269*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*270*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*271*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*272*/ "Usa i dispositivi mimetici quando non c'è nessuno che possa vederti.\n", + /*273*/ "Tieni sempre d'occhio il target quando usi il Connettore Dati e stai vicino per evitare l'interruzione del collegamento.\n", + /*274*/ "Assicurati che la mina atterri nel punto giusto avvicinandoti il più possibile all'obiettivo. Aggiusta la mira usando i pulsanti C o R per la modalità Mira.\n", + /*275*/ "La TeleSpia non è invisibile, i nemici potrebbero scoprirla: attento quando entri in un'area abitata. Ricorda che la TeleSpia rimarrà nel punto dove l'hai lasciata a meno che tu la riprenda.\n", + /*276*/ "Utile nel combattiemto, ma può causare problemi per sovraccarico. Evita questo inconveniente e reagisci prima del nemico.\n", + /*277*/ "Se hai problemi ad attaccare il decodificatore, prova a stare più vicino all'obiettivo.\n", + /*278*/ "Il Puntatore indica solo la direzione e l'altitudine; non mostra una mappa che ti possa guidare fino all'obiettivo. Fai attenzione a ciò che ti circonda e preparati ad esplorare.\n", + /*279*/ "La visiera riduce il campo visivo e ciò può essere un problema durante il combattimento. Assicurati che la tua posizione sia sicura.\n", + /*280*/ "Se usi questo dispositivo nel momento sbagliato, potrebbe risultarti fatale perché può impedirti la vista oltre una determinata distanza. Da usare oculatamente.\n", + /*281*/ "Il travestimento non consiste solo nell'abito ma anche nel comportamento personale. Devi assumere il carattere della persona di cui vuoi prendere le sembianze.\n", + /*282*/ "Usa i dispositivi mimetici quando non c'è nessuno che possa vederti. Evita di sparare se non strettamente necessario finché non sei sicuro della riuscita del tuo attacco.\n", + /*283*/ "La Falcon 2 è una pistola molto precisa: qualsiasi errore dipende da te. La modalità secondaria è la botta col calcio, inutile nel poligono.\n", + /*284*/ "Per sfruttare al meglio la precisione della Falcon 2, essa è dotata di un cannocchiale. Come per la Falcon 2 non modificata, la modalità secondaria è inutile durante la prova al poligono.\n", + /*285*/ "La versione della Falcon 2 con silenziatore è eccezionale per azioni in incognito e per cogliere l'avversario di sorpresa. Assicurati della tua precisione per non rischiare di sprecare l'occasione.\n", + /*286*/ "La Magsec 4 è dotata di un'eccezionale potenza di sparo ma non è troppo precisa, soprattuto se usata nella modalità secondaria a tre esplosioni. Il vero svantaggio dell'arma è il caricatore ridotto.\n", + /*287*/ "È una tipica arma Skedar, potente e brutale. Sacrificando parte del caricatore, il colpo può essere caricato in modo da essere devastante. La carica di munizioni superiore è un bonus.\n", + /*288*/ "Questa versatile pistola ha due sistemi di sparo: uno standard e uno esplosivo. Gli ingegneri Maian sono riusciti a realizzarla contenendo il consumo di energia dell'arma, sebbene la gittata sia ridotta.\n", + /*289*/ "Con la DY357 bisogna sapere quando ricaricare: un caricatore a sei colpi ti fa stare sempre all'erta quando fai fuoco. Il peso della pistola può essere un vantaggio se si deve stendere qualcuno.\n", + /*290*/ "Trent Easton cerca sempre quel qualcosa in più e questa pistola non fa eccezione. Persino le pallottole sono speciali; sono progettate per frammentarsi nell'avversario ed eliminarlo velocemente.\n", + /*291*/ "Un fucile mitragliatore affidabile e efficace: è facile capire perché sia il modello più venduto della dataDyne, anche se non è prevista la modalità secondaria. Il sistema di designazione e puntamento è eccellente e vale la pena di imparare il funzionamento completo dell'arma.\n", + /*292*/ "Il fucile mitragliatore Ciclone non è stato progettato come arma di precisione, anche se vale la pena fare pratica. Può sparare molte pallottole in poco tempo ed è quindi un'eccellente arma di soppressione.\n", + /*293*/ "La flessibilità Maian nel design ha prodotto questo fucile mitragliatore con un'interessante modalità secondaria: una pallottola superveloce ad alta penetrazione. Come per la Phoenix, la velocità di fuoco è ridotta nella modalità secondaria, per evitare danni al meccanismo di sparo e alla canna.\n", + /*294*/ "La RC-P120 spara una speciale pallottola minerale che, assieme all'alta velocità e al notevole caricatore, ne fa uno strumento perfetto da usare contro gli Skedar, se necessario. Le pallottole possono essere usate per alimentare un prototipo di dispositivo mimetico: l'addestramento è stato adeguarsi a tale caratteristica.\n", + /*295*/ "La pistola si chiude in modo da sembrare un laptop e può essere usata come sentinella in modalità secondaria per coprire una via d'uscita o proteggere un luogo.\n", + /*296*/ "Questo è il modello che la dataDyne ha fornito all'esercito USA, anche se non è ancora stato adottato ufficialmente. Poiché la dataDyne riserva sempre brutte sorprese, il fucile d'assalto di base dispone di una mina di prossimità sotto la canna. Usare la modalità secondaria significa dover poi buttar via l'arma.\n", + /*297*/ "Per quanto se ne sa, la modalità secondaria dell'arma sembra essere un rilevatore di minacce, mine guidate, esplosivi nascosti (tipo la Dragon nella modalità secondaria)e pistole automatiche. Anche se potente, il caricatore del fucile d'assalto è troppo piccolo.\n", + /*298*/ "Il primo tentativo dell'istituto di creare un'arma di supporto è l'AR34, un semplice fucile d'assalto. La modalità secondaria è uno zoom costante. Richiede un addestramento preciso.\n", + /*299*/ "La versione più pesante della Dragon, con un piccolo lanciagranate al posto della mina di prossimità. Adottato dall'esercito USA come arma pesante di supporto e a ragione! Esercitati con la traiettoria delle granate.\n", + /*300*/ "La precisione è d'uopo! Ci sono due modalità: esplosione singola o doppia. Il caricatore è piuttosto capiente per un fucile a pompa, ma si devono considerare i lunghi tempi di ricarica.\n", + /*301*/ "Un fucile cecchino sofisticato, con silenziatore e zoom. L'unico elemento funzionale che riduce la precisione è il cecchino. Usa la modalità secondaria per accucciarti e prendere la mira.\n", + /*302*/ "Pur essendo tecnologicamente molto avanzato le caratteristiche del fucile TeleVista sono lampanti. Il colpo è inarrestabile e penetra nelle pareti in grande profondità, puntando e seguendo gli obiettivi se necessario.\n", + /*303*/ "La prima funzione della balestra è un colpo narcotico non letale, mentre la seconda annienta all'istante. È un'arma per missioni in incognito e il caricamento richiede molto tempo, quindi non è adatta in caso di fuoco serrato.\n", + /*304*/ "La pistola sedativo è la stessa usata in molti ospedali e laboratori. Può essere caricata sia con piccole quantità di sedativo sia con dosaggi letali. Il contenuto nel serbatoio cala a seconda del dosaggio.\n", + /*305*/ "Cerca di controllare quest'arma al meglio. È pensata per esseri più forti degli umani, questo è chiaro. Inginocchiarsi aiuta a prendere la mira, ma non ad aggiustarla. Se l'avversario si trova nella linea del fuoco, le canne possono essere usate come un macinatore.\n", + /*306*/ "Un prodotto recente della dataDyne dall'interessante tecnologia. La modalità secondaria attiva un campo magnetico attorno alla bomba, conferendo aderenza per un breve periodo, dopo di che il campo svanisce e la bomba cade dal punto d'impatto esplodendo.\n", + /*307*/ "Un lanciamissili compatto riutilizzabile, si ricarica dopo ogni lancio. La modalità secondaria usa una variante del sistema di puntamento del fucile mitragliatore CMP150,con un solo bersaglio designato. Il missile viaggia a velocità ridotta mentre segue l'obiettivo: calcola bene i tempi!\n", + /*308*/ "Questo lanciamissili Skedar può lanciare un missile non guidato o uno telecomandato. Forse gli Skedar hanno la loro soddisfazione quando la telecamera zooma sul bersaglio, ma un agente del Carrington Institute è superiore a certe cose. Il missile guidato accelera automaticamente, ma può essere rallentato per manovrarlo meglio. L'esplosione avviene a contatto o a comando.\n", + /*309*/ "Un pugnale da lotta temprato, bilanciato anche per il lancio. È necessario fare molta pratica per ottenere una traiettoria precisa della lama lanciata.\n", + /*310*/ "Il reparto sperimentazione armi ha realizzato questo laser da polso, a due raggi, piccolo ma efficace. La modalità primaria ha una gittata considerevole, la secondaria spara un raggio continuo, finché il grilletto è premuto.\n", + /*311*/ "La granata antiuomo a frammentazione esplode dopo quattro secondi dall'attivazione. Per perfezionare l'ordigno è stata aggiunta una modalità secondaria ping-pong. La granata salta da una parte all'altra fino ad esaurimento della carica o attivazione del rilevatore di prossimità.\n", + /*312*/ "Questa granata Maian crea il caos nei neuroni delle creature coscienti. Trovandoti nel raggio di esplosione ti si annebbierà la vista e gli oggetti ti cadranno di mano. Può essere fatta esplodere a impatto o per prossimità. Lanciala abbastanza lontano da te.\n", + /*313*/ "Ci vuole prudenza nell'uso di mine a orologeria, altrimenti il bersaglio può sfuggire dal raggio di esplosione e inseguirti. Fai molta pratica prima di rischiare di compiere gravi errori sul campo. La modalità secondaria è un rilevatore di minaccia come quello del fucile d'assalto K7 Vendetta.\n", + /*314*/ "Il segreto per un buon piazzamento della mina di prossimità è metterla dove l'avversario non se l'aspetta. Se ti trovi all'estremità di destinazione della mina di prossimità, usa il rilevatore di minaccia della modalità secondaria per proteggerti. Può sembrare una perdita di tempo, ma può salvarti la vita.\n", + /*315*/ "L'ultimo modello delle mine a esplosione a distanza, sostanzialmente come le precedenti. La modalità primaria piazza la mina, mentre la secondaria dà il comando di esplosione. Se non vedi la mina, dovrai cercare di calcolare a mente il tempo. \n", + /*316*/ "Olog. 1 - Guardati attorno\n", + /*317*/ "Olog. 2 - Movimento 1\n", + /*318*/ "Olog. 3 - Movimento 2\n", + /*319*/ "Olog. 4 - A mani nude 1\n", + /*320*/ "Olog. 5 - A mani nude 2\n", + /*321*/ "Olog. 6 - Lotta aperta 1\n", + /*322*/ "Olog. 7 - Lotta aperta 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/dish_str_s.c b/src/files/lang/pal-final/dish_str_s.c new file mode 100644 index 000000000..f3721a697 --- /dev/null +++ b/src/files/lang/pal-final/dish_str_s.c @@ -0,0 +1,328 @@ +#include + +char *lang[] = { + /* 0*/ NULL, + /* 1*/ NULL, + /* 2*/ NULL, + /* 3*/ NULL, + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ "Recoge la Visión Nocturna de la mesa para empezar.\n", + /* 9*/ "Activa la Visión Nocturna.\nLocaliza el interruptor de la luz.\nEnciende las luces.\n", + /* 10*/ "Recoge el Conector de Datos de la mesa para empezar.\n", + /* 11*/ "Sitúate cerca de la terminal y usa el Conector.\n", + /* 12*/ "Necesitas sostener el Conector de Datos.\n", + /* 13*/ "Conexión establecida...\n", + /* 14*/ "La Terminal ha sido intervenida con éxito.\n", + /* 15*/ "Conexión perdida: demasiado lejos del PC.\n", + /* 16*/ "Recoge la Mina ECM de la mesa para empezar.\n", + /* 17*/ "Localiza el Puerto y conéctale una Mina ECM.\n", + /* 18*/ "La Mina ECM ha sido colocada incorrectamente.\n", + /* 19*/ "La Mina ECM ha sido colocada correctamente.\n", + /* 20*/ "Recoge la Cámara Espía de la mesa para empezar.\n", + /* 21*/ "Localiza la Sala del PC de Información y holografíala.\n", + /* 22*/ "Sala del PC de Información holografíada correctamente.\n", + /* 23*/ "Las luces han sido reactivadas.\n", + /* 24*/ "Recoge el Decodificador de Puertas de la mesa para empezar.\n", + /* 25*/ "Usa el Decodificador en la puerta para desbloquearla.\n", + /* 26*/ "Necesitas estar sujetando el Decodificador de Puertas.\n", + /* 27*/ "Decodificador colocado. Iniciando rutinas de 'crackeo'...\n", + /* 28*/ "Decodificación completada. La puerta ha sido desbloqueada.\n", + /* 29*/ "Recoge el Rastreador de la mesa para empezar.\n", + /* 30*/ "Localiza el Escáner de Infrarrojos con el Rastreador.\n", + /* 31*/ "El Escáner de Infrarrojos ha sido localizado con éxito.\n", + /* 32*/ "Recoge el Escáner de Infrarrojos de la mesa para empezar.\n", + /* 33*/ "Localiza la puerta secreta usando el Escáner de Infrarrojos.\n", + /* 34*/ "La puerta secreta ha sido localizada con éxito.\n", + /* 35*/ "Recoge el Escáner de Rayos-X de la mesa para empezar.\n", + /* 36*/ "Encuentra los interruptores ocultos para apagar la rejilla láser.\n", + /* 37*/ "Todas las rejillas láser han sido desactivadas.\n", + /* 38*/ "Recoge el Disfraz de la mesa para empezar.\n", + /* 39*/ "Engaña a alguien para que te dé el Dispositivo de Ocultación.\n", + /* 40*/ "Dispositivo de Ocultación recuperado con éxito.\n", + /* 41*/ "Rejilla Láser 1 desactivada.\n", + /* 42*/ "Rejilla Láser 2 desactivada.\n", + /* 43*/ "Estoy aquí para recoger el equipo.\n", + /* 44*/ "Vete, Joanna. ¡No engañas a nadie!\n", + /* 45*/ "Aquí lo tienes. No lo dejes caer.\n", + /* 46*/ "El Dispositivo de Ocultación ha sido asegurado con éxito.\n", + /* 47*/ "Se supone que debes usar el Disfraz, ¿recuerdas?\n", + /* 48*/ "Lo tienes que hacer bastante mejor, Joanna.\n", + /* 49*/ "Joanna, ¿de dónde has salido?\n", + /* 50*/ "Has sido detectado por la cámara.\n", + /* 51*/ "Recoge el Dispositivo de Ocultación de la mesa para empezar.\n", + /* 52*/ "Usa el Dispositivo de Ocultación y localiza a Carrington.\n", + /* 53*/ "¡Creo que podemos asegurar que tu entrenamiento\nha sido completado!\n", + /* 54*/ "Misión completada - ¡Entrenamiento de Dispositivos pasado!\n", + /* 55*/ "Misión fallada: Has sido detectada.\n", + /* 56*/ "Elegir el Conector.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Conector de Datos y suelta el Botón A.\n", + /* 57*/ "Elegir la Cámara Espía.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Cámara Espía y suelta el Botón A.\n", + /* 58*/ "Elegir la Visión Nocturna.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Visión Nocturna y suelta el Botón A.\n", + /* 59*/ "Elegir el Decodificador de Puertas.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Decodificador y suelta el Botón A.\n", + /* 60*/ "Elegir el Escáner de Rayos-X.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de Rayos-X y suelta el Botón A.\n", + /* 61*/ "Elegir el Disfraz.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Disfraz y suelta el Botón A.\n", + /* 62*/ "Elegir el Escáner de Infrarrojos.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Escáner de IR y suelta el Botón A.\n", + /* 63*/ "Elegir el Rastreador.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Rastreador y suelta el Botón A.\n", + /* 64*/ "Elegir el Dispositivo de Ocultación.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina el Dispositivo y suelta el Botón A.\n", + /* 65*/ "Elegir la Mina ECM.\n- Mantén pulsado el Botón A.\n- Usa el Stick de Control para seleccionar.\n- Ilumina la Mina ECM y suelta el Botón A.\n", + /* 66*/ "Joanna, por fin te encuentro.\n", + /* 67*/ "Ven conmigo.\nTe conduciré a las salas de entrenamiento.\n", + /* 68*/ "El centro de información está tras esta puerta.\n", + /* 69*/ "Aquí tenemos el laboratorio de dispositivos.\n", + /* 70*/ "Esto conduce a la sala de entrenamiento de simulantes.\n", + /* 71*/ "Éste es el campo de tiro, Joanna.\n", + /* 72*/ "Este corredor conduce al hangar.\n", + /* 73*/ "ANTIGRAV\nPulsa el Botón B cerca del Antigrav para cogerlo...\n", + /* 74*/ "Cogiendo la caja, pulsa el Botón B para soltarla.\n", + /* 75*/ "AEROMOTO \nPulsa dos veces B cerca de una Aeromoto para subir.\n", + /* 76*/ "Pulsa dos veces B en la Aeromoto para bajar.\n", + /* 77*/ "ABRIENDO PUERTAS\nPulsa el Botón B cerca de una puerta para abrirla.\n", + /* 78*/ "El Botón B también activará cualquier objeto cercano.\n", + /* 79*/ "ASCENSORES\nPulsa el Botón B cerca de la puerta\npara llamar al ascensor.\n", + /* 80*/ "No se puede salir cuando el entrenamiento está en marcha.\n", + /* 81*/ "Has obtenido el Código Interruptor 1.\n", + /* 82*/ "Has obtenido el Código Interruptor 2.\n", + /* 83*/ "Has obtenido el Código Interruptor 3.\n", + /* 84*/ "Has obtenido el Código Interruptor 4.\n", + /* 85*/ "MIRAR ARRIBA\n- Pulsa el Botón C Abajo para mirar hacia arriba.\n", + /* 86*/ "MIRAR ABAJO\n- Pulsa el Botón C Arriba para mirar hacia abajo.\n", + /* 87*/ "El Holoprograma 2 ha sido completado con éxito.\n", + /* 88*/ "El Holoprograma 4 ha sido completado con éxito.\n", + /* 89*/ "El Holoprograma 5 ha sido completado con éxito.\n", + /* 90*/ "El guarda ha sido desarmado con éxito.\n", + /* 91*/ "El guarda ha sido derribado con éxito.\n", + /* 92*/ "Desarma a este objetivo vivo si puedes.\n", + /* 93*/ "Derriba a este objetivo: ocultarse es la clave.\n", + /* 94*/ "Y el guarda final...\n", + /* 95*/ "AGACHARSE\n- Mantén el Botón R, entonces pulsa el Botón C Abajo para agacharte.\n", + /* 96*/ "ARRASTRARSE\n- Una vez agachado, mantén el Botón R, entonces pulsa el Botón C abajo para arrastrarte.\n", + /* 97*/ "El Holoprograma 3 ha sido completado con éxito.\n", + /* 98*/ "Activa todos los interruptores.\n", + /* 99*/ "Activa todos los interruptores del muro.\n- Date prisa, ya que se reinician rápidamente.\n", + /*100*/ "Obtén los códigos de acceso examinando los terminales. \n- Usa los códigos en los terminales del muro.\n", + /*101*/ "El Código 1 ha sido obtenido.\n", + /*102*/ "El Código 2 ha sido obtenido.\n", + /*103*/ "El Código 3 ha sido obtenido.\n", + /*104*/ "El Código 4 ha sido obtenido.\n", + /*105*/ "Entrenamiento fallado: debes mirar al frente.\n", + /*106*/ "El Holoprograma 1 ha sido completado con éxito.\n", + /*107*/ "Combate sin armas: derriba al objetivo.\n- Pulsa el Botón Z repetidamente para golpear.\n", + /*108*/ "Ahora inténtalo contra un objetivo en movimiento...\n", + /*109*/ "Y por último contra un objetivo que contraataca.\n", + /*110*/ "Derrota a todos los enemigos sin ser alcanzado.\n", + /*111*/ "Entrenamiento fallado: te han acertado.\n", + /*112*/ "El Holoprograma 6 ha sido completado con éxito.\n", + /*113*/ "El Holoprograma 7 ha sido completado con éxito.\n", + /*114*/ "TERMINALES\n- Pulsa el Botón B cerca de la terminal\npara usarla.\n", + /*115*/ "Ahora activa las terminales rojas del muro.\n", + /*116*/ "PP7\n", + /*117*/ "TT33\n", + /*118*/ "Skorpion\n", + /*119*/ "AK47\n", + /*120*/ "Uzi 9mm\n", + /*121*/ "MP5K\n", + /*122*/ "M-16\n", + /*123*/ "FNP90\n", + /*124*/ "Bien, Joanna, te dejo. Prepárate para la misión.\n", + /*125*/ "Joanna Dark\n", + /*126*/ "Humano (Mujer)\n", + /*127*/ "23 años 2 meses\n", + /*128*/ "|Fichero IC #027 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A++\nEstatus Actual: Asignado\n\n|Perfil -\n\nAltamente entrenada pero sin experiencia. Reacción excelente. Experta en gran variedad de armas. Agente muy competente en todo momento. La más alta puntuación en entrenamiento, lo que llevó a la creación de un nuevo nivel. Es la encarnación del agente ideal del Instituto Carrington, de ahí su nombre clave: 'Perfect Dark'.\n", + /*129*/ "Jonathan\n", + /*130*/ "Humano (Hombre)\n", + /*131*/ "28 años 5 meses\n", + /*132*/ "|Fichero IC #009 -\n\nEstatus Entrenamiento: Completado\nGrado de Entrenamiento: A+\nEstatus Actual: Secreto\n\n|Perfil -\n\nNuestro agente secreto con mayor experiencia. Muy preciso con su arma favorita (un Revólver Magnum). Perfectamente preparado para misiones secretas. Menos preparado en combate normal. Tras Joanna Dark, tiene el honor de tener la puntuación más alta en entrenamiento.\n", + /*133*/ "Daniel Carrington\n", + /*134*/ "Humano (Hombre)\n", + /*135*/ "62 años 8 meses\n", + /*136*/ "|Fichero IC #000 -\n\nEstatus Entrenamiento: N/D\nGrado de Entrenamiento: N/D\nEstatus Actual: N/D\n\n|Perfil -\n\nInteligente y patriarcal científico/empresario, fundador del Instituto Carrington. Planifica todas las misiones de sus agentes y controla cada operación desde su oficina. Con un gusto un tanto personal en la ropa.\n", + /*137*/ "Cassandra De Vries\n", + /*138*/ "Humano (Mujer)\n", + /*139*/ "39 años ? meses\n", + /*140*/ "|Análisis -\n\nDirectora de la Corporación dataDyne. Adicta al poder; detesta ser subordinada de nadie. Odia perder la iniciativa. No muestra ninguna clase de escrúpulos si con ello consigue superarse en su competición con Daniel Carrington, al cual aborrece.\n", + /*141*/ "Trent Easton\n", + /*142*/ "Humano (Hombre)\n", + /*143*/ "46 años ? meses\n", + /*144*/ "|Análisis -\n\nDirector de la Agencia Nacional de Seguridad. Tiene una cierta amistad con Cassandra De Vries, aunque parece más una unión de interés. Tiende a hacer lo que dice Cassandra, ya que aunque tiene una personalidad dominante, no lo es tanto como la de ella. Cabeza visible de los elementos más granujas de la ANS.\n", + /*145*/ "Dr. Caroll\n", + /*146*/ "La Inteligencia Caroll (IA)\n", + /*147*/ "6 meses\n", + /*148*/ "|Perfil -\n\nInteligencia artificial creada por la Corporación dataDyne con habilidades de lenguaje y apertura de códigos. Afortunadamente, tiene moral, y debido a su formidable nivel de inteligencia, ha adivinado algunos de los planes futuros de dataDyne. Su voz es muy precisa y educada y simula la personalidad de un académico.\n", + /*149*/ "Elvis\n", + /*150*/ "Maian (Macho)\n", + /*151*/ "320 años\n", + /*152*/ "|Perfil -\n\nAlienígena de la raza Maian. Es un 'Protector' (guardaespaldas) del embajador Maian que viaja a la Tierra a petición de Daniel Carrington. Los Protectores están entrenados para dominar una gran variedad de armamento. Elvis es un terrófilo, es decir, está fascinado por el planeta Tierra y todo lo que contiene.\n", + /*153*/ "Mr. Blonde\n", + /*154*/ "Humano (Hombre)\n", + /*155*/ "Unos 30 años\n", + /*156*/ "|Perfil -\n\nEs un sorprendente hombre rubio. Muy alto, viste ropa blanca, habitualmente una gabardina. Parece ser la cabeza pensante de la conspiración en la que Cassandra y Trent están involucrados. Poco más se sabe.\n", + /*157*/ "Mr. Blonde\n", + /*158*/ "Skedar (disfrazado)\n", + /*159*/ "desconocida\n", + /*160*/ "|Perfil Actualizado -\n\nSe trata de un guerrero Skedar disfrazado con la proyección holográfica de un impresionante humano rubio de unos 30 años. Su unidad de modulación oral da al Skedar una precisa, persuasiva, e inteligente voz. Es un instrumento de propaganda y manipulación de los Skedar, inusualmente sutil.\n", + /*161*/ "Presidente de EE.UU.\n", + /*162*/ "Humano (Hombre)\n", + /*163*/ "50 años\n", + /*164*/ "|Perfil -\n\nAltamente educado, es un perspicaz afroamericano que intenta hacer lo correcto, pero que está rodeado de gente como Trent Easton. Cree que tiene a Trent bajo control tras rechazar la petición de préstamo del Pelagic II a la Corporación dataDyne. La mayoría de comentaristas políticos piensa que es fácil de controlar, lo cual quizás sea injusto.\n", + /*165*/ "Maian\n", + /*166*/ "Los Maian son la raza de alienígenas conocida en la Tierra como los 'Grises'. Han vigilado la Tierra durante largo tiempo, bastantes siglos, y han sido benevolentes con la humanidad, siendo conscientes del potencial de la raza humana. Su contacto en la Tierra es Daniel Carrington. Todavía debe hacerse un contacto político formal.\n", + /*167*/ "Guerreros Skedar\n", + /*168*/ "Los Skedar son una raza alienígena guerrera que luchó con los Maian durante siglos y sólo ahora han aceptado un alto el fuego. Suelen usar armaduras para caminar y luchar, ya que son criaturas bastante pequeñas y con forma de serpiente. Son muy agresivos y extremadamente devotos; han hecho de la Guerra una religión.\n", + /*169*/ "Antecedentes\n", + /*170*/ "Hace millones de años, una gigantesca nave alienígena de inmenso poder, creada por una raza alienígena llamada Cetan, se hundió en el Océano Pacífico. Estaba equipada con una nueva arma devastadoramente peligrosa: la 'fuerza nuclear de acople débil', que en teoría puede causar que las cadenas que unen las moléculas fallen. Aunque algunos hubieran creído en la innegable destrucción de la nave, un mensaje-cápsula fue enviado a casa, y partes vitales de los sistemas de navegación fueron destruidas en el sistema estelar que eligieron como escondite.\n\n Esta nave era un Cetan, una gigantesca, criatura alienígena centinela.\n\nOtra raza extraterrestre, los Maian, encontró vida en la Tierra en el 2000 AC. Detectaron un gran potencial, pero decidieron dejar a la primitiva raza humana desarrollarse sin intromisiones.\n\nLos Maian encontraron a los Skedar cerca de Delta Eridanus en el 1650 DC (fecha terráquea), y la escaramuza resultante pronto floreció en una guerra total. Sólo tras cientos de años de lucha se logró un tratado de paz, aunque los fanáticos Skedar se saltaban continuamente los acuerdos de esta paz con actividades terroristas. Afortunadamente, los Maian rehusaron abandonar.\n\nLa humanidad, también, continuó siendo una causa que concernía a los Maian, los cuales veían con decepción cómo la Tierra sufría más y más crisis debido al crecimiento de la tecnología y a 'situaciones fuera de contexto'. Sintieron que anunciar su presencia sólo precipitaría guerras futuras en el planeta, y tranquilamente decidieron continuar en observación hasta que la raza madurara más.\n\nDaniel Carrington se adelantó a todos en el 1985 DC al contactar con una nave Maian en órbita sobre la Tierra. Propuso un plan que podía ayudar a ambas partes, resultando así un contacto acelerado entre Humanos y Maian. Viendo que su plan era sensato, y que se trataba de una persona íntegra, los Maian permitieron a Carrington lanzar su tecnología al dominio público a través de sus grandes empresas de Investigación y Desarrollo.\n\nEntonces, en el 2006 DC, los fanáticos Skedar dieron con la cápsula-mensaje Cetan. Inmediatamente comenzaron a rastrear la Tierra de un modo particularmente duro, abduciendo gente y mutilando animales en un intento de determinar la localización del crucero de batalla perdido. Con el tiempo, sus pruebas les condujeron inevitablemente al lecho marino del Océano Pacífico; de todos modos, para alcanzarla, necesitarían ayuda de los nativos.\n\nLlevando a cabo su propio estudio de la Tierra, los Skedar confeccionaron una corta lista de compañías que poseían los recursos para ayudarles a recuperar la nave hundida. En lo más alto de esa lista estaba la Corporación dataDyne. Contactaron con su directora, Cassandra De Vries, y se presentaron con un trato que sonaba demasiado bien para ser cierto: el cual, por cierto, lo era. A cambio de su ayuda para levantar 'su' nave del lecho marino, los Skedar prometieron dotar a dataDyne con suficiente tecnología alienígena para convertirse en la mayor corporación sobre la faz del planeta. Todo lo que dataDyne tenía que hacer era construir una unidad de IA con habilidades de lenguaje y 'rotura' de códigos, que era justo lo que necesitaban. Se comenzó a trabajar en el proyecto inmediatamente.\n\nCassandra De Vries le mostró al director de la ANS, Trent Easton, los detalles del plan, pero sus intentos de conseguir la aprobación Presidencial para el préstamo de una nave de investigación a profundidad, fueron repetidamente rechazados. No existía la posibilidad de que los Skedar o dataDyne pudieran robar la nave sin desatar la ira del Gobierno de los EE.UU., así que decidieron trazar un plan bastante más siniestro para reemplazar al Presidente con un clon que ellos pudieran controlar. Por supuesto, esto prometía recompensas extra para Trent y Cassandra cuando la operación Skedar pasara a la historia.\n\nDe todas formas, no tuvieron mucho tiempo para regodearse. El plan último de los fanáticos Skedar era probar la 'fuerza nuclear de acople-débil' en la Tierra antes de eliminar a los Maian, y tanto Cassandra como Trent permanecieron ciegos ante la posibilidad de ser traicionados, así que enamorados de las visiones de poder y lujo, continuaron adelante.\n\nPero dataDyne había creado inconscientemente algo que podía ver demasiado claro el peligro que implicaba una conspiración de tal magnitud: la sabia IA construida para abrir los códigos de acceso de la nave Cetan. Cuando se mostró disconforme con la misión para la que había sido diseñada, la respuesta de Cassandra fue ordenar que su personalidad fuera eliminada. Claramente, pensaba demasiado. En su desesperación, y en un movimiento que podría sellar o romper un mejor trato que el 'pacto' entre dataDyne y los Skedar, la IA adoptó el seudónimo de Dr. Caroll y contactó con el Instituto Carrington con una súplica de ayuda...\n", + /*171*/ "La Historia\n", + /*172*/ "A la inexperta agente Joanna Dark se le asignó una misión relacionada con la 'extracción' de un científico de un área de desarrollo de alta seguridad sita bajo el rascacielos de dataDyne. Después del encuentro, se sorprende al descubrir que el 'Dr. Caroll' es una IA creada por la propia dataDyne, pero ella continúa con su tarea de escoltarle/lo a un lugar seguro. Cuando salta la alarma, Joanna tiene que abrirse camino hacia lo alto del edificio para alcanzar el helipuerto y la lanzadera que supone su única vía de escape.\n\nEn respuesta a esta incursión, dataDyne marca a Daniel Carrington como un objetivo personal y lo toma como rehén dos días después en su villa privada. Demandan la devolución de la IA, su 'propiedad', a cambio de su vida. No lo saben, pero la IA ya está en la villa, donde fue interrogada por Carrington sobre los planes de futuro de dataDyne. Finalmente, Joanna rescata al director del Instituto pero es incapaz de evitar que dataDyne se apodere de nuevo del Dr. Caroll. De todas formas, Carrington conoce lo suficiente como para dar el paso drástico de reclamar en la Tierra un equipo de especialistas Maian.\n\nJoanna es enviada para espiar la reunión de los conspiradores en el Edificio G5, una tapadera de la Corporación dataDyne. Es aquí donde averigua que Trent Easton, director de la ANS, y aquellos hombres nórdicos, que parecen tener el control del mortal plan, están involucrados. Cuando Trent revela el plan de usurpar la posición Presidencial, Joanna comunica por radio las novedades a la base, sólo para descubrir que otra tarea todavía más urgente requiere de ella, antes incluso de llevar a cabo cualquier acción contra Trent.\n\nLos especialistas Maian han sido interceptados y derribados por los conspiradores, y los supervivientes y los restos del accidente son transportados al Área 51, en Nevada. Con la misión de rescatar supervivientes y recuperar sus equipos, Joanna es 'introducida' para enlazar con otro agente del Instituto Carrington. Cuando irrumpe en el laboratorio médico, Joanna descubre finalmente el secreto del Instituto, sus aliados son los Maian, la raza alienígena comúnmente conocida como los 'Grises'. El Maian en particular que ella rescata responde al nombre de Elvis. Fue un guardaespaldas del Embajador que viajaba a la cabeza del equipo de especialistas.\n\nHabiendo asistido al resto de la delegación Maian, Joanna puede volver al asunto del Presidente y a los planes de dataDyne en su contra. Se hace pasar por miembro del séquito Presidencial para acceder a la base aérea donde el Air Force One está ubicado, y consigue colarse con éxito en el avión. Nada más despegar, Trent y el Skedar disfrazado mueven pieza, pero Joanna está allí para detenerles. Apresura al Presidente a la cápsula de escape mientras un equipo de hombres de Trent registran detenidamente el avión, en un intento de arrastrar al desgraciado político a bordo del OVNI Skedar, unido al AF1 por un tubo. Joanna debilita el tubo pero es incapaz de romperlo, y en última instancia Elvis intenta romper el tubo estrellándose contra él a gran velocidad. Las tres naves caen en picado sobre la 'inexplorada' Alaska, y la cápsula de escape del AF1 se eyecta.\n\nUna vez consciente, Joanna intenta informar por radio pero las comunicaciones están bloqueadas debido a interferencias provenientes de la nave Skedar. Vagando por la nieve en busca del Presidente y de Elvis, se encuentra con grupos de Skedar ocultos que la buscan a ella, al Presidente, a Elvis y las pertenencias del Presidente. Localiza un grupo de vuelta a la nave Skedar derribada, donde descubre un clon del Presidente: rápidamente lo destruye, apaga el origen de las interferencias y pide ayuda a la 'caballería'. Los planes Skedar han vuelto a ser frustrados, el Presidente está seguro y la incompetencia de Trent le ha llevado a un sucio destino a manos de sus 'aliados'.\n\nPero aquí no acaba la cosa. Descuidando toda precaución, dataDyne y los Skedar roban el navío de investigación del Gobierno, el 'Pelagic II', y se ponen en marcha hacia el lugar del siniestro en el Pacífico. Joanna y Elvis acuden para desbaratar la actividad a bordo y averiguar qué se esconde tras el gran plan Skedar. Después de paralizar las operaciones de inmersión del navío y replegar el sumergible, bajan al fondo oceánico, donde hacen el primer avistamiento del crucero de batalla Cetan derribado. Un portal hecho por los Skedar les permite el acceso a la nave, donde se encuentran con el cadáver de un guerrero Skedar... Parece que el equipo de asalto no las tenía todas consigo. Venciendo a los restantes vengativos Skedar y evitando a los Cetan, Joanna y Elvis se abren camino hasta el corazón de la nave, donde encuentran la IA que una vez fue Dr. Caroll. Se las apañan para restaurarle la personalidad, después de lo cual les ayuda a abandonar la nave para poder destruirla por el bien de todos.\n\nMás tarde, de vuelta en el Instituto Carrington, Joanna está a punto de salir hacia una recepción Presidencial en la Casa Blanca cuando se arma un gran revuelo. Los supervivientes del equipo de asalto Skedar están descargando su ira en aquellos en los que piensan recae la responsabilidad de su error al perder la nave Cetan. Joanna corre por el Instituto, ayudando a los empleados del IC a alcanzar la seguridad de los hangares, mientras los Skedar lanzan ataques en varias partes del edificio: la mayoría de los empleados pudieron ponerse a salvo mientras Joanna mantenía la resistencia, pero finalmente es golpeada e inconsciente es tomada como prisionera.\n\nJoanna despierta en una celda a bordo de la nave de asalto Skedar, con Cassandra De Vries como única compañía. Por sorpresa, la directora de dataDyne, de buena gana da su vida para crear la distracción necesaria para que Joanna escape. Luchando a través de la nave, logra localizar y desactivar los escudos de la bahía de carga, permitiendo a Elvis llevar a unos cuantos amigos a la tan esperada 'fiesta' de la nave.\n\nLa ya capturada nave de asalto entra en órbita sobre el Templo de Batalla Skedar, lo que sorprende a Elvis ya que los Maian nunca antes habían encontrado 'el más sagrado' lugar Skedar en todos los años de Guerra interracial. Si el Templo es destruido, la moral Skedar será abatida, y se logrará una paz verdadera en vez de un inútil 'alto el fuego'. Joanna busca al líder Skedar, el más alto sacerdote del Templo de Batalla, mientras Elvis regresa a la nave de asalto para traer a la flota Maian.\n\nAl despertar de tan culminante batalla, el templo está devastado. Elvis pide que se pare el bombardeo para encontrar a Joanna. Está viva pero retenida bajo una pila de escombros donde un tenaz Skedar la atrapa durante los últimos segundos de su intento de escapar. Elvis le entrega rápidamente un arma para convencer al Skedar de que la deje irse, y con el trabajo ya hecho, el Templo y la moral Skedar en ruinas y la conspiración desbaratada, los dos parten a la órbita más cercana.\n", + /*173*/ "Corporación dataDyne\n", + /*174*/ "La monolítica corporación que dataDyne ha llegado a ser comenzó su negocio como programadora de sistemas de IA. Cuando de verdad comenzó a crecer, fue cuando consiguió trabajos como contratista de los militares norteamericanos, y su joven y dinámica gerente Cassandra De Vries empezó a cerrar tratos con fabricantes de armas, mientras ignoraba las ofertas de Daniel Carrington y el Instituto para colaborar en el desarrollo de ordenadores cuánticos e IAs. Cuando la tercera compañía armamentística fue comprada por dataDyne, los beneficos se tornaron astronómicos. Tras recibir un contrato del gobierno para el desarrollo de armas, Cassandra De Vries fue promocionada a Directora. Una significativa parte de los beneficios de la corporación fueron redirigidos a desarrollo de IAs, con resultados excelentes.\n", + /*175*/ "Instituto Carrington\n", + /*176*/ "Brevemente considerado como inventor chiflado, Daniel Carrington fue el primero en crear la tecnología anti-gravedad. Las ganancias obtenidas, así como su desarrollo, le permitieron crear el Instituto Carrington, un remanso de creadores de tecnología situado en un remoto lugar de los EE.UU. De hecho, el Instituto es un campo de entrenamiento para agentes que son enviados por todo el planeta para seguir el desarrollo tecnológico actual, por razones que sólo conoce el propio Daniel Carrington.\n", + /*177*/ "Descripción\n- Una pequeña cámara remota para exploración sigilosa. Realiza holografías espectroscópicas. Abre puertas proyectando un impulso de calor del tamaño de un humano.\n\nInstrucciones de Entrenamiento\n- Crea un holograma del terminal hacker de al lado de la Sala de Información.\n\nOperativa\n- El Botón Z toma una holografía. El Botón B abrirá cualquier puerta en el camino. Mantén el Botón R para mirar.\n", + /*178*/ "Descripción\n- Mejora la luz visible para producir una imagen del área circundante. También refleja formas de vida. En niveles normales de luz se produce una sobrecarga que 'blanquea' el visor.\n\nInstrucciones de Entrenamiento\n- Busca el interruptor de la luz en la oscuridad y actívalo.\n\nOperativa\n- Selecciona la Visión Nocturna de tu inventario para activarla. Hazlo de nuevo para desactivarla.\n", + /*179*/ "Descripción\n- Dispositivo para apertura de códigos. Se aplica sobre el panel de control y busca la combinación hasta que la puerta se abra.\n\nInstrucciones de Entrenamiento\n- Encuentra el panel de la puerta cerrada y usa el Descodificador de Puertas en él hasta que la abras.\n\nOperativa\n- Sitúate cerca del panel de la puerta y pulsa el Botón B mientras sujetas el Descodificador para usarlo.\n", + /*180*/ "Descripción\n- Se usa para ver a través de muros sólidos y objetos. Puede ver cosas que la Visión Nocturna y el Escáner de Infrarrojos no pueden.\n\nInstrucciones de Entrenamiento\n- Con el Escáner de Rayos-X, busca los dos interruptores ocultos y actívalos para apagar la cuadrícula láser.\n\nOperativa\n- Elige el Escáner de Rayos-X de tu inventario para activarlo. Selecciónalo otra vez para desactivarlo.\n", + /*181*/ "Descripción\n- Evita problemas al usar un disfraz. Pero, siempre debes estar alerta ante la posibilidad de ser desenmascarado por un enemigo espabilado.\n\nInstrucciones de Entrenamiento\n- Grimshaw tiene un Dispositivo de Ocultación esperándote. Ve a la puerta de al lado para 'hacerte' con uno.\n\nOperativa\n- Para llevar el disfraz, simplemente elígelo en tu inventario.\n", + /*182*/ "Descripción\n- Traslada datos termales en imágenes visibles. Puede ser usado en la oscuridad y también revela anomalías como puertas ocultas o muros debilitados.\n\nInstrucciones de Entrenamiento\n- Enciende el Escáner de Infrarrojos, encuentra la puerta oculta y ábrela.\n\nOperativa\n- Elige el Escáner de Infrarrojos en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*183*/ "Descripción\n- Localiza un objeto en el mapa radar del visor. Muestra la posición relativa y la distancia.\n\nInstrucciones de Entrenamiento\n- Activa el Rastreador y sigue la señal de radar hasta obtener el objeto.\n\nOperativa\n- Selecciona el Rastreador en tu inventario para activarlo. Reelígelo para desactivarlo.\n", + /*184*/ "Descripción\n- Trastorna el espectro visible de luz alrededor del portador, creando un efecto camaleónico. Este campo desaparece cuando el portador dispara.\n\nInstrucciones de Entrenamiento\n- Activa el Dispositivo de Ocultación y dirígete a la oficina de Carrington para sorprenderle.\n\nOperativa\n- Selecciona el Dispositivo de Ocultación para activarlo. Reelígelo para desactivarlo.\n", + /*185*/ "Descripción\n- Emite una señal constante que sirve para bloquear cualquier dispositivo de comunicación electrónica. Debe ser colocado en el objeto para ser efectivo.\n\nInstrucciones de Entrenamiento\n- Lanza la Mina ECM en el Puerto tras la puerta secreta.\n\nOperativa\n- Pulsa el Botón Z para lanzar la mina. Mantén el Botón R y mueve el Stick de Control para afinar tu puntería antes de lanzar.\n", + /*186*/ "Descripción\n- Comunica al agente de campo con los hackers del Instituto sitos en el CG, quienes pueden romper cerraduras electrónicas a distancia.\n\nInstrucciones de Entrenamiento\n- Usa el Conector de Datos para 'hackear' la terminal de la esquina, abriendo así una puerta secreta.\n\nOperativa\n- Sitúate en la terminal y pulsa el Botón B mientras sujetas el Conector de Datos.\n", + /*187*/ "DISPARAR\n Pulsa el Botón Z para disparar el arma.\n", + /*188*/ "RECARGA AUTOMÁTICA\n Suelta el Botón Z cuando no tengas munición.\n", + /*189*/ "RECARGA MANUAL\n Pulsa el Botón B para recargar en cualquier momento.\n", + /*190*/ "Apuntar: Mantén el Botón R para entrar en el modo Apuntar.\n", + /*191*/ "Usa el Stick de Control para mover la mirilla.\n", + /*192*/ "AUTODISPARO\n Mantén el Botón Z para disparar automáticamente.\n", + /*193*/ "ALTERAR VISTA\n Pulsa el Botón C Arriba o el Botón C Abajo para mover la vista arriba/abajo.\n", + /*194*/ "ZOOM\n Mantén el Botón R para entrar en el modo Zoom.\n", + /*195*/ "FUEGO RÁPIDO\n Pulsa el Botón Z rápido para disparar más velozmente.\n", + /*196*/ "Instituto Carrington\0|Base de operaciones\n", + /*197*/ "Edificio Lucerne\0|Cuartel General Global\n", + /*198*/ "Sótano Laboratorio\0|Laboratorios subterráneos\n", + /*199*/ "Villa Carrington\0|Propiedad privada en la costa\n", + /*200*/ "Chicago\0|Barrios Bajos de la ciudad\n", + /*201*/ "Edificio G5\0|Edificio de la Corporación dataDyne\n", + /*202*/ "Área 51\0|Cerca de Lago Seco, Nevada\n", + /*203*/ "Base Aérea Alaska\0|Brooks Range, Alaska\n", + /*204*/ "Air Force One\0|Avión del Presidente\n", + /*205*/ "Lugar del Impacto\0|Isla Victoria 71 N 118 O\n", + /*206*/ "Pelagic II\0|Navío especializado de profundidad\n", + /*207*/ "Nave Cetan\0|Nave alienígena en la Tierra\n", + /*208*/ "Nave de Asalto Skedar\0|Nave espacial de transporte\n", + /*209*/ "Mundo Skedar\0|El planeta del Templo de Batalla\n", + /*210*/ "Lanzadera\0|Ágil transporte de tropas\n", + /*211*/ "AntiGrav\0|Dispositivo de Anti-gravedad\n", + /*212*/ "Aeromoto\0|Vehículo aéreo de baja altitud\n", + /*213*/ "Bot de Limpieza\0|Tu ayudante especial\n", + /*214*/ "Hovercóptero\0|Nave de asalto urbana\n", + /*215*/ "Robot G5\0|Droide urbano de combate\n", + /*216*/ "Interceptor A51\0|Interceptor aéreo robótico\n", + /*217*/ "Nave Maian\0|Nave de reconocimiento y patrulla\n", + /*218*/ "Lanzadera Skedar\0|Nave alienígena de tropas\n", + /*219*/ "El edificio del Instituto comprende diferentes áreas: oficinas y laboratorios, talleres y hangares. Está bastante aislado del mundo exterior, lo que ayuda a mantener las operaciones en secreto.\n", + /*220*/ "En el centro del distrito financiero, el austero rascacielos de la Corporación dataDyne destaca sobre sus vecinos.\n", + /*221*/ "Fuertemente guardados, estos bien escondidos laboratorios son la clave del futuro de dataDyne. En ellos, los técnicos trabajan secretamente para situar a dataDyne en lo más alto.\n", + /*222*/ "Perteneciente al Instituto, esta apartada residencia es utilizada por Daniel Carrington como retiro de su trabajo en el Instituto. También tiene un observatorio, su propio generador eléctrico y una amplia bodega.\n", + /*223*/ "Es una sórdida y mugrienta parte de Chicago, ahora cerrada al tráfico. Es aquí donde la Corporación G5 tiene su cuartel general.\n", + /*224*/ "Dentro del Edificio G5 hay una sala de reuniones protegida por sistemas antigrabación. Para dataDyne es el lugar más seguro para formular sus planes confidenciales.\n", + /*225*/ "Esta sección de la gigantesca instalación conocida como Área 51 está situada al pie de las colinas de Lago Seco. Helipuertos exteriores y torres de comunicación indican el posible tamaño del complejo subterráneo.\n", + /*226*/ "Una de las muchas bases aéreas reforzadas para acoger al Air Force One cuando reposta. Normalmente, estas bases aéreas están en lugares remotos en regiones inhóspitas, lejos de ojos entrometidos.\n", + /*227*/ "Este Air Force One en particular está optimizado para climas fríos, siendo muy útil cuando se usa en el norte de Alaska. El destino del vuelo es Oslo, Noruega.\n", + /*228*/ "En este rocoso paisaje cubierto de nieve en pleno Círculo Ártico, descansan los restos de un avión destrozado.\n", + /*229*/ "Propiedad del gobierno norteamericano, el Pelagic II es capaz de consumar operaciones a muy baja profundidad en cualquier condición. Es el único navío de desarrollo a baja profundidad del mundo.\n", + /*230*/ "Se trata de una nave gigantesca de construcción alienígena que reposa en el fondo oceánico desde hace millones de años.\n", + /*231*/ "Es una nave de asalto interplanetaria que transporta guerreros Skedar a zonas de guerra. Pertenece a la muy reducida flota de batalla Skedar.\n", + /*232*/ "Se trata de un planeta extremadamente árido, asolado por terremotos, tormentas de arena y huracanes. Es parte de un complejo sistema solar que incluye tres soles.\n", + /*233*/ "Este pequeño, rápido, y altamente manejable transporte de agentes ha sido diseñado para uso en áreas urbanas. Puede ser controlado por ordenador o remotamente. Tiene espacio suficiente en su interior para tres o cuatro agentes, más su equipamiento.\n", + /*234*/ "Este dispositivo anti-gravedad fue diseñado para ayudar en los almacenes. Se aplica en el lateral de una caja. Cuando se activa, el campo antigravitatorio levanta el cajón y le quita algo de inercia.\n", + /*235*/ "Es una moto de patrulla de baja altitud. Usa una pequeña unidad antigravedad para elevarse, y una poderosa turbina para moverse y proveer de control direccional.\n", + /*236*/ "Mantiene el lugar limpio y ordenado. Suele tener acceso a todas las áreas de un edificio. Los agentes han sido adiestrados en mantener estos robots intactos, ya que pueden conseguir acceso a zonas sensibles.\n", + /*237*/ "Vehículo de patrulla urbana y eliminación, con tripulación de dos hombres, y armado con un cañón en el morro, y dos sistemas de misiles en las alas. Puede ser eliminado con fuego sostenido, o preferentemente, un cohete bien dirigido.\n", + /*238*/ "Es un robot de combate diseñado para guerrilla urbana. Usa una unidad anti-gravedad. Está fuertemente armado. Se suele usar para mantener lejos a visitantes no deseados, gracias a su programación de '1° dispara, después pregunta'.\n", + /*239*/ "Variación robótica de la Aeromoto, con mayor poder gravitatorio y de turbina; puede alcanzar velocidad Mach 2 fácilmente y avanzar durante horas a velocidad de crucero. Aunque bien armada, se basa en su manejabilidad más que en el escudo.\n", + /*240*/ "Está diseñada para llevar a un único piloto Maian. Un pasajero se puede sentir atorado: si éste es humano, puede ser aún peor.\n", + /*241*/ "Es capaz de llevar a la batalla a diez guerreros Skedar completamente armados. Es indetectable por el radar convencional. Puede emitir señales de bloqueo sobre áreas considerables: éstas interrumpen las comunicaciones así como los equipos de detección.\n", + /*242*/ "Descripción\n- Un buen agente siempre observa lo que hay a su alrededor.\n\nInstrucciones de Entrenamiento\n- Examina todos los objetos mirándolos directamente.\n\nOperativa\n-Mirar arriba: Pulsa el Botón C Abajo\n-Mirar abajo: Pulsa el Botón C Arriba\n-Vista Libre: Mantén pulsado el Botón R para entrar en el modo Apuntar, y usa el Stick de Control para mirar.\n", + /*243*/ "Descripción\n- Esquivar y eludir te puede sacar de muchos problemas.\n\nInstrucciones de Entrenamiento\n- Activa todos los interruptores. Sé rápida, ya que cada botón se reiniciará en un tiempo límite.\n\nOperativa\n- Esquivar Izquierda: Botón C Izquierda\n- Esquivar Derecha: Botón C Derecha\n\n", + /*244*/ "Descripción\n- Agacharse puede abrir nuevas áreas de exploración.\n\nInstrucciones de Entrenamiento\n- Avanza evitando los obstáculos utilizando los movimientos disponibles. Activa los interruptores.\n\nOperativa\n- Agacharse: Mantén el Botón R, y pulsa el Botón C Abajo.\n- Arrastrarse: Una vez agachado, mantén el Botón R, y pulsa el Botón C Abajo.\n- Levantarse: Presiona el Botón R.\n\n", + /*245*/ "Descripción\n- Luchar contra múltiples oponentes en combates mano a mano puede ser difícil.\n\nInstrucciones de Entrenamiento\n- Derriba a todos los enemigos sin ser golpeado.\n\nOperativa\n- Puñetazo: Pulsa el Botón Z repetidamente cuando estés desarmado para lanzar una ráfaga de puñetazos.\n\n", + /*246*/ "Descripción\n- Desarmar a un enemigo te puede proporcionar una nueva arma.\n\nInstrucciones de Entrenamiento\n- Derriba/desarma a todos los enemigos sin ser golpeado.\n\nOperativa\n- Desarmar: Mantén el Botón B, entonces pulsa el Botón Z para desarmar al enemigo.\n- Puñetazo KO: Golpea a un enemigo desprevenido por detrás.\n", + /*247*/ "Descripción\n- Lucha contra múltiples oponentes en combate mano a mano.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*248*/ "Descripción\n- Lucha contra múltiples oponentes, unos armados y otros no.\n\nInstrucciones de Entrenamiento\n- Derrota a todos los enemigos sin ser golpeado.\n\n", + /*249*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*250*/ "Piensa dónde quieres ir antes de intentar la prueba. Establece tu posición en un lugar que requiera la menor cantidad de movimiento posible entre objetivos.\n", + /*251*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*252*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*253*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nueva arma.\n", + /*254*/ "No esperes a ser alcanzada, ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*255*/ "Ve a por los oponentes armados sólo si estás segura de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*256*/ "Para mayor precisión y libertad cuando mires alrededor, usa el modo Apuntar.\n", + /*257*/ "Esquivar y eludir te puede sacar de muchos problemas.\n", + /*258*/ "Agacharse permite alcanzar lugares normalmente inaccesibles para ti, pero recuerda que te mueves más rápido cuando estás en pie. Para avanzar lo más rápido posible, intenta agacharte sólo cuando lo necesites.\n", + /*259*/ "Atacar a los enemigos por detrás no es muy honorable, pero hará bastante más fácil derribarlos. Sólo debes acercarte a distancia de lucha cuando tengas que hacerlo, y estate preparada para salir de su alcance cuando te ataquen.\n", + /*260*/ "Sólo debes estar cerca el tiempo suficiente para coger el arma. Sal de su alcance, y usa tu nuevo arma.\n", + /*261*/ "No esperes a ser alcanzada; ¡muévete! No te centres en un solo oponente; intenta situar dónde se encuentran todos. Si no puedes ver a todos, muévete hasta que sea posible.\n", + /*262*/ "Ve a por los oponentes armados sólo si estás seguro de tus habilidades cuerpo a cuerpo. Retrocede con los enemigos desarmados y usa sus armas antes de que puedan acercarse demasiado a ti.\n", + /*263*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*264*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*265*/ "La Cámara Espía puede ser difícil de controlar, así que tómate tu tiempo.\n", + /*266*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga.\n", + /*267*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*268*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al blanco. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*269*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*270*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*271*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*272*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte.\n", + /*273*/ "Siempre debes mantener el objetivo a la vista cuando uses el Conector de Datos, y mantenerte cerca para evitar que se rompa la conexión.\n", + /*274*/ "Asegúrate de que la mina aterriza en el sitio correcto acercándote tanto como puedas al objetivo. Ajusta tu mirilla usando los Botones C o el modo Apuntar del Botón R.\n", + /*275*/ "La Cámara Espía no es invisible: los enemigos la pueden descubrir, así que ten cuidado cuando entres en un área habitada. Recuerda que la Cámara Espía se quedará donde la dejes hasta que la recojas.\n", + /*276*/ "Es útil en combate, pero puede causar problemas cuando se sobrecarga. Intenta anticiparte a las situaciones y reacciona antes que el enemigo.\n", + /*277*/ "Si tienes problemas para usar el Decodificador, intenta acercarte más al objetivo poniéndote cara a cara.\n", + /*278*/ "El Rastreador sólo indica la dirección y altura relativa; no muestra un mapa que te guíe al objetivo. Presta atención a tus alrededores, y prepárate a explorar.\n", + /*279*/ "El visor estrecha tu visión periférica, lo cual puede causar problemas en combate. Asegúrate de tu situación antes de usarlo.\n", + /*280*/ "Si usas este dispositivo en un momento equivocado, te puede costar la vida, ya que no podrás ver nada a cierta distancia. Úsalo con moderación.\n", + /*281*/ "Un disfraz no es sólo la ropa, es la manera en que una persona lo lleva. No actúes de manera diferente a la de la persona que estás intentando ser.\n", + /*282*/ "Preserva tu Dispositivo de Ocultación cuando no hay nadie alrededor que pueda observarte. Evita disparar a menos que sea absolutamente necesario, y sólo si estás seguro del éxito de tu ataque.\n", + /*283*/ "La Falcon 2 es una pistola muy precisa, así que cualquier error será tuyo. El modo secundario es golpear con su culata y es, por lo tanto, inútil en una prueba de tiro.\n", + /*284*/ "Para hacer un mejor uso de la precisión de la Falcon 2, una mira ha sido puesta en la pistola. Como en la Falcon 2 sin modificar, el modo secundario de golpear con la culata es inútil durante la prueba de tiro.\n", + /*285*/ "La versión con silenciador de la Falcon 2 es una excelente arma, diseñada para darte la ventaja de la sorpresa sobre tus oponentes. Prueba tu precisión para asegurarte que nunca derrocharás tus oportunidades.\n", + /*286*/ "La Magsec 4 tiene un excelente poder de disparo a costa de la precisión, especialmente cuando se usa el modo secundario de ráfaga de 3 tiros. La única desventaja seria es el tamaño limitado de su cargador.\n", + /*287*/ "Esta típica arma Skedar es brutal y poderosa. Sacrificando algo del cartucho, el disparo puede ser cargado para crear una explosión devastadora. Su capacidad de recarga es alta.\n", + /*288*/ "Esta versátil pistola ofrece dos diferentes sistemas de disparo para su munición: un disparo estándar o una descarga explosiva. Los ingenieros Maian lo han conseguido sin comprometer el uso de energía del arma, aunque el ritmo de disparo es reducido.\n", + /*289*/ "La clave del uso del DY357 es saber cuándo recargar. Un cartucho de seis balas implica estar siempre alerta en un tiroteo. El peso del arma puede ser muy útil si tienes que golpear a alguien con ella.\n", + /*290*/ "Trent Easton siempre busca facilidades extra, y este arma no es una excepción. Las balas son tan especiales como el resto del arma; han sido diseñadas para hacerse añicos en el interior del oponente y así tumbarle rápidamente.\n", + /*291*/ "Esta fiable y efectiva metralleta no es difícil de encontrar ya que es el arma más vendida de dataDyne en los últimos dos años, incluso si su modo secundario no se tiene en cuenta. Su sistema de adquisición de objetivos es excelente, y deberás familiarizarte con todas las posibilidades de este arma.\n", + /*292*/ "La metralleta Ciclón fue diseñada específicamente para NO ser precisa, aunque vale la pena practicar. Puede disparar una gran cantidad de balas en poco tiempo, por ello, es una excelente arma de supresión.\n", + /*293*/ "La flexibilidad Maian respecto al diseño ha creado esta metralleta con un interesante modo secundario: una bala de alta velocidad que puede atravesar objetos fácilmente. El ritmo de disparo, como en la Phoenix, se reduce durante el modo secundario; esto se debe a que se intenta prevenir daño en el mecanismo de disparo y en el cañón.\n", + /*294*/ "La RC-P120 dispara una bala mineral especial que, acompañada de un ritmo de disparo rápido y un amplio cargador, hace de este arma una herramienta perfecta para ser usada contra los Skedar. Las balas pueden ser usadas para recargar un prototipo de Dispositivo de Ocultación: el entrenamiento ha sido alterado para reflejar esta característica en particular.\n", + /*295*/ "Este arma no sólo se parece a un ordenador PC portátil, sino que puede ser utilizada como arma centinela en el modo secundario para cubrir una ruta de escape o proteger un lugar.\n", + /*296*/ "Éste es el modelo que dataDyne presentó con éxito a los militares de EE.UU., aunque todavía tiene que ser aprobado. Siguiendo la tendencia de dataDyne de dar a la gente desagradables sorpresas, el modelo básico del rifle de asalto lleva una mina de proximidad debajo del cañón. Usar el modo secundario obviamente implica que debes lanzar tu arma.\n", + /*297*/ "Tan lejos como podemos establecer, el modo secundario del arma parece ser que identifica trampas, minas dirigidas, dispositivos explosivos ocultos (como el Dragón en modo secundario), y armas automáticas. Aunque poderoso, el cartucho de este rifle de asalto es pequeño. \n", + /*298*/ "Como primera arma con apoyo del Instituto, el AR34 es un rifle de asalto bastante básico. El modo secundario es un zoom permamente. Probar a sujetarlo vale como entrenamiento de precisión.\n", + /*299*/ "Se trata de la variante pesada del Dragón sin mina de proximidad, la cual ha sido reemplazada por un lanzagranadas. Adoptada por los militares norteamericanos como arma de apoyo de brigada pesada: se nota el porqué... Practica para hacerte con la trayectoria de las granadas.\n", + /*300*/ "La delicadeza no es una opción aquí. Hay dos modos, explosión simple o doble. El cartucho es amplio para una escopeta, pero ten cuidado con el largo tiempo de recarga, y planea tus movimientos en consonancia.\n", + /*301*/ "Esta fina pieza de ingeniería es un rifle de francotirador con silenciador con un zoom de alta tecnología. Lo único que puede interferir en la precisión de este arma es el zoom de francotirador. Asegúrate de agacharte y mantener tu mirilla en el modo secundario.\n", + /*302*/ "Aunque las técnicas actuales de ingeniería nos superan, todavía podemos apreciar los efectos del rifle FarSight. Su disparo es imparable, y puede penetrar muros a bastante profundidad, alcanzando objetivos si se necesita.\n", + /*303*/ "La función primaria de la ballesta es un disparo de sedante no letal, mientras que el secundario es la muerte instantánea. Es un arma principalmente sigilosa, pero su largo tiempo de recarga puede ser un inconveniente durante un tiroteo.\n", + /*304*/ "La pistola tranquilizante es muy común, pudiendo ser encontrada en laboratorios médicos y hospitales de todo el mundo. Puede ser usada con perdigones tranquilizantes, o con dosis letales, que usan bastante más cantidad de la reserva de sedantes.\n", + /*305*/ "Intenta controlar este arma lo mejor que puedas. Fue diseñada para usuarios bastante más fuertes que los humanos. Arrodillarse puede ayudar a apuntar el arma, pero no a perfeccionar el tiro. Si algún oponente logra esquivar la lluvia de balas, sus cañones pueden usarse como trituradoras para infringir daño.\n", + /*306*/ "Este reciente producto de dataDyne, cuenta con tecnología muy interesante en su interior. El modo secundario activa un campo magnético alrededor de la bomba, lo que le permite adherirse durante un limitado periodo de tiempo. Cuando ese tiempo pasa, la bomba cae, impacta y explota.\n", + /*307*/ "Es un compacto lanzamisiles reutilizable: recarga tras cada tiro. El modo secundario usa una variante del sistema de blancos de la metralleta CMP150. El misil viaja lentamente lo que le permite seguir al objetivo, así que tenlo en cuenta y planea tus disparos cuidadosamente.\n", + /*308*/ "Este lanzador portátil de mísiles Skedar puede disparar tanto cohetes sin guía, como por control remoto. A los Skedar les produce una perversa satisfacción cuando la cámara se acerca al objetivo, pero un agente del IC está más allá de esas cosas. Los cohetes guiados aceleran automáticamente, pero pueden ser decelerados para más maniobrabilidad. La detonación ocurre por contacto o cuando se aprieta el gatillo.\n", + /*309*/ "Este cuchillo finamente pulido, está equilibrado para ser lanzado. La práctica es esencial para acostumbrarse al alcance y trayectoria de la hoja lanzada.\n", + /*310*/ "El departamento de armas experimentales ha creado este pequeño pero efectivo láser de muñeca con dos diferentes rayos. El modo primario genera una explosión a gran distancia, mientras que el secundario provee de un rayo continuo hasta que el gatillo es soltado.\n", + /*311*/ "Cuatro segundos pasan desde la activación a la detonación de la granada de fragmentación antipersonal en el modo básico. Para tu deleite y entretenimiento, se ha incluido un modo secundario: pinball de proximidad. La granada rebotará hasta que la carga explote cuando su detector de proximidad se active.\n", + /*312*/ "Esta granada Maian hace estragos con las neuronas de las criaturas. Si caes en su radio de explosión, tu visión se volverá borrosa y no podrás agarrar lo que lleves. La granada puede ser activada por lanzamiento o por proximidad. Asegúrate de lanzarla cuando estés lo suficientemente lejos.\n", + /*313*/ "Se necesita bastante criterio para un uso efectivo de las minas de tiempo, de otro modo, la explosión no afectará al objetivo, y éste irá detrás tuyo. Mejorar tu habilidad en las pruebas evitará errores críticos. La función secundaria es un detector de trampas idéntico al encontrado en el rifle de asalto Vengador K7.\n", + /*314*/ "La clave de la colocación correcta de las minas de proximidad es situarlas donde tus oponentes no se esperen encontrarlas. Si tú mismo no quieres tener problemas, usa el modo secundario de detección de trampas para asegurar tus alrededores. Puede que te haga perder el tiempo, pero si no es así, podrá salvar tu vida.\n", + /*315*/ "La última variedad de minas remotas detonables, es esencialmente igual a las que ya tenías. El modo primario es poner las minas, mientras que el secundario es dar las órdenes de explosión. Si no puedes ver la mina, deberás confiar en el viejo método de prueba y error. \n", + /*316*/ "Holo 1 - Mirar alrededor\n", + /*317*/ "Holo 2 - Movimiento 1\n", + /*318*/ "Holo 3 - Movimiento 2\n", + /*319*/ "Holo 4 - Comb. sin armas 1\n", + /*320*/ "Holo 5 - Comb. sin armas 2\n", + /*321*/ "Holo 6 - Comb. Directo 1\n", + /*322*/ "Holo 7 - Comb. Directo 2\n", + /*323*/ NULL, +}; diff --git a/src/files/lang/pal-final/earE.c b/src/files/lang/pal-final/earE.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-final/earE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/earJ.c b/src/files/lang/pal-final/earJ.c new file mode 100644 index 000000000..2c288629b --- /dev/null +++ b/src/files/lang/pal-final/earJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items Of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle On The Security Systems\n\nRe-program the cleaning robots in the service area to start work on the security systems. This will permit you to get further into the laboratory complex, though you will have to stay close to the robot you re-program if you want to remain unharmed.\n\n|Objective Three: - Shut Down The Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are non-combatants; don't kill them.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the EyeSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. Inbetween the sectors are systems designed to keep out those without clearance, such as yourself. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr Caroll\n", + /* 10*/ "Shut Down Experiments\n", + /* 11*/ "Start Security Maintenance Cycle\n", + /* 12*/ "Obtain Experimental Technologies\n", + /* 13*/ "Holograph Radioactive Isotope\n", + /* 14*/ "Machinery Scream Sound Fx\n", + /* 15*/ "Maintenance Robots Activated\n", + /* 16*/ "Maintenance Robots Re-programmed\n", + /* 17*/ "Security Doors Unlocked\n", + /* 18*/ "Maintenance Cycle Activated\n", + /* 19*/ "Routine Cleaning Cycle Activated\n", + /* 20*/ "Operation Not Allowed - Robots Busy\n", + /* 21*/ "Maintenance Robots De-activated\n", + /* 22*/ "Critical Mission Object Destroyed\n", + /* 23*/ "Maintenance Robot System Offline\n", + /* 24*/ "MISSION FAILED \n - Objectives cannot be completed\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable Scientist Casualties\n", + /* 27*/ "Terminal Is Not Active\n", + /* 28*/ "Powering Down Active Systems\n", + /* 29*/ "Experiment Has Been Shut Down\n", + /* 30*/ "Alarm Activated\n", + /* 31*/ "Alarm De-activated\n", + /* 32*/ "Don't Shoot Me - I'll Help you\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you\n", + /* 35*/ "Accidents will happen\n", + /* 36*/ "ACCESS DENIED - Security Code Required\n", + /* 37*/ "Searching for password\n", + /* 38*/ ".", + /* 39*/ "Password Located - Bypassing Lock\n", + /* 40*/ "Contact Broken - Re-establish link\n", + /* 41*/ "Security Door Already Unlocked\n", + /* 42*/ "Experiment already powered down\n", + /* 43*/ "Strange - the experiments already off!\n", + /* 44*/ "It appears someone has broken my PC\n", + /* 45*/ "Obtain Night Sight\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Sight\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Sight\n", + /* 50*/ "Obtain Shield Tech Item\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield Tech Item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up Shield Tech Item\n", + /* 55*/ "Obtain Data Uplink\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink\n", + /* 60*/ "Connection Established\n", + /* 61*/ "Maintenance Hatch Is Now Open\n", + /* 62*/ "Maintenance Hatch Is Already Open\n", + /* 63*/ "WARNING - Radioactive Matter Detected\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security\n", + /* 78*/ "Accidents will happen\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someones broken my equipment.\n", + /* 83*/ "Whats happened to the terminal?\n", + /* 84*/ "You vandal, you've broken it.\n", + /* 85*/ "Connection Broken - Experiments still active.\n", + /* 86*/ "Experimental Item 1 aquired.\n", + /* 87*/ "Experimental Item 2 aquired.\n", + /* 88*/ "Experimental Item 3 aquired.\n", + /* 89*/ "Obtain Eye Spy\n", + /* 90*/ "Dr Carolls\n", + /* 91*/ "Eye Spy\n", + /* 92*/ "An Eye Spy\n", + /* 93*/ "Picked up an Eye Spy\n", + /* 94*/ "That's the highest security sector - Dr Caroll\nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high.\nUse the Eye-Spy.\n", + /* 98*/ "Secret Weapons Compartment Opened.\n", + /* 99*/ "Access Denied - Weapons Compartment Locked.\n", + /*100*/ "Dr. Caroll?", + /*101*/ "Dr. Caroll, are you here?", + /*102*/ "Well, is it safe to come out?", + /*103*/ "Yes, all clear.", + /*104*/ "Wh..what... you're...", + /*105*/ "Very professionally done my dear, but there's no time to waste! we must leave immediately!", + /*106*/ "Come on, I have vital information and you must protect me.", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/earP.c b/src/files/lang/pal-final/earP.c new file mode 100644 index 000000000..883a987fd --- /dev/null +++ b/src/files/lang/pal-final/earP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Obtain Items of Experimental Technology\n\nDr. Caroll informs us that there are three other major projects nearing completion in the labs besides his own. You are to collect the prototypes for the three projects and return them to the Carrington Institute for assessment.\n\n|Objective Five: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 1*/ "BASEMENT LABORATORY\n", + /* 2*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Start Maintenance Cycle on the Security Systems\n\nReprogram the cleaning robots in the service area to start work on the security systems. This will permit you to get farther into the laboratory complex, though you will have to stay close to the robot you reprogram if you want to remain unharmed.\n\n|Objective Three: - Shut Down the Experiments\n\nThe experiments in sector two of the laboratories are causing extreme interference with the communications uplink, preventing our hackers from cracking the security lock code. Get the scientists present to shut them down unless you want to risk setting off alarms by doing it yourself. Be careful not to kill the scientists.\n\n|Objective Four: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 3*/ "|Background - \n\nA dataDyne scientist calling himself Dr. Caroll has contacted the Carrington Institute requesting that we rescue him from the dataDyne headquarters tonight. He claims that he has complained to dataDyne about the moral implications of his current project, but rather than dismiss him, they will mentally restructure him until he finds the nature of the project acceptable again.\n\n|Carrington - \n\nYou'll need to use your remote comlink to get past the door to the sector where Dr. Caroll's lab is located. Unfortunately, we've detected huge levels of electro-magnetic activity around the laboratories which interfere with all our comms equipment. Convince the scientists to shut their experiments down. Remember that they are noncombatants; don't kill them. And don't forget your Data Uplink, Jo - it may come in handy.\n\n|Objective One: - Holograph Radioactive Isotope\n\nUse the CamSpy to obtain a spectrographic photo record of the isotope on test in the dataDyne basement labs. Dr. Caroll has linked the isotope to an enhancement of the currently experimental shield technology item, also present in the laboratories.\n\n|Objective Two: - Locate Dr. Caroll\n\nThe basement is divided into four security zones - Dr. Caroll is in the last of these areas, sector four. In-between the sectors are systems designed to keep out those without clearance, such as you. Bypass them as best you can, and search for the scientist in the final sector.\n\nEND\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Locate Dr. Caroll\n", + /* 10*/ "Shut down experiments\n", + /* 11*/ "Start security maintenance cycle\n", + /* 12*/ "Obtain experimental technologies\n", + /* 13*/ "Holograph radioactive isotope\n", + /* 14*/ "Machinery scream sound Fx.\n", + /* 15*/ "Maintenance robots activated.\n", + /* 16*/ "Maintenance robots reprogrammed.\n", + /* 17*/ "Security doors unlocked.\n", + /* 18*/ "Maintenance cycle activated.\n", + /* 19*/ "Routine cleaning cycle activated.\n", + /* 20*/ "Operation not allowed - robots busy.\n", + /* 21*/ "Maintenance robots deactivated.\n", + /* 22*/ "Critical mission object destroyed.\n", + /* 23*/ "Maintenance robot system offline.\n", + /* 24*/ "MISSION FAILED \n - objectives cannot be completed.\n", + /* 25*/ "Who are you?\n", + /* 26*/ "Unacceptable scientist casualties.\n", + /* 27*/ "Terminal is not active.\n", + /* 28*/ "Powering down active systems.\n", + /* 29*/ "Experiment has been shut down.\n", + /* 30*/ "Alarm activated.\n", + /* 31*/ "Alarm deactivated.\n", + /* 32*/ "Don't shoot me - I'll help you.\n", + /* 33*/ "What the hell are you doing in my lab?\n", + /* 34*/ "Let me help you.\n", + /* 35*/ "Accidents will happen.\n", + /* 36*/ "ACCESS DENIED - security code required.\n", + /* 37*/ "Searching for password.\n", + /* 38*/ ".", + /* 39*/ "Password located - bypassing lock.\n", + /* 40*/ "Contact broken - reestablish link.\n", + /* 41*/ "Security door already unlocked.\n", + /* 42*/ "Experiment already powered down.\n", + /* 43*/ "Strange - the experiment's already off!\n", + /* 44*/ "It appears someone has broken my PC.\n", + /* 45*/ "Obtain Night Vision.\n", + /* 46*/ "Cassandra De Vries'\n", + /* 47*/ "Night Vision\n", + /* 48*/ "De Vries' briefcase\n", + /* 49*/ "Picked up Night Vision.\n", + /* 50*/ "Obtain shield tech item.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Shield tech item\n", + /* 53*/ "De Vries' briefcase\n", + /* 54*/ "Picked up shield tech item.\n", + /* 55*/ "Obtain Data Uplink.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink\n", + /* 58*/ "A Data Uplink\n", + /* 59*/ "Picked up a Data Uplink.\n", + /* 60*/ "Connection established.\n", + /* 61*/ "Maintenance hatch is now open.\n", + /* 62*/ "Maintenance hatch is already open.\n", + /* 63*/ "WARNING - radioactive matter detected.\n", + /* 64*/ "What are you doing in my lab?\n", + /* 65*/ "I haven't seen you before...\n", + /* 66*/ "Who the hell are you?\n", + /* 67*/ "Shut down the experiment.\n", + /* 68*/ "Pull the plug on that, NOW.\n", + /* 69*/ "Switch this thing off.\n", + /* 70*/ "I'll shut it down.\n", + /* 71*/ "Please don't hurt me.\n", + /* 72*/ "Allow me to assist you.\n", + /* 73*/ "My experiments!\n", + /* 74*/ "There, the experiment is down.\n", + /* 75*/ "Leave this area NOW!\n", + /* 76*/ "Security!\n", + /* 77*/ "I'm calling security.\n", + /* 78*/ "Accidents will happen.\n", + /* 79*/ "How did that happen?\n", + /* 80*/ "Looks like it's off already.\n", + /* 81*/ "Have you been tampering with this?\n", + /* 82*/ "Someone's broken my equipment.\n", + /* 83*/ "What's happened to the terminal?\n", + /* 84*/ "You vandal - you've broken it.\n", + /* 85*/ "Connection broken - experiments still active.\n", + /* 86*/ "Experimental item 1 acquired.\n", + /* 87*/ "Experimental item 2 acquired.\n", + /* 88*/ "Experimental item 3 acquired.\n", + /* 89*/ "Obtain CamSpy.\n", + /* 90*/ "Dr. Caroll's\n", + /* 91*/ "CamSpy\n", + /* 92*/ "A CamSpy\n", + /* 93*/ "Picked up a CamSpy.\n", + /* 94*/ "That's the highest security sector - Dr. Caroll \nhas got to be nearby.\n", + /* 95*/ "Something around here's using a lot of power.\n", + /* 96*/ "Reprogram that cleaning bot - \nit'll give you a way in.\n", + /* 97*/ "Get out, Jo! The levels are too high. \nUse the CamSpy.\n", + /* 98*/ "Secret weapons compartment opened.\n", + /* 99*/ "Enemy detected - weapon cache locked.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, are you here?\n", + /*102*/ "Well, is it safe to come out?\n", + /*103*/ "Yes, all clear.\n", + /*104*/ "Wh..what... you're...\n", + /*105*/ "Very professionally done, my dear, but there's \nno time to waste! We must leave immediately!\n", + /*106*/ "Come on. I have vital information, and you \nmust protect me.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_f.c b/src/files/lang/pal-final/ear_str_f.c new file mode 100644 index 000000000..e34e6c7d1 --- /dev/null +++ b/src/files/lang/pal-final/ear_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Obtenir échantillons tech.\n\nDr. Caroll nous informe que trois autres projets majeurs sont sur le point d'être achevés dans les laboratoires voisins du sien. Récupérez les prototypes des trois expériences et rapportez-les à l'Institut Carrington pour une étude.\n\n|Objectif 5: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 1*/ "LABORATOIRE SOUTERRAIN\n", + /* 2*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Dérouter cycle maintenance\n\nReprogrammez les robots de nettoyage dans la zone de service pour les faire travailler sur les systèmes de sécurité. Ceci vous permettra de progresser dans le complexe scientifique. Restez aux côtés du robot pour ne pas subir de dégâts.\n\n|Objectif 3: - Arrêter les expériences\n\nLes expériences des laboratoires du secteur 2 provoquent des interférences avec nos communications, empêchant nos pirates de briser le code de sécurité. Forcez les scientifiques présents à les interrompre. Vous pouvez vous risquer à cette manoeuvre mais l'alarme se déclenchera probablement. Epargnez les scientifiques.\n\n|Objectif 4: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn scientifique de la dataDyne se faisant appeler Dr. Caroll a contacté l'Institut Carrington: il demande à être évacué des quartiers généraux de la dataDyne ce soir. Après avoir critiqué les implications morales du dernier projet de la dataDyne, celle-ci décida de le conditionner mentalement plutôt que de l'éliminer. Cette opération devrait ainsi le rendre plus coopératif.\n\n|Carrington - \n\nIl vous faudra utiliser le transmetteur pour passer la porte menant à la zone du labo du Dr. Caroll. Malheureusement, nous avons détecté un très haut niveau d'interférences électromagnétiques autour des laboratoires. Elles perturbent nos équipements de communication. Obligez les scientifiques à interrompre leurs expériences. Souvenez-vous qu'ils ne sont pas hostiles, alors ne les abattez pas. N'oubliez pas non plus votre récepteur, il vous sera sûrement utile.\n\n|Objectif 1: - Holographier l'isotope radioactif\n\nUtilisez la CamSpy pour obtenir une image spectrographique de l'isotope testé dans les laboratoires souterrains de la dataDyne. Le Dr. Caroll a lié l'isotope à une amélioration du système de bouclier expérimental, un objet également présent dans les laboratoires.\n\n|Objectif 2: - Trouver le Dr. Caroll\n\nLe sous-sol est divisé en 4 zones de sécurité. Le Dr. Caroll se trouve dans la dernière de ces zones: le secteur 4. Un dispositif barrant la route aux intrus est déployé entre chaque secteur. Trouvez un moyen de passer outre.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Trouver le Dr. Caroll\n", + /* 10*/ "Arrêter les expériences\n", + /* 11*/ "Dérouter cycle maintenance\n", + /* 12*/ "Obtenir échantillons tech.\n", + /* 13*/ "Holographier l'isotope radioactif\n", + /* 14*/ "Effets sons mécanisme.\n", + /* 15*/ "Robots de maintenance activés.\n", + /* 16*/ "Robots de maintenance reprogrammés.\n", + /* 17*/ "Portes sécurité déverrouillées.\n", + /* 18*/ "Cycle de maintenance activé.\n", + /* 19*/ "Cycle nettoyage activé.\n", + /* 20*/ "Opération refusée - robots occupés.\n", + /* 21*/ "Robots de maintenance désactivés.\n", + /* 22*/ "Objet crucial détruit.\n", + /* 23*/ "Système robots maintenance désactivé.\n", + /* 24*/ "MISSION ECHOUEE \n - objectifs inatteignables.\n", + /* 25*/ "Qui êtes-vous?\n", + /* 26*/ "Pertes inacceptables de scientifiques.\n", + /* 27*/ "Terminal inactif.\n", + /* 28*/ "Coupure des systèmes actifs.\n", + /* 29*/ "Expérience interrompue.\n", + /* 30*/ "Alarme activée.\n", + /* 31*/ "Alarme désactivée.\n", + /* 32*/ "Ne me tuez pas! Je vais vous aider.\n", + /* 33*/ "Qu'est-ce que vous foutez ici?\n", + /* 34*/ "Je vais vous aider...\n", + /* 35*/ "Zut alors. J'ai fait une bêtise.\n", + /* 36*/ "ACCES REFUSE - code de sécurité requis.\n", + /* 37*/ "Recherche mot de passe.\n", + /* 38*/ ".", + /* 39*/ "Mot de passe localisé - dérivation serrure.\n", + /* 40*/ "Contact rompu - rétablissement connexion.\n", + /* 41*/ "Porte de sécurité déjà déverrouillée.\n", + /* 42*/ "Expérience déjà interrompue.\n", + /* 43*/ "Etrange - l'expérience est déjà arrêtée!\n", + /* 44*/ "Quelqu'un a cassé mon PC!\n", + /* 45*/ "Obtenir Vue nocturne.\n", + /* 46*/ "Cassandra De Vries: \n", + /* 47*/ "Vue nocturne\n", + /* 48*/ "Mallette de De Vries\n", + /* 49*/ "Vue nocturne obtenue.\n", + /* 50*/ "Obtenir objet de tech bouclier.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Objet de tech bouclier\n", + /* 53*/ "Mallette de De Vries\n", + /* 54*/ "objet de tech bouclier obtenu.\n", + /* 55*/ "Obtenir récepteur.\n", + /* 56*/ "\n", + /* 57*/ "Récepteur\n", + /* 58*/ "Un récepteur\n", + /* 59*/ "Récepteur obtenu.\n", + /* 60*/ "Connexion établie.\n", + /* 61*/ "Sas de maintenance ouvert.\n", + /* 62*/ "Sas de maintenance déjà ouvert.\n", + /* 63*/ "ATTENTION - radioactivité détectée.\n", + /* 64*/ "Que faites-vous dans mon labo?\n", + /* 65*/ "Je ne vous connais pas...\n", + /* 66*/ "Vous êtes qui, bordel?\n", + /* 67*/ "Arrêtez l'expérience.\n", + /* 68*/ "Eteignez-moi tout ça. MAINTENANT!\n", + /* 69*/ "Coupez ce truc.\n", + /* 70*/ "Je vais l'éteindre.\n", + /* 71*/ "Ne me faites pas de mal!\n", + /* 72*/ "Je vais vous aider.\n", + /* 73*/ "Mes expériences!\n", + /* 74*/ "Voilà. C'est éteint.\n", + /* 75*/ "Partez... TOUT DE SUITE!\n", + /* 76*/ "Sécurité!\n", + /* 77*/ "J'appelle la sécurité.\n", + /* 78*/ "Oups. Je me suis trompé...\n", + /* 79*/ "Comment s'est arrivé?\n", + /* 80*/ "C'est déjà éteint on dirait.\n", + /* 81*/ "Vous avez joué avec ça, ou quoi?\n", + /* 82*/ "On a tout cassé mon équipement!\n", + /* 83*/ "Qu'est-il arrivé à mon terminal?\n", + /* 84*/ "Racaille, va! Tout est fichu!\n", + /* 85*/ "Connexion perdue - expériences en cours.\n", + /* 86*/ "Objet expérimental 1 obtenu.\n", + /* 87*/ "Objet expérimental 2 obtenu.\n", + /* 88*/ "Objet expérimental 3 obtenu.\n", + /* 89*/ "Obtenir CamSpy.\n", + /* 90*/ "Dr. Caroll: \n", + /* 91*/ "CamSpy\n", + /* 92*/ "Une CamSpy\n", + /* 93*/ "CamSpy obtenue.\n", + /* 94*/ "C'est le secteur le plus protégé - Le Dr. Caroll \ndoit s'y trouver.\n", + /* 95*/ "Quelque chose dans les environs consomme beaucoup d'énergie.\n", + /* 96*/ "Reprogrammez ce robot de nettoyage - \nil vous fera entrer.\n", + /* 97*/ "Sortez, Joanna! La radioactivité est élevée. \nUtilisez la CamSpy.\n", + /* 98*/ "Compartiment armes secrètes ouvert.\n", + /* 99*/ "Ennemi détecté - coffre d'armes fermé.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, êtes-vous ici?\n", + /*102*/ "Tout...tout danger est écarté?\n", + /*103*/ "Oui. Tout va bien.\n", + /*104*/ "M...Mais... vous...\n", + /*105*/ "Belle manoeuvre, mon enfant. Il n'y a pas de\ntemps à perdre. Nous devons partir!\n", + /*106*/ "Allons. J'ai des informations vitales à \nrévéler et vous devez me protéger.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_g.c b/src/files/lang/pal-final/ear_str_g.c new file mode 100644 index 000000000..0628e05ce --- /dev/null +++ b/src/files/lang/pal-final/ear_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Bringen Sie die experimentellen Technologien in Ihren Besitz!\n\nDr. Caroll hat uns darüber informiert, dass noch drei weitere Projekte kurz vor dem Abschluss stehen. Ihre Aufgabe ist es, die drei Prototypen zu finden und diese an das Carrington Institut zur Evaluierung zu übergeben. \n\n|5. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 1*/ "UNTERGRUND-LABOR\n", + /* 2*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Starten Sie den Wartungszyklus!\n\nProgrammieren Sie die Wartungs-Roboter so um, dass sie mit den Arbeiten im Bereich des Sicherheitssystems beginnen. Auf diese Weise gelangen Sie tiefer in den Labor-Komplex. Sie sollten sich allerdings nicht zu weit von dem entsprechenden Roboter entfernen, wenn Sie unversehrt bleiben wollen!\n\n|3. Ziel: - Unterbrechen Sie alle Experimente!\n\nDie Experimente, die in Sektor zwei im Labor-Trakt durchgeführt werden, verursachen extreme Interferenzen. Dadurch sind unsere Hacker nicht in der Lage, den Sicherheitscode via Uplink zu knacken. Bringen Sie die anwesenden Wissenschaftler dazu, die Experimente zu unterbrechen. Es sei denn, Sie wollen es selber tun und damit riskieren, dass der Alarm ausgelöst wird. Auf keinen Fall dürfen die Wissenschaftler verletzt werden!\n\n|4. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Wissenschaftler namens Dr. Carroll, derzeit beschäftigt bei der dataDyne-Gruppe, hat das Carrington Institut kontaktiert. Seine Bittelautet, dass wir ihn heute Nacht aus dem dataDyne-HQ befreien sollen. Er behauptet, er hätte sich bei der dataDyne-Führung über die moralischen Implikationen beschwert, die sein aktuelles Projekt mit sich bringt. Nun befürchtet er, dass man, anstatt ihn einfach zu entlassen, ihn einer mentalen Restrukturierung unterziehen wird, bis er wiederbereit ist, die Natur des Projekts zu akzeptieren.\n\n|Carrington - \n\nSie müssen Ihren Uplink einsetzen, um den Sektor betreten zu können, in dem sich Dr. Carolls Labor befindet. Leider haben unsere Messungen ergeben, dass im Bereich der Laboratorien starke elektromagnetische Aktivitäten vorhanden sind. Diese Interferenzen blockieren unsere Kommunikation. Bringen Sie die Wissenschaftler dazu, ihre Experimente abzubrechen. Bedenken Sie, dass es sich hierbei um unbewaffnete Personen handelt. Vergessen Sie auch nicht Ihren Data Uplink. Er könnte nützlich sein.\n\n|1. Ziel: - Holografieren Sie die radioaktiven Isotope!\n\nSetzen Sie den CamSpy ein, um ein spektrografisches Foto des Isotopenversuchs zu machen, welcher derzeit in den Laboratorien im Keller durchgeführt wird. Dr. Caroll hat den Versuch mit einem experimentellen Schild-Generator verbunden, der sich ebenfalls in diesem Trakt befindet.\n\n|2. Ziel: - Finden Sie Dr. Caroll!\n\nDas Kellergeschoss ist in vier Sicherheitszonen unterteilt. Dr. Caroll befindet sich in der letzten dieser Zonen. Zwischen den Sektoren befinden sich Systeme, die den Zweck haben, Eindringlinge fernzuhalten. Versuchen Sie, diese Systeme zu umgehen, und suchen Sie im vierten Sektor nach dem Wissenschaftler.\n\nENDE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Finden Sie Dr. Caroll!\n", + /* 10*/ "Unterbrechen Sie alle Experimente!\n", + /* 11*/ "Starten Sie den Wartungszyklus!\n", + /* 12*/ "Finden Sie die technischen Experimente!\n", + /* 13*/ "Holografieren Sie die Isotope!\n", + /* 14*/ "Maschineller Soundeffekt\n", + /* 15*/ "Wartungsroboter aktiviert\n", + /* 16*/ "Wartungsroboter umprogrammiert\n", + /* 17*/ "Sicherheitstüren entriegelt\n", + /* 18*/ "Wartungszyklus aktiviert\n", + /* 19*/ "Wartungszyklus-Routine aktiviert.\n", + /* 20*/ "Unerlaubte Operation - Roboter sind beschäftigt.\n", + /* 21*/ "Wartungsroboter deaktiviert\n", + /* 22*/ "Wichtiges Objekt zerstört\n", + /* 23*/ "Wartungssystem ist offline.\n", + /* 24*/ "MISSION FEHLGESCHLAGEN \n - Erreichung aller Ziele unmöglich\n", + /* 25*/ "Wer sind Sie?\n", + /* 26*/ "Es sind unschuldige Wissenschaftler zu Schaden gekommen.\n", + /* 27*/ "Das Terminal ist nicht aktiv.\n", + /* 28*/ "Aktive Systeme werden heruntergefahren.\n", + /* 29*/ "Das Experiment wurde abgeschaltet.\n", + /* 30*/ "Alarm wurde aktiviert.\n", + /* 31*/ "Alarm wurde deaktiviert.\n", + /* 32*/ "Nicht schießen - Ich helfe Ihnen.\n", + /* 33*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 34*/ "Lassen Sie mich Ihnen helfen.\n", + /* 35*/ "Unfälle passieren manchmal.\n", + /* 36*/ "ZUGRIFF VERWEIGERT - Sicherheitscode erforderlich.\n", + /* 37*/ "Passwort wird gesucht.\n", + /* 38*/ ".", + /* 39*/ "Passwort gefunden - Verriegelung wird umgangen.\n", + /* 40*/ "Kontakt abgebrochen - Link muss wiederhergestellt werden.\n", + /* 41*/ "Sicherheitstür wurde bereits entriegelt.\n", + /* 42*/ "Experiment wurde bereits abgeschaltet.\n", + /* 43*/ "Eigenartig - das Experiment ist bereits abgebrochen worden!\n", + /* 44*/ "Es sieht so aus, als hätte jemand meinen PC beschädigt.\n", + /* 45*/ "Erlangen Sie das Nachtsichtgerät.\n", + /* 46*/ "Cassandra De Vries\n", + /* 47*/ "Nachtsichtgerät\n", + /* 48*/ "Aktenkoffer von De Vries\n", + /* 49*/ "Nachtsichtgerät aufgenommen\n", + /* 50*/ "Finden Sie den Prototypen.\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Prototyp\n", + /* 53*/ "De Vries Aktenkoffer\n", + /* 54*/ "Prototyp aufgenommen\n", + /* 55*/ "Finden sie das Data Uplink-Gerät.\n", + /* 56*/ "\n", + /* 57*/ "Data Uplink-Gerät\n", + /* 58*/ "Ein Data Uplink-Gerät\n", + /* 59*/ "Data Uplink-Gerät aufgenommen\n", + /* 60*/ "Verbindung hergestellt\n", + /* 61*/ "Wartungsklappe wurde geöffnet.\n", + /* 62*/ "Wartungsklappe ist bereits offen.\n", + /* 63*/ "WARNUNG - Radioaktive Substanz entdeckt!\n", + /* 64*/ "Was, zum Henker, haben Sie hier zu suchen?\n", + /* 65*/ "Ich habe Sie hier noch nie gesehen...\n", + /* 66*/ "Wer sind Sie, verdammt noch mal?\n", + /* 67*/ "Brechen Sie das Experiment ab!\n", + /* 68*/ "Ziehen Sie den Stecker raus, SOFORT!\n", + /* 69*/ "Schalten Sie das Ding ab!\n", + /* 70*/ "Ich schalte es ab.\n", + /* 71*/ "Bitte tun Sie mir nichts!\n", + /* 72*/ "Erlauben Sie mir, Ihnen zu helfen.\n", + /* 73*/ "Meine Experimente!\n", + /* 74*/ "Da! Das Experiment ist abgeschaltet!\n", + /* 75*/ "Verschwinden Sie von hier - SOFORT!\n", + /* 76*/ "Security!\n", + /* 77*/ "Ich alarmiere die Security.\n", + /* 78*/ "Unfälle können passieren.\n", + /* 79*/ "Wie konnte das geschehen?\n", + /* 80*/ "Sieht so aus, als wäre es bereits abgeschaltet.\n", + /* 81*/ "Haben Sie daran herumgefummelt?\n", + /* 82*/ "Jemand hat meine Ausrüstung zerstört!\n", + /* 83*/ "Was ist mit dem Terminal geschehen?\n", + /* 84*/ "Du Vandale - du hast es zerstört!\n", + /* 85*/ "Verbindung abgebrochen - Experimente sind noch aktiv.\n", + /* 86*/ "Experimentelles Objekt Nr. 1 aufgenommen\n", + /* 87*/ "Experimentelles Objekt Nr. 2 aufgenommen\n", + /* 88*/ "Experimentelles Objekt Nr. 3 aufgenommen\n", + /* 89*/ "Finden Sie den CamSpy.\n", + /* 90*/ "Dr. Carolls\n", + /* 91*/ "CamSpy\n", + /* 92*/ "Ein CamSpy\n", + /* 93*/ "CamSpy aufgenommen\n", + /* 94*/ "Dies ist der Hochsicherheitssektor - Dr. Caroll \nmuss ganz nahe sein.\n", + /* 95*/ "Etwas in diesem Areal verbraucht extrem viel Strom.\n", + /* 96*/ "Programmieren Sie den Wartungsroboter um! \nMit seiner Hilfe kommen Sie weiter.\n", + /* 97*/ "Mach, dass du raus kommst, Jo! Die Strahlung ist zu stark. \nSetz den CamSpy ein.\n", + /* 98*/ "Geheimes Waffenschott geöffnet\n", + /* 99*/ "Feind entdeckt - Waffenspeicher verriegelt\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, sind Sie da?\n", + /*102*/ "Ka... kann ich jetzt rauskommen?\n", + /*103*/ "Ja, Sie sind jetzt sicher.\n", + /*104*/ "Wa..was... Sie sind...\n", + /*105*/ "Sehr professionell, meine Liebe, aber wir \ndürfen keine Zeit verlieren! Wir müssen sofort hier raus!\n", + /*106*/ "Kommen Sie. Ich habe wichtige Informationen, und Sie \nmüssen mich beschützen!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_i.c b/src/files/lang/pal-final/ear_str_i.c new file mode 100644 index 000000000..69d4b19ce --- /dev/null +++ b/src/files/lang/pal-final/ear_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Procurati strumento tecnologico sperimentale\n\nIl Dr. Caroll ci ha informato della presenza di altri tre importanti progetti in fase di completamento nei laboratori di fianco al suo. Dovrai raccogliere i prototipi dei tre progetti e portarli al Carrington Institute per l'analisi.\n\n|Obiettivo 5: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 1*/ "LABORATORIO SOTTERRANEO\n", + /* 2*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Inizia manutenzione sistemi di sicurezza\n\nRiprogramma i robot di pulizia nell'area di servizio per iniziare le operazioni sui sistemi di sicurezza. Ciò ti permetterà di inoltrarti nel complesso dei laboratori, anche se dovrai stare vicino al robot riprogrammato per rimanere illesa.\n\n|Obiettivo 3: - Interrompi gli esperimenti\n\nGli esperimenti nel settore 2 dei laboratori causano fastidiose interferenze con il collegamento di comunicazione, impedendo ai nostri hacker di decifrare il codice di sicurezza. Convinci gli scienziati presenti a interrompere tali esperimenti, a meno che tu non voglia rischiare di far scattare l'allarme facendolo tu stessa. Fa attenzione a non uccidere gli scienziati!\n\n|Obiettivo 4: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nUno scienziato dataDyne che si fa chiamare Dr. Caroll ha contattato il Carrington Institute chiedendo di essere portato via dal quartier generale dataDyne questa notte. Sostiene di aver protestato per le implicazioni morali del suo progetto, ma invece di congedarlo, gli manipoleranno il cervello finché non accetterà la natura del progetto.\n\n|Carrington:\n\nDovrai usare il Connettore Dati per aprire la porta che immette nel settore dove si trova il laboratorio del Dr. Caroll. Tuttavia, abbiamo riscontrato una forte attività elettromagnetica lì vicino, che interferisce con le nostre apparecchiature di comunicazione. Convinci gli scienziati a interrompere gli esperimenti. Non sono armati, quindi non ucciderli. Ah, non dimenticare il Connettore Dati: ti sarà utile!\n\n|Obiettivo 1: - Isotopo olografico radioattivo\n\nUsa la TeleSpia per procurarti una foto spettrografica dell'isotopo in prova nei laboratori sotterranei dataDyne. Il Dr. Caroll l'ha collegato a un potenziamento dello strumento sperimentale della tecnologia scudo, anch'esso presente nei laboratori.\n\n|Obiettivo 2: - Localizza il Dr. Caroll\n\nIl sotterraneo è suddiviso in quattro aree di sicurezza. Il Dr. Caroll si trova nell'ultima: settore quattro. Tra i settori sono presenti sistemi progettati per impedire l'accesso agli estranei come te. Fa del tuo meglio per superarli e cerca lo scienziato nell'ultimo settore.\n\nFINE\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizza il Dr. Caroll\n", + /* 10*/ "Interrompi gli esperimenti\n", + /* 11*/ "Inizia manutenzione sistemi\n", + /* 12*/ "Procurati le tecnologie sperimentali\n", + /* 13*/ "Isotopo olografico radioattivo\n", + /* 14*/ "Effetti sonori macchine\n", + /* 15*/ "Attivati robot di manutenzione\n", + /* 16*/ "Riprogrammati robot di manutenzione\n", + /* 17*/ "Aperte porte di sicurezza\n", + /* 18*/ "Attivato ciclo di manutenzione\n", + /* 19*/ "Attivato ciclo di pulizia di routine\n", + /* 20*/ "Operazione impossibile: robot impegnati\n", + /* 21*/ "Disattivati robot di manutenzione\n", + /* 22*/ "Distrutto strumento essenziale alla missione\n", + /* 23*/ "Sistema robot di manutenzione non in linea\n", + /* 24*/ "MISSIONE FALLITA - \n Impossibile completare obiettivi\n", + /* 25*/ "Chi sei?\n", + /* 26*/ "Vittime inaccettabili: uccisi scienziati\n", + /* 27*/ "Terminale non attivo\n", + /* 28*/ "Spegnimento sistemi attivi...\n", + /* 29*/ "Interrotto esperimento\n", + /* 30*/ "Allarme attivato\n", + /* 31*/ "Allarme disattivato\n", + /* 32*/ "Non sparare! Ti aiuterò!\n", + /* 33*/ "Cosa diavolo ci fai nel mio laboratorio?\n", + /* 34*/ "Ti darò una mano.\n", + /* 35*/ "Eh sì! Succede...\n", + /* 36*/ "ACCESSO NEGATO: inserire codice di sicurezza\n", + /* 37*/ "Ricerca password in corso...\n", + /* 38*/ ".", + /* 39*/ "Trovata password: blocco eliminato\n", + /* 40*/ "Contatto interrotto: ristabilire connessione\n", + /* 41*/ "Porta di sicurezza già aperta\n", + /* 42*/ "Esperimento già interrotto\n", + /* 43*/ "Strano: l'esperimento è già chiuso!\n", + /* 44*/ "Qualcuno deve aver manomesso il mio PC!\n", + /* 45*/ "Procurati Vista Notturna\n", + /* 46*/ "Cassandra De Vries:\n", + /* 47*/ "Vista Notturna\n", + /* 48*/ "Cartella di De Vries\n", + /* 49*/ "Presa Vista Notturna\n", + /* 50*/ "Procurati strum. tecn. scudo\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Strum. tecn. scudo\n", + /* 53*/ "Cartella di De Vries\n", + /* 54*/ "Preso strum. tecn. scudo\n", + /* 55*/ "Procurati Connettore Dati.\n", + /* 56*/ "\n", + /* 57*/ "C. Dati\n", + /* 58*/ "Connettore Dati\n", + /* 59*/ "Preso Connettore Dati.\n", + /* 60*/ "Stabilita connessione\n", + /* 61*/ "Sportello di manutenzione aperto\n", + /* 62*/ "Sportello di manutenzione già aperto\n", + /* 63*/ "ATTENZIONE! Materiale radioattivo!\n", + /* 64*/ "Cosa ci fai nel mio laboratorio?\n", + /* 65*/ "Non ti ho mai visto prima...\n", + /* 66*/ "Chi diavolo sei?\n", + /* 67*/ "Interrompi l'esperimento.\n", + /* 68*/ "Stacca la spina! SUBITO!\n", + /* 69*/ "Spegni quest'affare!\n", + /* 70*/ "Va bene! Lo chiudo!\n", + /* 71*/ "Non farmi del male!\n", + /* 72*/ "Lascia che t'aiuti.\n", + /* 73*/ "I miei esperimenti!\n", + /* 74*/ "Ecco, l'esperimento è interrotto.\n", + /* 75*/ "Ora vattene! SUBITO!\n", + /* 76*/ "Sicurezza!\n", + /* 77*/ "Chiamerò la sicurezza!\n", + /* 78*/ "Eh sì! Succede...\n", + /* 79*/ "Com'è potuto succedere?\n", + /* 80*/ "Sembra che sia già spento!\n", + /* 81*/ "Ci hai messo le mani tu?\n", + /* 82*/ "Qualcuno ha manomesso la strumentazione!\n", + /* 83*/ "Cos'è successo al terminale?\n", + /* 84*/ "L'hai rotto, maledizione!\n", + /* 85*/ "Connessione interrotta: esperimento ancora attivo\n", + /* 86*/ "Trovato strumento sperimentale 1\n", + /* 87*/ "Trovato strumento sperimentale 2\n", + /* 88*/ "Trovato strumento sperimentale 3\n", + /* 89*/ "Procurati TeleSpia.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "TeleSpia\n", + /* 92*/ "TeleSpia\n", + /* 93*/ "Presa la TeleSpia.\n", + /* 94*/ "Questo è il principale settore di sicurezza: \nil Dr. Caroll non può essere lontano.\n", + /* 95*/ "C'è qualcosa che consuma un sacco qua!\n", + /* 96*/ "Riprogramma quella scatola di latta: \nti darà una mano ad entrare.\n", + /* 97*/ "Attenzione! I piani sono troppo alti.\n Usa la TeleSpia!\n", + /* 98*/ "Aperto compartimento armi segrete\n", + /* 99*/ "Intercettato nemico: bloccato compartimento armi.\n", + /*100*/ "Dr. Caroll?\n", + /*101*/ "Dr. Caroll, è qui dentro?\n", + /*102*/ "Si può uscire? Via libera?\n", + /*103*/ "Sì, nessun problema!\n", + /*104*/ "Che... cosa... lei è...\n", + /*105*/ "Molto professionale, mia cara, ma non c'è \ntempo da perdere! Dobbiamo uscire subito di qui!\n", + /*106*/ "Andiamo! Sono a conoscenza di informazioni \ndi vitale importanza e tu devi proteggermi!\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/ear_str_s.c b/src/files/lang/pal-final/ear_str_s.c new file mode 100644 index 000000000..22dcf0736 --- /dev/null +++ b/src/files/lang/pal-final/ear_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Obtener Objetos de Tecnología Experimental\n\nEl Dr. Caroll nos informó de que hay otros tres grandes proyectos a punto de ser terminados en los laboratorios además del suyo. Debes recoger los prototipos de los tres proyectos y traerlos al Instituto Carrington para su evaluación.\n\n|Objetivo Cinco: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 1*/ "LABORATORIO DEL SOTANO\n", + /* 2*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Comenzar Ciclo de Mantenimiento en los Sistemas de Seguridad\n\nReprograma los robots de limpieza del área de servicio para que empiecen a trabajar en los sistemas de seguridad. Esto te permitirá llegar más lejos en el complejo del laboratorio, aunque debes estar cerca del robot que reprogrames si quieres permanecer sano y salvo.\n\n|Objetivo Tres: - Detener los Experimentos\n\nLos experimentos del sector dos en los laboratorios están causando interferencias extremas en las comunicaciones, evitando que nuestros 'hackers' desbloqueen los códigos de seguridad. Obliga a los científicos presentes a que los detengan, a menos que quieras correr el riesgo de apagar las alarmas por ti misma. Procura no matar a los científicos.\n\n|Objetivo Cuatro: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUn científico de dataDyne que se hace llamar Dr. Caroll ha contactado con el Instituto Carrington pidiendo que le rescatemos del cuartel general de dataDyne esta noche. Dice que se quejó a dataDyne de las implicaciones morales de su proyecto actual, pero en lugar de despedirle, le reestructurarán mentalmente hasta que encuentre que la naturaleza del proyecto es aceptable de nuevo.\n\n|Carrington - \n\nNecesitas usar tu conexión remota para pasar la puerta del sector donde se encuentra el laboratorio del Dr. Caroll. Desafortunadamente, hemos detectado elevados niveles de actividad electro-magnética en los laboratorios que interfieren con nuestros equipos de comunicaciones. Convence a los científicos para que dejen los experimentos. Recuerda que son no-combatientes; no los mates. Y no olvides tu Conector de Datos, Joanna: puede ser útil.\n\n|Objetivo Uno: - Holografiar Isótopos Radioactivos\n\nUsa la Cámara Espía para obtener una foto espectrográfica de los isótopos en pruebas en los laboratorios subterráneos de dataDyne. El Dr. Caroll ha conectado los isótopos a una mejora del actual escudo tecnológico experimental, también presente en los laboratorios.\n\n|Objetivo Dos: - Localizar al Dr. Caroll\n\nEl sótano está dividido en cuatro zonas de seguridad: el Dr. Caroll está en la última de estas áreas, sector cuatro. Entre medias de estos sectores hay sistemas diseñados para alejar a los no autorizados, como tú. Evítalos lo mejor que puedas, y busca al científico en el sector final.\n\nFIN\n", + /* 4*/ NULL, + /* 5*/ NULL, + /* 6*/ NULL, + /* 7*/ NULL, + /* 8*/ NULL, + /* 9*/ "Localizar al Dr. Caroll\n", + /* 10*/ "Detener los experimentos\n", + /* 11*/ "Iniciar ciclo de mant. de seguridad\n", + /* 12*/ "Obtener experimentos tecnológicos\n", + /* 13*/ "Holografiar isótopos radioactivos\n", + /* 14*/ "Efectos de sonido Fx de maquinaria.\n", + /* 15*/ "Robots de mantenimiento activados.\n", + /* 16*/ "Robots de mantenimiento reprogramados.\n", + /* 17*/ "Puertas de seguridad desbloqueadas.\n", + /* 18*/ "Ciclo de mantenimiento activado.\n", + /* 19*/ "Rutina del ciclo de limpieza activada.\n", + /* 20*/ "Operación no permitida: robots ocupados.\n", + /* 21*/ "Robots de mantenimiento desactivados.\n", + /* 22*/ "Objeto crítico de la misión destruido.\n", + /* 23*/ "Sistema de mantenimiento de robots apagado.\n", + /* 24*/ "MISIÓN FALLADA:\n no se pueden completar los objetivos.\n", + /* 25*/ "¿Quién eres tú?\n", + /* 26*/ "Bajas de científicos inaceptables.\n", + /* 27*/ "El terminal no está activo.\n", + /* 28*/ "Quitando energía a los sistemas activos.\n", + /* 29*/ "El experimento ha sido detenido.\n", + /* 30*/ "Alarma activada.\n", + /* 31*/ "Alarma desactivada.\n", + /* 32*/ "No me dispares: te ayudaré.\n", + /* 33*/ "¿Qué demonios estás haciendo en mi laboratorio?\n", + /* 34*/ "Déjame ayudarte.\n", + /* 35*/ "Pueden ocurrir accidentes.\n", + /* 36*/ "ACCESO DENEGADO - código de seguridad requerido.\n", + /* 37*/ "Buscando el código.\n", + /* 38*/ ".", + /* 39*/ "Código localizado - abriendo cerradura.\n", + /* 40*/ "Contacto perdido - reestableciendo contacto.\n", + /* 41*/ "La puerta de seguridad ya ha sido abierta.\n", + /* 42*/ "El experimento ya ha sido apagado.\n", + /* 43*/ "¡Qué extraño: el experimento ya está detenido!\n", + /* 44*/ "Parece que alguien ha roto mi PC.\n", + /* 45*/ "Obtén Visión Nocturna.\n", + /* 46*/ "Cassandra De Vries :\n", + /* 47*/ "V. Nocturna\n", + /* 48*/ "Maletín de De Vries\n", + /* 49*/ "Visión Nocturna obtenida.\n", + /* 50*/ "Obtén el escudo tecnológico.\n", + /* 51*/ "Cassandra de Vries:\n", + /* 52*/ "Escudo tecnológico\n", + /* 53*/ "Maletín de De Vries\n", + /* 54*/ "Escudo tecnológico obtenido.\n", + /* 55*/ "Obtén Conector de Datos.\n", + /* 56*/ "\n", + /* 57*/ "C. Datos\n", + /* 58*/ "Un Conector de Datos\n", + /* 59*/ "Conector de Datos obtenido.\n", + /* 60*/ "Conexión establecida.\n", + /* 61*/ "La rejilla de mantenimiento está abierta.\n", + /* 62*/ "La rejilla de mantenimiento ya está abierta.\n", + /* 63*/ "PELIGRO - material radioactivo detectado.\n", + /* 64*/ "¿Qué estás haciendo en mi laboratorio?\n", + /* 65*/ "No te he visto antes...\n", + /* 66*/ "¿Quién demonios eres?\n", + /* 67*/ "Detén el experimento.\n", + /* 68*/ "Tira del enchufe, AHORA.\n", + /* 69*/ "Apaga esa cosa.\n", + /* 70*/ "Lo apagaré.\n", + /* 71*/ "Por favor, no me haga daño.\n", + /* 72*/ "Déjeme ayudarle.\n", + /* 73*/ "¡Mi experimento!\n", + /* 74*/ "Ya, el experimento está detenido.\n", + /* 75*/ "¡Deja este área AHORA!\n", + /* 76*/ "¡Seguridad!\n", + /* 77*/ "Estoy avisando a seguridad.\n", + /* 78*/ "Pueden ocurrir accidentes.\n", + /* 79*/ "¿Cómo pudo ocurrir?\n", + /* 80*/ "Parece que ya está apagado.\n", + /* 81*/ "¿Has estado tocando esto?\n", + /* 82*/ "Alguien ha roto mi equipo.\n", + /* 83*/ "¿Qué le ha pasado al terminal?\n", + /* 84*/ "Cafre. Lo has roto.\n", + /* 85*/ "Conexión perdida: experimentos todavía activos.\n", + /* 86*/ "Objeto experimental 1 obtenido.\n", + /* 87*/ "Objeto experimental 2 obtenido.\n", + /* 88*/ "Objeto experimental 3 obtenido.\n", + /* 89*/ "Obtén la Cámara Espía.\n", + /* 90*/ "Dr. Caroll:\n", + /* 91*/ "Cámara Espía\n", + /* 92*/ "Una Cámara Espía\n", + /* 93*/ "Cámara Espía obtenida.\n", + /* 94*/ "Éste es el sector de mayor seguridad: el Dr. Caroll \ndebe estar cerca.\n", + /* 95*/ "Algo está usando mucha energía por aquí.\n", + /* 96*/ "Reprograma ese robot de limpieza: \nte permitirá entrar.\n", + /* 97*/ "¡Sal, Joanna! Los niveles son demasiado altos. \nUsa la Cámara Espía.\n", + /* 98*/ "Compartimento de armas secreto abierto.\n", + /* 99*/ "Enemigo detectado: arsenal de armas cerrado.\n", + /*100*/ "¿Dr. Caroll?\n", + /*101*/ "Dr. Caroll, ¿está usted aquí?\n", + /*102*/ "Pero, ¿es seguro salir?\n", + /*103*/ "Sí, todo despejado.\n", + /*104*/ "¿Qu... qué... eres...?\n", + /*105*/ "¡Muy profesional, querida, pero no hay tiempo \nque perder! ¡Debemos irnos inmediatamente!\n", + /*106*/ "Vamos. Tengo información vital, y tú \ndebes protegerme.\n", + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldE.c b/src/files/lang/pal-final/eldE.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-final/eldE.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldJ.c b/src/files/lang/pal-final/eldJ.c new file mode 100644 index 000000000..fc638d295 --- /dev/null +++ b/src/files/lang/pal-final/eldJ.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made you would need to respond swiftly. Make sure that the terminals are not damaged as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if possible, or if you're really good get them to give up.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne don't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems.Once the power is restored, all of the doors will be open to you. Unfortunately, they will also be open to the hit squad.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out, and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the Negotiator\n", + /* 6*/ "Eliminate Rooftop Snipers\n", + /* 7*/ "Activate Wind Generator\n", + /* 8*/ "Locate and Eliminate Datadyne Hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture Datadyne Guard\n", + /* 11*/ "Negotiator has been killed\n", + /* 12*/ "Snipers have been eliminated\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling Systems Have Been Activated.\n", + /* 15*/ "Cooling Systems Have Been De-Activated.\n", + /* 16*/ "Power Systems Have Been Activated.\n", + /* 17*/ "Power Systems Have Been De-Activated.\n", + /* 18*/ "Windmill Has Been Re-Activated.\n", + /* 19*/ "Windmill Has Been De-Activated.\n", + /* 20*/ "Electicity Has Been Restored To The Villa.\n", + /* 21*/ "Critical Mission Object Has Been Destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \n the villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington Has Been Rescued\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper RIfle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain Door Key\n", + /* 31*/ "Guards\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online,\nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick or they'll kill\nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before\nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last night we got a call from Cassandra de Vries. A dataDyne team have taken Daniel Carrington hostage at his private villa on the coast, and they say they will spare his life in exchange for the AI.", + /* 40*/ "Unfortunately we don't have it. Daniel and Dr. Caroll were at the villa to discuss 'matters of mutual interest'. It looks like Daniel found a way to hide Dr. Caroll inside the villa when the dataDyne hit squad arrived.", + /* 41*/ "Hopefully our phoney negotiator ploy will give me a chance to surprise the dataDyne squad. This time it's not just my life on the line.", + /* 42*/ "Sir? Are you injured?", + /* 43*/ "No Joanna, I'm okay, but those dataDyne thugs made me tell them where I'd hidden Dr. Caroll. If only I'd held out for a few minutes more...", + /* 44*/ "It's not your fault sir. I should have been quicker.", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll told me that he expected this to happen. Actually, when they recaptured him, the dataDyne team got over-confident and let slip a few facts when they thought I was unconscious. They mentioned a meeting in the G5 building in Chicago, Illinois tonight. I want you to be there, but that doesn't leave you a lot of time to get ready.", + /* 46*/ "That won't be a problem, sir. So, did Dr. Caroll have any useful information for you?", + /* 47*/ "Oh, yes, indeed. He certainly did, and I'll brief you when you're on route to Chicago. We might still be able to help him, even after those butchers remove his personality. He thinks they'll keep a copy of it in a safe place. It's about time I called in some friends to deal with dataDyne.", + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eldP.c b/src/files/lang/pal-final/eldP.c new file mode 100644 index 000000000..1f298c571 --- /dev/null +++ b/src/files/lang/pal-final/eldP.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Locate and Stop dataDyne Hackers\n\nThere have been sporadic attempts in the past from dataDyne hackers trying to gain entry to Institute files. Their job would be much easier if they tried anything inside the villa, due to the direct link between there and the Institute. If such an attempt is made, you will need to respond swiftly. Make sure that the terminals are not damaged, as they contain data that is vital to the Institute.\n\n|Objective Four: - Capture Enemy Guard\n\nCapturing a member of the dataDyne assault team will give us an idea of what their real goals are. Remember not to kill them - knock them unconscious if you can, as this will ensure against them escaping.\n\n|Objective Five: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Eliminate Rooftop Snipers\n\nAs soon as we got the ransom demand, we did a recon overflight of the villa. An examination of the data revealed that there are several snipers on the rooftops - if you are to move around safely, you'll have to take them out.\n\n|Objective Three: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Four: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 3*/ "|Background - \n\nDaniel Carrington is being held hostage at his private villa. A message from Cassandra De Vries has laid out the terms: Daniel's life for the return of the AI known as Dr. Caroll. What dataDyne doesn't know is that the AI was at the villa when they struck. Our guess is that Daniel concealed it safely before they found him.\n\n |Carrington - \n\nNot Available.\n\n|Objective One: - Save the Negotiator\n\nA member of the Institute's staff has volunteered to be used as a distraction to help you get in. She will almost certainly be shot by dataDyne soldiers unless you take out those soldiers quickly. Hit the ground moving.\n\n|Objective Two: - Activate Wind Generator\n\nThe wind generator and power storage device are not active - we suspect Daniel shut them down to deny the dataDyne hit squad access to the villa's systems. Once the power is restored, the door to the villa's lower basement will be open to you.\n\n|Objective Three: - Rescue Carrington\n\nOnly Daniel knows the exact whereabouts of Dr. Caroll. Sooner or later dataDyne will figure this out and get to work on Daniel to make him tell them what they want to know. Once they know where the AI is, Daniel's life is forfeit.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Save the negotiator\n", + /* 6*/ "Eliminate rooftop snipers\n", + /* 7*/ "Activate wind generator\n", + /* 8*/ "Locate and eliminate dataDyne hackers\n", + /* 9*/ "Rescue Carrington\n", + /* 10*/ "Capture dataDyne guard\n", + /* 11*/ "Negotiator has been killed.\n", + /* 12*/ "Snipers have been eliminated.\n", + /* 13*/ "Negotiator has escaped to safety.\n", + /* 14*/ "Cooling systems have been activated.\n", + /* 15*/ "Cooling systems have been deactivated.\n", + /* 16*/ "Power systems have been activated.\n", + /* 17*/ "Power systems have been deactivated.\n", + /* 18*/ "Windmill has been reactivated.\n", + /* 19*/ "Windmill has been deactivated.\n", + /* 20*/ "Electricity has been restored to the villa.\n", + /* 21*/ "Critical mission object has been destroyed.\n", + /* 22*/ "Joanna! It's Grimshaw. We've got hackers at \nthe villa! You've got to stop them\n before they get to our files.\n", + /* 23*/ "Hackers have uploaded vital data.\n", + /* 24*/ "Hackers have been eliminated.\n", + /* 25*/ "Carrington has been rescued.\n", + /* 26*/ "All objectives not completed - mission failed.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Sniper rifle\n", + /* 29*/ "Enemy guard has been subdued.\n", + /* 30*/ "Obtain door key.\n", + /* 31*/ "Guard's\n", + /* 32*/ "Door Key\n", + /* 33*/ "Door Key\n", + /* 34*/ "Picked up a door key.\n", + /* 35*/ "If I get the wind generator back online, \nI'll get power to the lower basement.\n", + /* 36*/ "I've got to be quick, or they'll kill \nthe negotiator!\n", + /* 37*/ "Here's where they must be holding Daniel.\n", + /* 38*/ "Those hackers have to be stopped before \nI rescue Daniel.\n", + /* 39*/ "Agent Dark Mission Log, 1846 hours. Last \nnight we got a call from Cassandra de Vries. \nA dataDyne team have taken Daniel Carrington \nhostage at his private villa on the coast, \nand they say they will spare his life in \nexchange for the AI.\n", + /* 40*/ "Unfortunately, we don't have it. Daniel and \nDr. Caroll were at the villa to discuss \n'matters of mutual interest.' It looks \nlike Daniel found a way to hide Dr. Caroll \ninside the villa when the dataDyne hit \nsquad arrived.\n", + /* 41*/ "Hopefully our phoney negotiator ploy will \ngive me a chance to surprise the dataDyne \nsquad. This time it's not just my life \non the line.\n", + /* 42*/ "Sir? Are you injured?\n", + /* 43*/ "No, Joanna, I'm okay, but those dataDyne \nthugs made me tell them where I'd hidden \nDr. Caroll. If only I'd held out for a \nfew minutes more...\n", + /* 44*/ "It's not your fault, sir. I should have \nbeen quicker.\n", + /* 45*/ "Don't blame yourself, Joanna. Dr. Caroll \ntold me that he expected this to happen. \nActually, when they recaptured him, the \ndataDyne team got overconfident and let \nslip a few facts when they thought I was \nunconscious. They mentioned a meeting in \nthe G5 Building in Chicago, Illinois, \ntonight. I want you to be there, but that \ndoesn't leave you a lot of time to get \nready.\n", + /* 46*/ "That won't be a problem, sir. So, did \nDr. Caroll have any useful information \nfor you?\n", + /* 47*/ "Oh, yes, indeed. He certainly did, and \nI'll brief you when you're en route to \nChicago. We might still be able to help \nhim, even after those butchers remove his \npersonality. He thinks they'll keep a \ncopy of it in a safe place. It's about \ntime I called in some friends to deal \nwith dataDyne.\n", + /* 48*/ "Operation denied - windmill is active.\n", + /* 49*/ "Mission unsuccessful - enemy guard not captured.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_f.c b/src/files/lang/pal-final/eld_str_f.c new file mode 100644 index 000000000..85e9682a3 --- /dev/null +++ b/src/files/lang/pal-final/eld_str_f.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Trouver et neutraliser les pirates\n\nA de nombreuses reprises, les hackers de la dataDyne ont tenté de pirater les fichiers de l'Institut. Leur tâche sera plus facile s'ils interviennent directement dans la villa. S'ils lancent une telle opération, vous devrez agir promptement. Assurez-vous aussi que les terminaux contenant des données vitales pour l'Institut ne sont pas endommagés.\n\n|Objectif 4: - Capturer un garde ennemi\n\nCapturer un membre de l'équipe d'assaut de la dataDyne nous donnerait une idée de leurs plans. Surtout ne le tuez pas: assommez-le si vous le pouvez, ainsi il ne pourra pas s'échapper.\n\n|Objectif 5: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Eliminer les snipers du toit\n\nAprès avoir reçu la demande de rançon, nous avons effectué un vol de reconnaissance au-dessus de la villa. Nos prises de vues révèlent la présence de plusieurs snipers sur les toits. Pour progresser tranquillement, vous devez les éliminer.\n\n|Objectif 3: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 4: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nDaniel Carrington est pris en otage dans sa villa privée. Un message de Cassandra De Vries pose les conditions suivantes: la vie de Daniel contre l'IA nommée Dr. Caroll. Un élément que la dataDyne ignore: l'IA se trouvait dans la villa lors de l'attaque. Nous supposons que Daniel l'a dissimulée avant leur arrivée.\n\n |Carrington - \n\nNon disponible.\n\n|Objectif 1: - Sauver la négociatrice\n\nUn membre de l'Institut s'est porté volontaire pour créer une diversion pendant votre entrée sur les lieux. Elle sera très certainement executée par les soldats de la dataDyne si vous ne la tirez pas de là très rapidement. Déplacez-vous en rampant.\n\n|Objectif 2: - Activer l'éolienne\n\nL'éolienne et les accumulateurs d'énergie sont coupés. Nous pensons que Daniel est le responsable de cette manoeuvre visant à empêcher les troupes de la dataDyne d'accéder aux systèmes de la villa. Une fois le courant rétabli, toutes les portes s'ouvriront. Ceci facilitera votre progression, mais aussi celle des troupes ennemies.\n\n|Objectif 3: - Sauver Carrington\n\nSeul Daniel connaît la position du Dr. Caroll. Tôt ou tard la dataDyne s'en rendra compte et tentera de le faire parler d'une manière ou d'une autre. Une fois l'IA entre leurs mains, la vie de Daniel ne vaudra plus rien.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Sauver la négociatrice\n", + /* 6*/ "Eliminer les snipers du toit\n", + /* 7*/ "Activer l'éolienne\n", + /* 8*/ "Trouver et neutraliser les pirates\n", + /* 9*/ "Sauver Carrington\n", + /* 10*/ "Capturer un garde ennemi\n", + /* 11*/ "Négociatrice abattue.\n", + /* 12*/ "Snipers éliminés.\n", + /* 13*/ "Négociatrice en sécurité.\n", + /* 14*/ "Refroidisseurs activés.\n", + /* 15*/ "Refroidisseurs désactivés.\n", + /* 16*/ "Générateurs activés.\n", + /* 17*/ "Générateurs désactivés.\n", + /* 18*/ "Eolienne réactivée.\n", + /* 19*/ "Eolienne désactivée.\n", + /* 20*/ "Courant rétabli dans la villa.\n", + /* 21*/ "Objet crucial détruit.\n", + /* 22*/ "Joanna! C'est Grimshaw. Il y a des hackers dans \nla villa! Arrêtez-les avant\n qu'ils ne piratent nos fichiers!\n", + /* 23*/ "Les hackers ont copié les fichiers vitaux.\n", + /* 24*/ "Hackers éliminés.\n", + /* 25*/ "Carrington sauvé.\n", + /* 26*/ "Objectifs incomplets - mission échouée.\n", + /* 27*/ "PC gun\n", + /* 28*/ "Fusil sniper\n", + /* 29*/ "Garde ennemi enlevé.\n", + /* 30*/ "Obtenir clé de porte.\n", + /* 31*/ "Garde: \n", + /* 32*/ "Clé de porte\n", + /* 33*/ "Clé de porte\n", + /* 34*/ "Clé de porte obtenue.\n", + /* 35*/ "Si je réactive l'éolienne, je pourrai \nrétablir le courant dans le sous-sol.\n", + /* 36*/ "Je dois faire vite ou ils tueront la \nnégociatrice!\n", + /* 37*/ "Ils doivent garder Daniel ici.\n", + /* 38*/ "Je dois arrêter les hackers avant de \nsauver Daniel.\n", + /* 39*/ "Journal de mission de l'agent Dark, 18:46. \nNous avons reçu un appel de Cassandra de Vries hier soir. \nUne équipe de la dataDyne retient Daniel Carrington \nen otage dans sa villa privée sur la côte, \net épargnera sa vie en échange de l'IA.\n", + /* 40*/ "Malheureusement, nous ne l'avons pas. Daniel et \nle Dr. Caroll étaient tous deux dans la villa \npour un 'arrangement'. Il semblerait que \nDaniel ait pu dissimuler le Dr. Caroll dans la \nvilla lors de l'arrivée des troupes de la \ndataDyne.\n", + /* 41*/ "Par chance notre ruse 'de la négociatrice' \nme donnera l'occasion de surprendre les \nsoldats de la dataDyne. Cette fois il ne \ns'agit pas que de ma propre vie.\n", + /* 42*/ "Monsieur? Etes-vous blessé?\n", + /* 43*/ "Non, Joanna. Je vais bien. Mais ces \nordures de la dataDyne m'ont fait dire \noù se trouvait le Dr. Caroll. Si seulement \nj'avais pu tenir une minute de plus...\n", + /* 44*/ "Ce n'est pas de votre faute. J'aurais dû \nfaire plus vite.\n", + /* 45*/ "Le Dr. Caroll m'a confié qu'il s'attendait \nà une telle action. De plus, les hommes \nde la dataDyne, fiers de leur succès, \nont discuté alors que je faisais semblant \nd'être inconscient. Ils ont mentionné une \nrencontre dans l'immeuble G5 de Chicago, \nen Illinois, ce soir. Vous devez vous y \nrendre, bien qu'il ne vous reste que \npeu de temps pour vous préparer.\n", + /* 46*/ "Aucun problème, monsieur. Le Dr. Caroll \na-t-il pu vous révéler des informations \nimportantes?\n", + /* 47*/ "En effet, très importantes. \nJe vous brieferai sur la route de \nChicago. Nous pourrons peut-être encore \nl'aider, même si ces sadiques lui enlèvent \nsa personnalité. Il veulent en garder \nune sauvegarde à l'abri. Il est \nenfin temps que j'appelle certains amis \npour s'occuper de la dataDyne.\n", + /* 48*/ "Opération refusée - éolienne active.\n", + /* 49*/ "Mission échouée - garde ennemi non capturé.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_g.c b/src/files/lang/pal-final/eld_str_g.c new file mode 100644 index 000000000..be60715cc --- /dev/null +++ b/src/files/lang/pal-final/eld_str_g.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Finden und stoppen Sie die dataDyne-Hacker!\n\nIn der Vergangenheit hat es sporadische Versuche von dataDyne-Hackern gegeben, Zugriff auf die Daten des Instituts zu erhalten. Es würde ihre Arbeit stark vereinfachen, wenn sie in der Villa auf die Direktverbindung zum Institut zugreifen könnten. Sollte dies der Fall sein, müssen Sie rasch reagieren. Achten Sie allerdings darauf, dass die Terminals nicht beschädigt werden dürfen, da sonst das Institut Daten der Prioritätsstufe 1 verliert.\n\n|4. Ziel: - Nehmen Sie eine Wache gefangen!\n\nDie Gefangennahme eines Mitglieds der dataDyne-Truppe verschafft uns Einblick in ihre tatsächlichen Vorhaben. Sie dürfen diese Wachen nicht eliminieren, sondern nur bewusstlos schlagen. Dadurch verhindern Sie auch eine Flucht.\n\n|5. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 1*/ "CARRINGTON VILLA\n", + /* 2*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Eliminieren Sie die Scharfschützen auf dem Dach!\n\nGleich nachdem wir die Forderungen übermittelt bekommen haben, wurde von uns ein Aufklärungsflug über der Villa durchgeführt. Die Auswertung der Daten hat ergeben, dass mehrere Scharfschützen auf den Dächern positioniert wurden. Es ist von höchster Notwendigkeit, diese Schützen zu eliminieren.\n\n|3. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|4. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDaniel Carrington wird als Geisel in seiner eigenen Villa festgehalten. Cassandra De Vries hat uns ihre Bedingungen mitgeteilt: Daniels Leben gegen die KI, bekannt als Dr. Caroll. Was dataDyne nicht weiß, ist die Tatsache, dass die KI zum Zeitpunkt des Verbrechens bereits in der Villa war. Wir gehen davon aus, dass die Maschine von Daniel in Sicherheit gebracht wurde, bevor sie ihn als Geisel genommen haben.\n\n |Carrington - \n\nNicht verfügbar.\n\n|1. Ziel: - Retten Sie die Unterhändlerin!\n\nEin Mitglied des Instituts wurde quasi als Ablenkung eingesetzt, um Ihnen das Eindringen in die Villa zu erleichtern. Wenn Sie es nicht schaffen, die dataDyne-Soldaten rechtzeitig auszuschalten, wird unsere Frau unter Garantie exekutiert!\n\n|2. Ziel: - Aktivieren Sie den Windkraft-Generator!\n\nDer Generator und der Stromspeicher sind inaktiv. Wir vermuten, dass sie von Daniel abgeschaltet wurden, um zu verhindern, dass dataDyne auf die hausinternen Systeme zugreifen kann. Sobald die Stromversorgung wiederhergestellt ist, haben Sie auch Zutritt zum Kellerbereich des Hauses.\n\n|3. Ziel: - Retten Sie Carrington!\n\nNur Daniel kennt den genauen Aufenthaltsort von Dr. Caroll. Früher oder später wird auch dataDyne auf diesen Trichter kommen. Spätestens dann werden sie ihn auf irgendeine Weise zwingen, diese Information preiszugeben. Sobald sie dieses Wissen aus ihm herausbekommen haben, hat sein Leben für sie keinen Wert mehr.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Retten Sie die Unterhändlerin!\n", + /* 6*/ "Eliminieren Sie die Scharfschützen!\n", + /* 7*/ "Aktivieren Sie den Generator!\n", + /* 8*/ "Stoppen Sie die Hacker!\n", + /* 9*/ "Retten Sie Carrington!\n", + /* 10*/ "Nehmen Sie eine Wache gefangen!\n", + /* 11*/ "Die Unterhändlerin wurde verloren.\n", + /* 12*/ "Die Scharfschützen wurden eliminiert.\n", + /* 13*/ "Die Unterhändlerin konnte sich in Sicherheit bringen.\n", + /* 14*/ "Kühlsysteme wurden aktiviert.\n", + /* 15*/ "Kühlsysteme wurden deaktiviert.\n", + /* 16*/ "Stromversorgung wurde aktiviert.\n", + /* 17*/ "Stromversorgung wurde deaktiviert.\n", + /* 18*/ "Windmühle wurde aktiviert.\n", + /* 19*/ "Windmühle wurde deaktiviert.\n", + /* 20*/ "Die Stromversorgung der Villa wurde wiederhergestellt.\n", + /* 21*/ "Wichtiges Objekt wurde zerstört.\n", + /* 22*/ "Joanna! Hier spricht Grimshaw. In der Villa befinden \n sich Hacker! Sie müssen Sie aufhalten, \n bevor sie an unsere Daten gelangen!\n", + /* 23*/ "Die Hacker haben geheime Daten kopiert.\n", + /* 24*/ "Die Hacker wurden eliminiert.\n", + /* 25*/ "Carrington wurde gerettet.\n", + /* 26*/ "Es wurden nicht alle Ziele erreicht - die Mission ist fehlgeschlagen.\n", + /* 27*/ "Laptop-Gewehr\n", + /* 28*/ "Sniper-Gewehr\n", + /* 29*/ "Feindliche Wache wurde kampfunfähig gemacht.\n", + /* 30*/ "Finden Sie den Schlüssel!\n", + /* 31*/ "Schlüssel\n", + /* 32*/ "der Wache\n", + /* 33*/ "Schlüssel\n", + /* 34*/ "Schlüssel aufgenommen\n", + /* 35*/ "Wenn ich den Windkraft-Generator aktiviere, \nsteht auch die Stromversorgung im Keller wieder.\n", + /* 36*/ "Ich muss schnell sein, oder der Unterhändler \nist verloren!\n", + /* 37*/ "Hier müssen sie Daniel gefangenhalten.\n", + /* 38*/ "Bevor ich Daniel rette, müssen diese Hacker \ngestoppt werden.\n", + /* 39*/ "Agent Dark Missions-Logbuch, 18.46 Uhr. Letzte \nNacht erhielten wir einen Anruf von Cassandra de Vries. \nEin dataDyne-Trupp hat Daniel Carrington \nin seiner Villa an der Küste als Geisel genommen. \nSie sagen, dass sie sein Leben im Austausch \nfür die KI schonen werden.\n", + /* 40*/ "Unglücklicherweise haben wir die KI nicht. Daniel und \nDr. Caroll waren in der Villa, um 'Themen von \nbeiderseitigem Interesse' zu besprechen. Es sieht \nso aus, als hätte Daniel einen Weg gefunden, Dr. Caroll \nin der Villa zu verstecken, bevor die dataDyne-Truppen \neingetroffen sind.\n", + /* 41*/ "Ich hoffe, dass mir unser Unterhändler-Trick \nzu einer Chance verhilft, die dataDyne-Truppen zu \nüberraschen. Diesmal geht es nicht nur um mein \nLeben...\n", + /* 42*/ "Sir? Sind Sie verletzt?\n", + /* 43*/ "Nein, Joanna, ich bin okay, aber diese dataDyne-\nSchläger haben aus mir herausgeprügelt, wo ich \nDr. Caroll versteckt habe. Wenn ich nur noch ein \npaar Minuten länger durchgehalten hätte...\n", + /* 44*/ "Es ist nicht Ihre Schuld, Sir. Ich hätte schneller \nsein müssen.\n", + /* 45*/ "Machen Sie sich keine Vorwürfe! Dr. Caroll \nhat mir gesagt, dass er diesen Zug erwartet hat. \nAls sie ihn gefunden haben, sind die dataDyne-Leute \netwas unvorsichtig geworden. Sie dachten, ich wäre \nbewusstlos und haben darüber gesprochen, wohin sie \nihn bringen. Sie erwähnten ein Meeting im \nG5-Building in Chicago, Illinois, noch heute Nacht.\nIch möchte, dass Sie dorthin gehen, aber das \nbedeutet, dass Sie nicht viel Zeit haben, um sich \nauf die Mission vorzubereiten.\n", + /* 46*/ "Das soll nicht das Problem sein, Sir. Konnte \nIhnen Dr. Caroll wenigstens einige nützliche \nInformationen weitergeben?\n", + /* 47*/ "Oh ja, das konnte er. Ich werde Sie weiterinformieren, \nwenn Sie sich auf dem Weg nach Chicago befinden. \nWir sind noch immer in der Lage, ihm zu helfen, \nselbst wenn diese Schlächter seine Persönlichkeit \nverändern. Er glaubt, dass sie eine Sicherungskopie \nseiner Daten haben. Es ist wohl an der Zeit, dass ich \nmich mit ein paar Freunden unterhalte, die mit dataDyne \nabrechnen werden.\n", + /* 48*/ "Unzulässige Operation - Windmühle ist aktiv.\n", + /* 49*/ "Mission nicht erfolgreich - Feindliche Wache wurde nicht gefangen.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_i.c b/src/files/lang/pal-final/eld_str_i.c new file mode 100644 index 000000000..2655e5787 --- /dev/null +++ b/src/files/lang/pal-final/eld_str_i.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Localizza e blocca gli hacker dataDyne\n\nIn passato gli hacker dataDyne hanno effettuato sporadici tentativi di accedere ai file dell'istituto. Ora avrebbero la vita molto più facile provando dall'interno della villa, grazie al nostro collegamento diretto con l'istituto. Se agiscono in tal senso dovrai rispondere repentinamente! Evita qualsiasi danno ai terminali poiché contengono dati di fondamentale importanza per l'istituto.\n\n|Obiettivo 4: - Cattura la guardia dataDyne\n\nSe riuscissimo a catturare un componente della squadra d'assalto dataDyne, saremmo in grado di farci finalmente un'idea in merito ai loro obiettivi. Ricorda di non ucciderlo: colpiscilo facendo perdere loro i sensi, in modo da impedirne la fuga.\n\n|Obiettivo 5: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 1*/ "VILLA DI CARRINGTON \n", + /* 2*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Elimina i cecchini sul tetto\n\nAppena ricevuta la richiesta di riscatto abbiamo compiuto un volo di ricognizione attorno alla villa. Un attento esame dei dati ha rivelato la presenza di numerosi cecchini sul tetto. Per muoverti liberamente dovrai eliminarli.\n\n|Obiettivo 3: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 4: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDaniel Carrington è tenuto in ostaggio nella sua villa privata. Un messaggio di Cassandra De Vries pone le condizioni: la vita di Daniel in cambio dell'automa noto come Dr. Caroll. Ciò che la dataDyne ancora non sa è che l'automa si trovava nella villa al momento della loro incursione. Presupponiamo che Daniel l'abbia nascosto in un posto sicuro prima che lo scoprissero.\n\n |Carrington:\n\nIrreperibile.\n\n|Obiettivo 1: - Salva la mediatrice\n\nUna dipendente dell'istituto si è offerta volontaria per distrarre i soldati dataDyne e permetterti di entrare. Sarà sicuramente uccisa, se non elimini quei soldati alla svelta. La sua vita è nelle tue mani! Tieni la situazione sotto controllo!\n\n|Obiettivo 2: - Attiva il generatore eolico\n\nIl generatore eolico e l'accumulatore energetico non sono attivi. Sospettiamo che siano stati disattivati da Daniel per impedire alla squadra d'assalto dataDyne di accedere ai sistemi della villa. Dopo averli riattivati troverai aperte tutte le porte del sotterraneo inferiore della villa.\n\n|Obiettivo 3: - Salva Carrington\n\nDaniel è l'unico che conosce il luogo in cui è nascosto il Dr. Caroll. Prima o poi la dataDyne lo scoprirà e si lavoreranno Daniel per farlo parlare e fargli dire quello che vogliono sapere. Una volta scoperto il il nascondiglio dell'automa la vita di Daniel è bell'e perduta!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Salva la mediatrice\n", + /* 6*/ "Elimina i cecchini sul tetto\n", + /* 7*/ "Attiva il generatore eolico\n", + /* 8*/ "Localizza e blocca gli hacker dataDyne\n", + /* 9*/ "Salva Carrington\n", + /* 10*/ "Cattura la guardia dataDyne\n", + /* 11*/ "La mediatrice è stata uccisa.\n", + /* 12*/ "I cecchini sono stati eliminati.\n", + /* 13*/ "La mediatrice si è messa in salvo.\n", + /* 14*/ "Attivato l'impianto di raffreddamento\n", + /* 15*/ "Disattivato l'impianto di raffreddamento\n", + /* 16*/ "Attivati gli accumulatori energetici\n", + /* 17*/ "Disattivati gli accumulatori energetici\n", + /* 18*/ "Riattivato il generatore eolico\n", + /* 19*/ "Disattivato il generatore eolico\n", + /* 20*/ "Ristabilita l'elettricità nella villa\n", + /* 21*/ "Distrutto strumento essenziale alla missione.\n", + /* 22*/ "Joanna! Sono Grimshaw. Ci sono degli hacker \nnella villa! Devi fermarli prima che \n mettano le mani sui file.\n", + /* 23*/ "Gli hacker hanno scaricato dati essenziali.\n", + /* 24*/ "Gli hacker sono stati eliminati.\n", + /* 25*/ "Carrington è stato salvato.\n", + /* 26*/ "MISSIONE FALLITA - Obiettivi incompleti\n", + /* 27*/ "Pistola Laptop\n", + /* 28*/ "Fucile cecchino\n", + /* 29*/ "Sconfitta la guardia nemica\n", + /* 30*/ "Procurati chiave porta\n", + /* 31*/ "Guardia:\n", + /* 32*/ "Chiave porta\n", + /* 33*/ "Chiave porta\n", + /* 34*/ "Presa chiave porta\n", + /* 35*/ "Riattivando il generatore eolico, \npotrò portare l'elettricità \nnel sotterraneo inferiore.\n", + /* 36*/ "Devo fare alla svelta o \nuccideranno la mediatrice!\n", + /* 37*/ "Daniel dev'essere imprigionato qui!\n", + /* 38*/ "Devo fermare gli hacker prima \ndi salvare Daniel!\n", + /* 39*/ "Missione dell'Agente Dark, ore 18.46. La notte\nscorsa abbiamo ricevuto una chiamata di Cassandra \nde Vries. Una squadra dataDyne ha preso in ostaggio \nDaniel Carrington nella sua villa sulla costa. \nDicono che lo risparmieranno in cambio \ndell'automa.\n", + /* 40*/ "Sfortunatamente, non ce l'abbiamo noi. \nDaniel e il Dr. Caroll erano alla villa \nper discutere 'questioni di interesse \nreciproco'. Sembra che Daniel abbia trovato \nil modo di nascondere il Dr. Caroll prima \nche arrivasse la squadra dataDyne.\n", + /* 41*/ "Speriamo che il nostro piano della falsa \nmediatrice mi permetta di sorprendere la \nsquadra dataDyne. Stavolta non c'è solo \nla mia vita in gioco!\n", + /* 42*/ "È ferito, signore?\n", + /* 43*/ "No, Joanna, tutto bene, ma quelle bestie \ndella dataDyne mi hanno costretto a dir loro \ndove ho nascosto il Dr. Caroll. Se solo \navessi resistito qualche minuto in più...\n", + /* 44*/ "Non è colpa sua, signore! Avrei \ndovuto fare più in fretta io!\n", + /* 45*/ "Non essere troppo dura con te stessa, Jo. \nIl Dr. Caroll si aspettava una cosa del \ngenere. Anzi, dopo averlo catturato la \nsquadra dataDyne ha guadagnato sicurezza \ne, credendomi svenuto, si è lasciata \nsfuggire un paio di cosette interessanti. \nHanno parlato di una riunione prevista per\nquesta notte nell'Edificio G5 a Chicago, \nIllinois! Voglio che tu sia lì, ma certo\nnon ti resta molto tempo per prepararti! \n", + /* 46*/ "Non c'è problema, signore! Allora, \nil Dr. Caroll le ha dato informazioni \nutili?\n", + /* 47*/ "Oh, certo, eccome! Ti racconterò ogni \nparticolare durante il tuo viaggio verso \nChicago. Possiamo ancora salvarlo, anche \nse quei macellai riescono a manipolargli \nil cervello. Ritiene che ne conservino una \ncopia in un posto sicuro. È proprio ora \ndi contattare alcuni amici perché si \noccupino della dataDyne!\n", + /* 48*/ "OPERAZIONE IMPOSSIBILE - Generatore attivo\n", + /* 49*/ "MISSIONE FALLITA - Guardia nemica non catturata\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/eld_str_s.c b/src/files/lang/pal-final/eld_str_s.c new file mode 100644 index 000000000..824e87b8b --- /dev/null +++ b/src/files/lang/pal-final/eld_str_s.c @@ -0,0 +1,56 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Localizar y Detener a los 'Hackers' de dataDyne\n\nEn el pasado ha habido intentos esporádicos de los 'hackers' de dataDyne de acceder a los ficheros del Instituto. Su trabajo será mucho más fácil si lo intentan desde la villa, debido a la conexión directa con el Instituto. Si se hace ese intento, necesitarás responder rápidamente. Asegúrate de que los terminales no son dañados, ya que contienen datos vitales para el Instituto.\n\n|Objetivo Cuatro: - Capturar a Guarda Enemigo\n\nCapturar a un miembro del equipo de asalto de dataDyne nos dará una idea de sus intenciones reales. Recuerda no matarles: déjalos inconscientes si puedes, ya que esto nos asegurará que no escapen.\n\n|Objetivo Cinco: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 1*/ "VILLA CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Eliminar a los Francotiradores del Tejado\n\nTan pronto como tuvimos la demanda de rescate, hicimos un vuelo de reconocimiento de la villa. Un examen de los datos revela que hay bastantes francotiradores en los tejados: si quieres moverte con seguridad, deberás eliminarlos.\n\n|Objetivo Tres: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Cuatro: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nDaniel Carrington es mantenido como rehén en su propia villa privada. Un mensaje de Cassandra De Vries ha expuesto los términos: la vida de Daniel a cambio de la devolución de la IA conocida como Dr. Caroll. Lo que dataDyne no sabe es que la IA estaba en la villa cuando ellos atacaron. Suponemos que Daniel la puso a salvo antes de que le encontraran.\n\n |Carrington - \n\nNo Disponible.\n\n|Objetivo Uno: - Salvar al Negociador\n\nUn miembro del personal del Instituto se ha presentado voluntario para servir de distracción para ayudarte a entrar. Es casi seguro que esa persona será abatida por los soldados de dataDyne a menos que acabes con ellos rápidamente. Tienes que ser muy rápida.\n\n|Objetivo Dos: - Activar Generador Eólico\n\nEl generador eólico y el almacenador de energía no están activos: creemos que Daniel los apagó para que el equipo de asalto de dataDyne no accediera a los sistemas de la villa. Cuando se restablezca la energía, la puerta de la villa que va al sótano inferior se abrirá para ti.\n\n|Objetivo Tres: - Rescatar a Carrington\n\nSólo Daniel conoce el paradero del Dr. Caroll. Más tarde o más temprano, dataDyne se lo imaginará y empezarán a 'trabajarse' a Daniel para que les cuente lo que quieren saber. Una vez conozcan donde está la IA, la vida de Daniel está perdida.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Salvar al negociador\n", + /* 6*/ "Eliminar francotiradores del tejado\n", + /* 7*/ "Activar generador eólico\n", + /* 8*/ "Localizar y eliminar 'hackers'\n", + /* 9*/ "Rescatar a Carrington\n", + /* 10*/ "Capturar guarda de dataDyne \n", + /* 11*/ "El negociador ha muerto.\n", + /* 12*/ "Los francotiradores han sido eliminados.\n", + /* 13*/ "El negociador ha escapado a lugar seguro.\n", + /* 14*/ "Los sistemas de refrigeración han sido activados.\n", + /* 15*/ "Los sistemas de refrigeración han sido desactivados.\n", + /* 16*/ "Los sistemas de energía han sido activados.\n", + /* 17*/ "Los sistemas de energía han sido desactivados.\n", + /* 18*/ "La torre eólica ha sido activada.\n", + /* 19*/ "La torre eólica ha sido desactivada.\n", + /* 20*/ "La electricidad ha sido restablecida en la Villa.\n", + /* 21*/ "Objeto crítico de la misión destruido.\n", + /* 22*/ "¡Joanna! Grimshaw al habla. ¡Tenemos 'hackers' en \nla villa! Debes detenerles antes de que accedan\n a nuestros ficheros.\n", + /* 23*/ "Los 'hackers' han descargado datos vitales.\n", + /* 24*/ "Los 'hackers' han sido eliminados.\n", + /* 25*/ "Carrington ha sido rescatado.\n", + /* 26*/ "Objetivos no completados: misión fallada.\n", + /* 27*/ "Arma PC\n", + /* 28*/ "Rifle Fr\n", + /* 29*/ "Guarda enemigo ha sido dominado.\n", + /* 30*/ "Obtén la llave de la puerta.\n", + /* 31*/ "Guarda:\n", + /* 32*/ "Llave de la Puerta\n", + /* 33*/ "Llave de la Puerta\n", + /* 34*/ "Llave de la Puerta obtenida.\n", + /* 35*/ "Si conecto de nuevo el generador eólico, \ntendremos energía en el sótano inferior.\n", + /* 36*/ "¡Tengo que ser rápida, o matarán \nal negociador!\n", + /* 37*/ "Aquí es donde deben tener retenido a Daniel.\n", + /* 38*/ "Esos 'hackers' deben ser detenidos antes \n de que rescate a Daniel.\n", + /* 39*/ "Informe de la Misión de la Agente Dark, 18:46 horas. \nAnoche tuvimos una llamada de Cassandra De Vries. \nUn equipo de dataDyne tiene a Daniel Carrington \nretenido en su villa privada en la costa, \ny dicen que respetarán su vida a cambio \nde la IA.\n", + /* 40*/ "Desafortunadamente, no la tenemos. Daniel y el \nDr. Caroll estaban en la villa para discutir \n'materias de mutuo interés'. Parece que Daniel \nencontró un modo de esconder al Dr. Caroll en \nla villa cuando el escuadrón de dataDyne \nirrumpió allí.\n", + /* 41*/ "Con un poco de suerte nuestro ardid del falso \nnegociador me dará una oportunidad de sorprender \nal escuadrón de dataDyne. Esta vez no sólo mi \nvida está en juego.\n", + /* 42*/ "Señor, ¿está herido?\n", + /* 43*/ "No, Joanna, estoy bien, pero esos matones \nde dataDyne me han hecho contarles donde \nescondía al Dr. Caroll. Si hubiera aguantado \nunos minutos más...\n", + /* 44*/ "No fue su culpa, señor. Debí ser \nmás rápida.\n", + /* 45*/ "No te culpes, Joanna. El Dr. Caroll \nme dijo que esperaba que esto ocurriera. \nEn realidad, cuando fue recapturado, el \nequipo de dataDyne, en un exceso de confianza, \ndejó caer algunas cosas, ya que pensaban que \nestaba inconsciente. Mencionaron una reunión \nen el Edificio G5 en Chicago, Illinois, esta \nnoche. Quiero que estés allí, pero esto no \nte deja mucho tiempo para prepararte.\n", + /* 46*/ "Eso no será un problema, señor. Así que, \n¿el Dr. Caroll le dio alguna información \nútil para usted?\n", + /* 47*/ "Oh, claro que sí. Ciertamente lo hizo, y \nte haré un breve resumen cuando estés de \ncamino a Chicago. Todavía podemos ser capaces \nde ayudarle, incluso aunque esos carniceros \neliminen su personalidad. Él cree que ellos \nguardarán una copia en un lugar seguro. Es \ncuestión de tiempo que llame a unos \namigos para que se encarguen de dataDyne.\n", + /* 48*/ "Operación denegada - el molino está activo.\n", + /* 49*/ "Misión no conseguida - guarda enemigo no capturado.\n", + /* 50*/ NULL, + /* 51*/ NULL, +}; diff --git a/src/files/lang/pal-final/gunE.c b/src/files/lang/pal-final/gunE.c new file mode 100644 index 000000000..7e8cd94c1 --- /dev/null +++ b/src/files/lang/pal-final/gunE.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", +}; diff --git a/src/files/lang/pal-final/gunJ.c b/src/files/lang/pal-final/gunJ.c new file mode 100644 index 000000000..d5b72fb56 --- /dev/null +++ b/src/files/lang/pal-final/gunJ.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP7\n", + /* 51*/ "DD44\n", + /* 52*/ "Klobb\n", + /* 53*/ "KF7 Soviet\n", + /* 54*/ "ZMG (9mm)\n", + /* 55*/ "D5K\n", + /* 56*/ "AR33\n", + /* 57*/ "RC-P90\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Sight\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "I-R Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targetted Rocket\n", + /* 93*/ "Fly By Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Drug\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapon against them.\n", + /*156*/ "Accurate and trustworthy, This gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this sub-machinegun boasts a 32 rnd mag and a special feature - the ability to designate and lock-on to targets in the line of sight. It turns an average marksman into an excellent one, provided they are clever enough to operate the gun. Average fire rate: 900rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700rpm.\n", + /*167*/ "A variant of the Dragon assault rifle, instead of a proximity explosive it has a small grenade launcher. Excellent support weapon. Average fire rate: 700rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns and similar hazards. Average fire rate: 950rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900rpm. unloads at 2000rpm\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate, and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other smg, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900rpm. s/f:300rpm\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked-on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades in a sticky substance; when fired, the bomb attaches itself to wall or ceiling, then after a few seconds it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track lifesources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfectaccuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute Agent's wrist. It folds up to aid concealment, and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a phial of poison that shatters when thrown, usually killing the target in approximately 6 seconds. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact, or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focussed white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of so-called 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. Has a video/audio link with a recording function, and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customised to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health, and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safe-cracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this of course depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical proceedures without the need of incisions. Only drawback is that it only works on Maians. The other only drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targetting infomation to orbital weapons, helping to minimise collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One, also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic 2. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the Artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for Case Study, Theoretical Projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Safe Item\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Tape\n", + /*228*/ "Keycard\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, +}; diff --git a/src/files/lang/pal-final/gunP.c b/src/files/lang/pal-final/gunP.c new file mode 100644 index 000000000..7e8cd94c1 --- /dev/null +++ b/src/files/lang/pal-final/gunP.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Kill count", + /* 2*/ "Died once\n", + /* 3*/ "Died", + /* 4*/ "times", + /* 5*/ "Suicide count", + /* 6*/ "Unarmed\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silencer)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Shotgun\n", + /* 26*/ "Reaper\n", + /* 27*/ "Rocket Launcher\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "MaianGrenade\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Sniper Rifle\n", + /* 33*/ "Crossbow\n", + /* 34*/ "Tranquilizer\n", + /* 35*/ "Combat Knife\n", + /* 36*/ "Grenade\n", + /* 37*/ "N-Bomb\n", + /* 38*/ "Timed Mine\n", + /* 39*/ "Proximity Mine\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "ECM Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disguise\n", + /* 44*/ "Rocket\n", + /* 45*/ "Homing Rocket\n", + /* 46*/ "Grenade Round\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolt\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Night Vision\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Door Decoder\n", + /* 64*/ "Explosives\n", + /* 65*/ "X-Ray Scanner\n", + /* 66*/ "Alien Medpack\n", + /* 67*/ "Suitcase\n", + /* 68*/ "Disguise\n", + /* 69*/ "IR Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Briefcase\n", + /* 72*/ "Suicide Pill\n", + /* 73*/ "Cloaking Device\n", + /* 74*/ "Combat Boost\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizon Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "R-Launcher\n", + /* 81*/ "Proxy Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Knife\n", + /* 84*/ "DY357\n", + /* 85*/ "Single Shot\n", + /* 86*/ "Rapid Fire\n", + /* 87*/ "Burst Fire\n", + /* 88*/ "Reapage\n", + /* 89*/ "Shotgun Fire\n", + /* 90*/ "Rail-gun effect\n", + /* 91*/ "Rocket Launch\n", + /* 92*/ "Targeted Rocket\n", + /* 93*/ "Fly-By-Wire Rocket\n", + /* 94*/ "Pistol Whip\n", + /* 95*/ "Explosive Shells\n", + /* 96*/ "Guided Shots\n", + /* 97*/ "Magazine Discharge\n", + /* 98*/ "Grenade Launcher\n", + /* 99*/ "Wall Hugger\n", + /*100*/ "Punch\n", + /*101*/ "Disarm\n", + /*102*/ "Follow Lock-On\n", + /*103*/ "Use Scope\n", + /*104*/ "Half Magazine Discharge\n", + /*105*/ "Double Blast\n", + /*106*/ "Grinder\n", + /*107*/ "Sedate\n", + /*108*/ "Lethal Injection\n", + /*109*/ "Knife Slash\n", + /*110*/ "Throw Poison Knife\n", + /*111*/ "Target Locator\n", + /*112*/ "Instant Kill\n", + /*113*/ "Boost\n", + /*114*/ "Revert\n", + /*115*/ "High Impact Shells\n", + /*116*/ "Cloak\n", + /*117*/ "Deploy as Sentry Gun\n", + /*118*/ "Proximity Self Destruct\n", + /*119*/ "Threat Detector\n", + /*120*/ "Timed Explosive\n", + /*121*/ "Proximity Explosive\n", + /*122*/ "Remote Explosive\n", + /*123*/ "Detonate\n", + /*124*/ "4-Second Fuse\n", + /*125*/ "Proximity Pinball\n", + /*126*/ "Timed Detonation\n", + /*127*/ "Proximity Detonation\n", + /*128*/ "3-Round Burst\n", + /*129*/ "Charge-Up Shot\n", + /*130*/ "Crouch\n", + /*131*/ "Infect\n", + /*132*/ "Pulse Fire\n", + /*133*/ "Short Range Stream\n", + /*134*/ "Impact Detonation\n", + /*135*/ "Light Amplifier\n", + /*136*/ "Mobile Camera\n", + /*137*/ "X-Ray Vision\n", + /*138*/ "Thermal Imager\n", + /*139*/ "Zoom\n", + /*140*/ "Jamming Device\n", + /*141*/ "Connect\n", + /*142*/ "Identify Targets\n", + /*143*/ "Wear Disguise\n", + /*144*/ "Place Explosives\n", + /*145*/ "Telescopic Sight\n", + /*146*/ "Silencer\n", + /*147*/ "Magazine Extension\n", + /*148*/ "Laser Sight\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Even without a weapon, you are still a worthy adversary. Use your fists to knock your opponents out or disarm them and use their weapons against them.\n", + /*156*/ "Accurate and trustworthy, this gun is the workhorse of the Institute's operations. Use the laser sight to place bullets with deadly effect, or pistol-whip adversaries to knock them out.\n", + /*157*/ "An upgraded Falcon 2, which has the added benefit of being silent, but deadly.\n", + /*158*/ "An upgraded Falcon 2, featuring a 2x magnification scope which allows you to take advantage of the Falcon's superior accuracy.\n", + /*159*/ "A state-of-the-art military pistol, largely used by peacekeeping forces. It has a slight zoom capability, and boasts a 3-round burst secondary fire mode.\n", + /*160*/ "If you see a Skedar coming at you, the chances are it's carrying one of these. A large magazine and a bladed barrel make the pistol a formidable handgun, but the killer blow comes from the secondary function - charge the shot up for extra power at the cost of a few rounds of ammo.\n", + /*161*/ "The dataDyne DY357 is the most powerful handgun in the world. Each round has an impressive penetration factor and knocks the target back with the weight and power of the shot. Custom models are made for valued clients; NSA director Trent Easton is rumored to have a gold plated variant.\n", + /*162*/ "The DY357-LX was custom built for NSA director Trent Easton. Besides boasting an attractive genuine tiger skin grip, this golden gun features a velocity optimized barrel, meaning that each bullet always meets its target with fatal force.\n", + /*163*/ "The Maian standard issue sidearm. A flexible gun, the pistol fires standard shots, or explosive shots at no cost to the rest of the magazine.\n", + /*164*/ "A dataDyne classic, and a bestseller, this submachine gun boasts a 32 rnd mag and a special feature - the ability to designate and lock on to targets in the line of sight. It turns an average marksman into an excellent one, provided he or she is clever enough to operate the gun. Average fire rate: 900 rpm.\n", + /*165*/ "The Carrington Institute's main assault rifle. A good range and magazine size make it a useful weapon; the secondary mode enables the user to move while zoomed in on a target. Average fire rate: 750 rpm.\n", + /*166*/ "A standard assault rifle with an evil twist - when the secondary mode is activated, it becomes a proximity-activated mine that looks like a gun. Average fire rate: 700 rpm.\n", + /*167*/ "A variant of the Dragon assault rifle - instead of a proximity explosive, it has a small grenade launcher. Excellent support weapon. Average fire rate: 700 rpm.\n", + /*168*/ "Another piece of high-tech kit from dataDyne. Ordinarily an assault rifle with a smallish magazine and a powerful punch, it has a threat detection mode that highlights explosives, wallguns, and similar hazards. Average fire rate: 950 rpm.\n", + /*169*/ "Designed for use by bodyguards, the Cyclone has been adopted by Presidential Security due to its excellent capability when used for suppression. In extreme circumstances, it can more than double the fire rate, discharging the magazine in a second. Average fire rate: 900 rpm. Unloads at 2000 rpm.\n", + /*170*/ "The Carrington Institute secret weapon. It fires at a phenomenal rate and has a huge magazine capacity. The secondary mode is a cloaking device that runs off the ammunition in the magazine. A devastating weapon. Average fire rate: 1100 rpm.\n", + /*171*/ "Another example of excellent Maian firearm design. It can fire standard shots as fast as any other SMG, or it can fire high velocity rounds which will easily penetrate objects to find targets hiding in cover. The only drawbacks with the secondary fire mode are that the fire rate is lower and the accuracy suffers from the power of the shot. Average fire rate: 900 rpm (s/f:300 rpm).\n", + /*172*/ "A submachine gun made to look like a laptop PC. In disguised form, the gun cannot fire, but when activated, it unfolds into shape. The PC gun will not bear close inspection; it will boot up, but the memory is a quarter of what it is supposed to be. Average fire rate: 1000 rpm.\n", + /*173*/ "A dataDyne weapon manufactured for security forces. A nine-cartridge magazine combined with single or double fire modes make it a dangerous close-quarters weapon.\n", + /*174*/ "A truly terrifying weapon in the hands of someone strong enough to control the massive recoil; for anyone else, a highly unwieldy but effective corridor clearance weapon. Maximum fire rate: 1800 rpm.\n", + /*175*/ "A cumbersome weapon. Fires either a standard rocket or a slower, homing rocket when locked on to the unfortunate target.\n", + /*176*/ "A long range grenade delivery system manufactured by dataDyne. The secondary fire mode coats the grenades with a sticky substance; when fired, the bomb attaches itself to wall or ceiling. After a few seconds, it detaches to fall to the ground, where it detonates.\n", + /*177*/ "The Skedar enjoy seeing the terror of their enemies. It seems natural that they should have a remote-controlled rocket as a secondary fire mode on their basic rocket launcher, so that they can take pleasure from the prey's vain attempts to escape the closing projectile.\n", + /*178*/ "The FarSight rifle is a Maian hybrid of an X-ray scanning device coupled with a rifle that can shoot through solid objects. The scope can lock onto and track life sources, though the device does not pan as fast as a running enemy can move.\n", + /*179*/ "With a powerful zoom and a high velocity bullet, this Carrington Institute weapon is one of the best sniper rifles ever made. Crouch down for perfect accuracy.\n", + /*180*/ "This crossbow is a short-range 'pistol' sized example, mounted on a Carrington Institute agent's wrist. It folds up to aid concealment and can fire up to five bolts, either the more usual drugged shots, or a lethal bolt.\n", + /*181*/ "A rapid-fire device, it can be used as a weapon in an emergency, but it is designed primarily as a dermal spray injector for sedative drugs. Users are advised that a full discharge of the drug reservoir can be fatal.\n", + /*182*/ "A large and vicious combat knife. It contains a vial of poison that shatters when thrown, giving a wounded enemy at most 6 seconds to live. A dataDyne weapon through and through.\n", + /*183*/ "An updated version of the trusty grenade. Can be thrown with a four-second fuse or used as a bouncing proximity bomb.\n", + /*184*/ "A hand-held, small area effect neutron bomb. It can either detonate on impact or be set to proximity detonation.\n", + /*185*/ "A mine with a short timed fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*186*/ "A mine with a proximity fuse. It has a threat detection/evaluation sensor that can be activated as a secondary mode.\n", + /*187*/ "A mine that can be triggered remotely. The activate command is the secondary mode.\n", + /*188*/ "A focused white-noise jamming device, capable of simulating one of many common electrical faults in any system to which it is directly attached.\n", + /*189*/ "The laser is wrist-mounted and deadly accurate. It can either fire long-range pulses, or it can sustain a constant, concentrated stream of energy at short range.\n", + /*190*/ "Geneered stimulants designed for combat applications. When administered, they seem to slow down the passage of time to give a reaction window.\n", + /*191*/ "The latest of a line of 'starlight' scopes that enhance visible light to produce a clearer picture of the surrounding environment. Uses a target-movement algorithm to highlight possible threats.\n", + /*192*/ "Using the smallest application yet of anti-grav technology, this is the ultimate snooping device. It has a video/audio link with a recording function and an onboard facility for spectroscopic holography.\n", + /*193*/ "A short-range scope that can see through any material - even lead - producing a simplified chromatic representation of the environment.\n", + /*194*/ "This scope uses infra-red scanning modulated with ultrasonic data to provide not only a clearer picture of the surrounding area, but also a location of any structural irregularities. It can also locate enemies using cloaking technology or other optical baffles.\n", + /*195*/ "Uses the light-warping qualities of an alien crystal to create a refractive field around the wearer. Functions as long as there is little kinetic disturbance within the field boundary; the act of firing a gun is enough to cause a return to visibility.\n", + /*196*/ "A binocular-input long range visual scanner. The visor shows a composite image of the two input sources. Also has a zoom function.\n", + /*197*/ "Capable of remote interrogation of almost any type of stored data, which is sent directly back to the Institute computer hackers. A variant of this device provides the hackers with a direct link into the local system.\n", + /*198*/ "A powerful tracking device that can be customized to fit any set of parameters: people, weapons, objects, and locations are some of the possibilities.\n", + /*199*/ "A modified medical scanner that contains the most up-to-date record of the President's state of health and a library of past conditions and treatments. It can detect the vital functions of the President from a distance, even when the target is in the middle of a crowd.\n", + /*200*/ "A safecracker, pure and simple. Breaks electronic encoded locks, usually in a matter of seconds, though this, of course, depends on the individual lock.\n", + /*201*/ "Maian medical marvel, can auto-diagnose and perform surgical procedures without the need of incisions. One drawback is that it only works on Maians; the other drawback is the lack of a bedside manner.\n", + /*202*/ "A small plastic explosive charge, complete with sealed tamper-proof timer, and embedded with teflon-coated shrapnel. Nasty.\n", + /*203*/ "As you are aware, this is a directional fusion bomb, to be placed so that the charge is directed downwards. This will obliterate the dataDyne research labs and cause the rest of the building to collapse into the hole.\n", + /*204*/ "A small bug that is attached to any part of a communication relay. It 'piggybacks' the official signal, enabling the link between Institute and agent to be maintained through intensive local countermeasures; to all intents and purposes, it is part of the target location's comms setup.\n", + /*205*/ "The inner workings of this bug are a closely guarded secret - the self-destruct mechanism forms a large part of the device. It is speculated that this is an example of quantum molecular communication, which explains the phenomenal reliability of the device in field use.\n", + /*206*/ "Uses quantum communication technology to provide supremely accurate targeting information to orbital weapons, helping to minimize collateral damage. The same technology is used in the Carrington Institute tracker bugs.\n", + /*207*/ "Details of the flight path and communication codes and frequencies for Air Force One - also current encryption keys.\n", + /*208*/ "All data pertaining to ocean floor research carried out by dataDyne on the pirated deep sea diving operations vessel Pelagic II. Contents sonar mapping, geological data, alien artifact data, hull samples, etc.\n", + /*209*/ "The last personality-state recording of the artificial intelligence, self-designated Dr. Caroll, prior to memory wipe and cerebral restructuring. Use for case study, theoretical projections only. Morally incorrupt, and therefore dangerous. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "A chemical cocktail that warps the perceived reality of the target. Good becomes bad, bad becomes good; enemies and friends change places. Another one of the darker research projects from Trent Easton's Area 51.\n", + /*211*/ "Not your normal outfit. Wear it to pretend not to be you.\n", + /*212*/ "PROXY\n", + /*213*/ "TIMED\n", + /*214*/ "REMOTE\n", + /*215*/ "AUTOGUN\n", + /*216*/ "IMPACT\n", + /*217*/ "Big King Rocket\n", + /*218*/ "Data Uplink\n", + /*219*/ "President Scanner\n", + /*220*/ "AutoSurgeon\n", + /*221*/ "Skedar Bomb\n", + /*222*/ "Comms Rider\n", + /*223*/ "Tracer Bug\n", + /*224*/ "Target Amplifier\n", + /*225*/ "Flight Plans\n", + /*226*/ "Research Tape\n", + /*227*/ "Backup Disk\n", + /*228*/ "Key Card\n", + /*229*/ "Briefcase\n", + /*230*/ "Necklace\n", + /*231*/ "PresidentScan\n", + /*232*/ "Boost\n", + /*233*/ "XRayScan\n", + /*234*/ "HorizonScan\n", + /*235*/ "Target Amp\n", + /*236*/ "In this version of the CamSpy the recording device has been replaced by a highly powerful plastic explosive.\n", + /*237*/ "This version of the CamSpy uses a paralysing nerve toxin to induce near-instant catatonia in targets.\n", + /*238*/ "Cassandra De Vries' necklace. Fitted with a proximity key tag to allow access to restricted areas. Mk3 model only functions while owner is alive. Security class AA-1 (gamma).", + /*239*/ "Cassandra De Vries' replacement necklace. Username: %s Password: %s\n", + /*240*/ "Shield\n", + /*241*/ "The shield protects the user by detecting an attack and momentarily generating a concentrated forcefield to repel the attack. The shield has a limited reservoir of energy, so it can only protect the user to a certain extent. Shields are usually activated whenever the user is carrying them, although this particular shield appears to be a non-functional, near-complete prototype.\n", + /*242*/ "Combat Boosts\n", + /*243*/ "Data Uplink\n", + /*244*/ "Night Vision\n", + /*245*/ "Door Decoder\n", + /*246*/ "Suicide Pill\n", + /*247*/ "Tranquilizer\n", + /*248*/ "AutoSurgeon\n", + /*249*/ "Backup Disk\n", + /*250*/ "Disguise\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Remote Mine\n", + /*253*/ "Shotgun\n", + /*254*/ "Sniper Rifle\n", + /*255*/ "Timed Mine\n", +}; diff --git a/src/files/lang/pal-final/gun_str_f.c b/src/files/lang/pal-final/gun_str_f.c new file mode 100644 index 000000000..bfb4e0300 --- /dev/null +++ b/src/files/lang/pal-final/gun_str_f.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Frags", + /* 2*/ "Mort(e) 1 fois\n", + /* 3*/ "Mort(e)", + /* 4*/ "fois", + /* 5*/ "Suicides", + /* 6*/ "Mains nues\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (scope)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop Gun\n", + /* 25*/ "Fusil pompe\n", + /* 26*/ "Reaper\n", + /* 27*/ "L-roquettes\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Grenade maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Fusil sniper\n", + /* 33*/ "Arbalète\n", + /* 34*/ "Tranquil.\n", + /* 35*/ "Couteau combat\n", + /* 36*/ "Grenade\n", + /* 37*/ "Bombe-N\n", + /* 38*/ "Mine retard.\n", + /* 39*/ "Mine prox.\n", + /* 40*/ "Mine télécom.\n", + /* 41*/ "Mine CME\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Costume\n", + /* 44*/ "Roquette\n", + /* 45*/ "Tête cherch.\n", + /* 46*/ "Munit. grenade\n", + /* 47*/ "Laser\n", + /* 48*/ "Carreau\n", + /* 49*/ "Psychosis Gun\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Spécial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Vue nocturne\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Décodeur\n", + /* 64*/ "Explosifs\n", + /* 65*/ "Scanner X\n", + /* 66*/ "Medkit\n", + /* 67*/ "Mallette\n", + /* 68*/ "Costume\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Pisteur R\n", + /* 71*/ "Mallette\n", + /* 72*/ "Pilule suicide\n", + /* 73*/ "Occulteur\n", + /* 74*/ "Boost combat\n", + /* 75*/ "Récepteur\n", + /* 76*/ "Scanner Horizon\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L-roquettes\n", + /* 81*/ "Mine prox.\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Couteau\n", + /* 84*/ "DY357\n", + /* 85*/ "Tir simple\n", + /* 86*/ "Tir rapide\n", + /* 87*/ "Tir explosif\n", + /* 88*/ "Etripage\n", + /* 89*/ "Tir simple\n", + /* 90*/ "Effet Rail-gun\n", + /* 91*/ "Roquette\n", + /* 92*/ "Roquette ciblée\n", + /* 93*/ "Radioguidage\n", + /* 94*/ "Coup de crosse\n", + /* 95*/ "Balles explosives\n", + /* 96*/ "Tirs guidés\n", + /* 97*/ "Vider chargeur\n", + /* 98*/ "Lance-grenades\n", + /* 99*/ "Attache-mur\n", + /*100*/ "Coup de poing\n", + /*101*/ "Désarmer\n", + /*102*/ "Verr. cible\n", + /*103*/ "Utiliser Scope\n", + /*104*/ "Moitié chargeur\n", + /*105*/ "Double tir\n", + /*106*/ "Hachoir\n", + /*107*/ "Endormir\n", + /*108*/ "Injection mortelle\n", + /*109*/ "Coup de couteau\n", + /*110*/ "Lancer empoisonné\n", + /*111*/ "Localisateur cible\n", + /*112*/ "Mort instantanée\n", + /*113*/ "Boost\n", + /*114*/ "Retour\n", + /*115*/ "Perce-blindage\n", + /*116*/ "Occulter\n", + /*117*/ "Déployer sentinelle\n", + /*118*/ "Autodestruct. prox.\n", + /*119*/ "Détecteur danger\n", + /*120*/ "Explosif retard.\n", + /*121*/ "Explosif prox.\n", + /*122*/ "Explosif télécom.\n", + /*123*/ "Détonation\n", + /*124*/ "Fusible 4 secs\n", + /*125*/ "Pinball prox.\n", + /*126*/ "Détonation retard.\n", + /*127*/ "Détonation prox.\n", + /*128*/ "Tir 3 balles\n", + /*129*/ "Tir chargé\n", + /*130*/ "S'accroupir\n", + /*131*/ "Infecter\n", + /*132*/ "Impulsion\n", + /*133*/ "Courte portée\n", + /*134*/ "Détonation impact\n", + /*135*/ "Ampli lumière\n", + /*136*/ "Caméra mobile\n", + /*137*/ "Vision rayons X\n", + /*138*/ "Image thermique\n", + /*139*/ "Zoom\n", + /*140*/ "App. brouillage\n", + /*141*/ "Connecter\n", + /*142*/ "Identifier cibles\n", + /*143*/ "Porter costume\n", + /*144*/ "Placer explosifs\n", + /*145*/ "Vue télescopique\n", + /*146*/ "Silencieux\n", + /*147*/ "Rallonge chargeur\n", + /*148*/ "Vue laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Même sans arme, vous demeurez une menace pour vos ennemis. Vos poings peuvent assommer ou désarmer un ennemi pour lui voler son arme.\n", + /*156*/ "Précis et fiable, c'est l'arme de base des opérations de l'Institut. La visée laser sert à localiser les tirs. Utiliser aussi la crosse pour assommer les ennemis.\n", + /*157*/ "Un Falcon 2 amélioré, bénéficiant d'un silencieux très utile.\n", + /*158*/ "Un Falcon 2 amélioré, bénéficiant d'un scope d'agrandissement x2 pour profiter d'une grande précision.\n", + /*159*/ "Un pistolet de l'armée dernier cri utilisé par les forces de l'ordre. Il possède un léger zoom et lance trois balles en mode de tir secondaire.\n", + /*160*/ "C'est l'arme de prédilection de tout Skedar qui se respecte. Un grand chargeur et un canon rayé font de ce pistolet une arme de poing formidable, surtout grâce à son tir secondaire: charger le tir pour plus de puissance en utilisant plusieurs munitions.\n", + /*161*/ "Le dataDyne DY357 est la plus puissante des armes de poing. Ses balles possèdent un facteur de pénétration élevé et repoussent la cible de leur poids et leur puissance. Des modèles customisés sont fabriqués pour des clients importants. On raconte que Trent Easton, le directeur de la NSA en possède un plaqué or.\n", + /*162*/ "Le DY357-LX a été conçu à la demande du directeur de la NSA, Trent Easton. En plus de posséder une crosse en peau de tigre, ce pistolet d'or possède un canon rayé et utilise des balles à haute vélocité. C'est une arme meurtrière.\n", + /*163*/ "L'arme standard Maian. Elle peut au choix tirer des balles normales ou des balles explosives, sans modifier la consommation de munitions.\n", + /*164*/ "Un classique de la dataDyne très répandu. Cette arme automatique tire des rafales de calibre 32 et possède une capacité spéciale: verrouiller une cible. Elle fait du profane un tireur d'élite. Cadence de tir moyenne: 900 cpm.\n", + /*165*/ "Le fusil d'assaut principal de l'Institut Carrington. Une portée et un grand chargeur font de cette arme un excellent choix. Le tir secondaire permet de se déplacer tout en ciblant un ennemi. Cadence de tir moyenne: 750 cpm.\n", + /*166*/ "Un fusil d'assaut standard avec un côté vicieux: lorsque le mode secondaire est activé, il devient une mine de proximité aux apparences d'un fusil. Cadence de tir moyenne: 700 cpm.\n", + /*167*/ "Une variante du fusil d'assaut Dragon: plutôt qu'un explosif de proximité, il possède un mini lance-grenades. Une arme excellente. Cadence de tir moyenne: 700 cpm.\n", + /*168*/ "Une autre arme high-tech de la dataDyne. Un fusil d'assaut possédant un chargeur plus petit et un impact puissant, qui peut détecter les explosifs, les armes sentinelles et autres pièges du même ordre. Cadence de tir moyenne: 950 cpm.\n", + /*169*/ "Conçu pour les gardes du corps, le Cyclone a été choisi par le service de sécurité du Président grâce à son efficacité en matière de répression. En cas d'urgence, il peut doubler sa cadence de tir, vidant son chargeur en moins d'une seconde. Cadence de tir moyenne: 900 cpm. Se vide à 2000 cpm.\n", + /*170*/ "L'arme secrète de l'Institut Carrington. Elle tire à une cadence phénoménale et contient énormément de munitions. Le mode secondaire est un occulteur qui consomme les munitions. Une arme dévastatrice. Cadence de tir moyenne: 1100 cpm.\n", + /*171*/ "Un autre exemple du génie maian. Il peut tirer des balles normales aussi vite qu'un autre pistolet-mitrailleur, ou tirer des projectiles rapides pénétrant facilement les obstacles vous séparant d'une cible. Seul désavantage du mode secondaire: la cadence de tir est plus lente et la précision est diminuée par la puissance du coup. Cadence de tir moyenne: 900 cpm (tir sec. 300 cpm).\n", + /*172*/ "Un PC portable qui peut tirer une fois transformé en mitrailleuse. Il peut être utilisé comme PC mais un contrôle minutieux révélera la supercherie. Cadence de tir moyenne: 1000 cpm.\n", + /*173*/ "Une arme de la dataDyne fabriquée par les services de sécurité. Un chargeur de 9 balles est couplé à un mode de tir simple ou double, faisant de cette arme un atout en combat rapproché.\n", + /*174*/ "Conçu pour être manié par un utilisateur plus fort qu'un humain. Sa cadence de tir ultra rapide en fait une véritable machine à déchiqueter, très efficace dans les couloirs. \nCadence de tir maximum: 1800 cpm.\n", + /*175*/ "Une arme encombrante. Elle tire soit une roquette normale soit un missile plus lent mais à tête chercheuse, pouvant verrouiller un ennemi.\n", + /*176*/ "Un lance-grenades de longue portée fabriqué par la dataDyne. Le tir secondaire recouvre les grenades d'une substance collante. Une fois projetée, la bombe se fixe sur un mur ou un plafond. Après quelques secondes, elle se détache et tombe au sol pour exploser.\n", + /*177*/ "Les Skedars aiment inspirer la terreur chez leurs ennemis. Il est donc naturel pour eux de disposer d'une roquette commandée à distance comme tir secondaire de leur lance-roquettes. Ils ont ainsi le plaisir de voir leur proie tenter de s'enfuir devant un projectile mortel.\n", + /*178*/ "Le fusil FarSight est un appareil maian combinant un scanner rayons X et un lance-projectiles traversant les éléments solides. Le traceur peut repérer et verrouiller une forme de vie mais ne peut compenser les déplacements rapides d'un ennemi en pleine course.\n", + /*179*/ "Bénéficiant d'un puissant zoom et de balles haute vélocité, cette arme de l'Institut Carrington est l'un des meilleurs fusils de sniper. S'accroupir permet une meilleure précision.\n", + /*180*/ "Cette arbalète est une arme de courte portée montée sur le poignet de l'agent de l'Institut Carrington. Elle se plie pour mieux se dissimuler et peut tirer jusqu'à 5 carreaux anesthésiants ou mortels.\n", + /*181*/ "Un appareil à tir rapide utilisé en cas d'urgence mais plus souvent en seringue hypodermique pour injecter un sédatif. Les utilisateurs sont informés qu'une dose trop importante peut entraîner la mort.\n", + /*182*/ "Un très long couteau de combat. Il contient un réservoir de poison se brisant à l'impact et tuant la cible en moins de 6 secondes. Une arme signée dataDyne.\n", + /*183*/ "Une version améliorée de la grenade. Elle peut être utilisée avec un détonateur de 4 secondes ou en tant que bombe à effet de ricochet.\n", + /*184*/ "Une bombe à neutrons à faible zone d'effet. Elle peut se déclencher à l'impact ou être réglée en mode de proximité.\n", + /*185*/ "Une mine dotée d'un détonateur de courte durée. Elle possède un détecteur et évaluateur à activer en mode secondaire.\n", + /*186*/ "Une mine dotée d'un détonateur de proximité. Elle possède un détecteur de menace activé en mode secondaire.\n", + /*187*/ "Une mine à déclencher à distance. La commande d'activation est la fonction secondaire.\n", + /*188*/ "Un appareil électronique de brouillage, capable d'engendrer une panne électrique sur n'importe quel système sur lequel il est fixé.\n", + /*189*/ "Un laser de poignet meurtrier et ultra précis. Il peut lancer des impulsions de longue distance ou maintenir un flux continu et concentré à courte distance.\n", + /*190*/ "Une drogue de combat chimique. Une fois absorbée, elle permet des réactions plus rapides.\n", + /*191*/ "Le dernier de la ligne de scopes 'starlight' amplifiant la lumière ambiante pour une image plus claire des environs. Cet appareil utilise un algorithme de mouvement pour identifier les menaces possibles.\n", + /*192*/ "Cet appareil utilise la meilleure des applications en matière d'anti-gravité. Il possède un lien audio/vidéo avec une fonction d'enregistrement et d'holographie spectroscopique.\n", + /*193*/ "Un scope de courte portée pouvant voir à travers toute matière - même le plomb - et produisant une représentation chromatique simplifiée des environs.\n", + /*194*/ "Ce scope utilise un scanner infrarouge modulé par ultrason pour donner une image claire des environs et la position des irrégularités de structure. Il peut aussi localiser les ennemis occultés ou utilisant un appareil de brouillage optique.\n", + /*195*/ "Il utilise les capacités d'un cristal extraterrestre pour créer une champs de réfraction de la lumière autour de l'utilisateur. Il ne peut fonctionner si une turbulence cinétique pénètre dans le champ. Ouvrir le feu annule les effets du champ.\n", + /*196*/ "Un scanner optique binoculaire de longue portée. Le viseur affiche une image composite de deux sources d'entrée. Il possède aussi un zoom.\n", + /*197*/ "Il peut enregistrer n'importe quelles données et les envoyer au service informatique de l'Institut. Une variante de cet appareil permet aux pirates d'établir un lien direct entre eux et le terminal connecté.\n", + /*198*/ "Un pisteur puissant à paramétrer sur les humains, les armes, les objets, ou encore les emplacements géographiques.\n", + /*199*/ "Un scanner médical modifié contenant les dernières données de l'état de santé du Président ainsi qu'un résumé de tous les traitements administrés. Il peut monitorer les fonctions vitales du Président à distance même s'il se trouve au milieu d'une foule.\n", + /*200*/ "Un passe-partout électronique. Il ouvre les serrures codées en quelques secondes mais un système très élaboré lui prendra plus de temps.\n", + /*201*/ "Une merveille médicale maian pouvant effectuer un diagnostique automatique et une intervention chirurgicale sans aucune incision. Un seul défaut: il ne reconnaît et donc ne fonctionne que sur des organismes maians.\n", + /*202*/ "Une petite charge de plastique explosive couplée à une horloge scellée et impossible à désamorcer, le tout revêtu de shrapnel en téflon.\n", + /*203*/ "Une bombe à fusion directionnelle à placer de telle façon que la charge est pointée vers le bas. Ceci interrompra les recherches des labos de la dataDyne et fera s'effondrer l'immeuble tout entier.\n", + /*204*/ "Un petit mouchard à fixer sur tout relais de communication qui permet d'imiter le signal officiel, établissant ainsi le lien entre l'Institut et l'agent même dans une zone de brouillage. Il fait partie intégrante du système de communication local ciblé.\n", + /*205*/ "Le fonctionnement de ce mouchard spécial est tenu secret. Le mécanisme d'auto-destruction couvre la majeure partie de l'appareil. Il est très probable qu'il soit un exemple de communication moléculaire quantique, ceci expliquant son efficacité.\n", + /*206*/ "Il utilise la technologie de communication quantique pour fournir des informations ultra précises à l'armement en orbite, ceci minimisant les risques de dommages collatéraux. La même technologie est utilisée pour les mouchards pisteurs de l'Institut Carrington.\n", + /*207*/ "Ils détaillent les points de navigation et les codes de communication ainsi que les codes et fréquences de l'Air Force One. Les codes de cryptage y sont aussi donnés.\n", + /*208*/ "Toutes les données se rattachant aux recherches océaniques conduites par la dataDyne sur le navire détourné Pelagic II y figurent. Il contient le relevé sonar, les données géologiques, les données sur les artefacts extraterrestres, les échantillons de coque, etc.\n", + /*209*/ "Le dernier enregistrement en date de la personnalité de l'IA Dr. Caroll avant conditionnement cérébral. A utiliser pour étude seulement ou projections théoriques. Mental corrompu et dangereux. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un mélange chimique altérant la perception de la cible. Le bien devient le mal, les méchants les gentils, les ennemis et les amis s'intervertissent. Un des nombreux projets du Secteur 51 signé Trent Easton.\n", + /*211*/ "Un uniforme différent du vôtre. Portez-le et jouez la comédie.\n", + /*212*/ "PROX.\n", + /*213*/ "RETARD.\n", + /*214*/ "TELECOM.\n", + /*215*/ "SENTINELLE\n", + /*216*/ "IMPACT\n", + /*217*/ "Méga Roquette\n", + /*218*/ "Récepteur\n", + /*219*/ "Scan Prés.\n", + /*220*/ "Autochirur.\n", + /*221*/ "Bombe skedar\n", + /*222*/ "DérouteComms\n", + /*223*/ "Pisteur\n", + /*224*/ "Ampli cible\n", + /*225*/ "Plans de vol\n", + /*226*/ "Cassette\n", + /*227*/ "Disque sauv.\n", + /*228*/ "Carte\n", + /*229*/ "Mallette\n", + /*230*/ "Collier\n", + /*231*/ "ScanPresident\n", + /*232*/ "Boost\n", + /*233*/ "Scan X\n", + /*234*/ "ScanHorizon\n", + /*235*/ "Ampli cible\n", + /*236*/ "Dans cette variante de la Camspy, le module d'enregistrement a été remplacé par du plastic hautement explosif.\n", + /*237*/ "Cette variante de la Camspy utilise une toxine neuro-active qui provoque un coma presque instantané chez la victime.\n", + /*238*/ "Collier de Cassandra De Vries. Pourvu d'une clé-émetteur ouvrant les portes à courte portée, qui permet l'accès aux zones non-autorisées. Le modèle Mk3 ne fonctionne que si son propriétaire est en vie. Niveau de sécurité AA-1 (gamma).", + /*239*/ "Collier de remplacement de Cassandra De Vries'. Nom d'utilisateur: %s Mot de passe: %s\n", + /*240*/ "Bouclier\n", + /*241*/ "Le bouclier protège son utilisateur en détectant les attaques et en générant momentanément un champ de force concentré pour repousser l'attaque. Le bouclier possède une quantité d'énergie limitée. Il ne protège pas l'utilisateur indéfiniment. Les boucliers sont généralement activés lorsqu'ils sont portés, bien que celui-ci soit un prototype inachevé.\n", + /*242*/ "Boosts combat\n", + /*243*/ "Récepteur\n", + /*244*/ "Vue nocturne\n", + /*245*/ "Décodeur\n", + /*246*/ "Pilule\n", + /*247*/ "Tranquil.\n", + /*248*/ "Autochirur.\n", + /*249*/ "Disque sauv.\n", + /*250*/ "Costume\n", + /*251*/ "Laptop Gun\n", + /*252*/ "Mine télécom.\n", + /*253*/ "Fusil pompe\n", + /*254*/ "Fusil sniper\n", + /*255*/ "Mine retard.\n", +}; diff --git a/src/files/lang/pal-final/gun_str_g.c b/src/files/lang/pal-final/gun_str_g.c new file mode 100644 index 000000000..2f6ebf9fe --- /dev/null +++ b/src/files/lang/pal-final/gun_str_g.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Hits", + /* 2*/ "Ein Fehlversuch\n", + /* 3*/ "Versagt", + /* 4*/ "Fehlversuche", + /* 5*/ "Selber schuld!", + /* 6*/ "unbewaffnet\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (Schalld.)\n", + /* 9*/ "Falcon 2 (Zielf.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Avenger\n", + /* 20*/ "Cyclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Laptop-Gewehr\n", + /* 25*/ "Schrotflinte\n", + /* 26*/ "Reaper\n", + /* 27*/ "Raketenwerfer\n", + /* 28*/ "Devastator\n", + /* 29*/ "Slayer\n", + /* 30*/ "Maianische Granate\n", + /* 31*/ "FS XR-20\n", + /* 32*/ "Sniper-Gewehr\n", + /* 33*/ "Armbrust\n", + /* 34*/ "Betäubungs-Gewehr\n", + /* 35*/ "Kampfmesser\n", + /* 36*/ "Granate\n", + /* 37*/ "N-Bombe\n", + /* 38*/ "Zeitzünder-Mine\n", + /* 39*/ "Annäherungs-Mine\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "ECM-Mine\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Verkleidung\n", + /* 44*/ "Rakete\n", + /* 45*/ "Zielsuch-Rakete\n", + /* 46*/ "Granaten\n", + /* 47*/ "Laser\n", + /* 48*/ "Bolzen\n", + /* 49*/ "Psychosis-Gewehr\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KLO1313\n", + /* 53*/ "KF7 Spezial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Test\n", + /* 59*/ "Nachtsicht-Gerät\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Tür-Decoder\n", + /* 64*/ "Sprengsatz\n", + /* 65*/ "Röntgen-Scanner\n", + /* 66*/ "extraterrestrisches Medipack\n", + /* 67*/ "Koffer\n", + /* 68*/ "Verkleidung\n", + /* 69*/ "IR-Scanner\n", + /* 70*/ "R-Tracker\n", + /* 71*/ "Aktenkoffer\n", + /* 72*/ "Suizid-Kapsel\n", + /* 73*/ "Tarnkappe\n", + /* 74*/ "Adrenalin\n", + /* 75*/ "Data Uplink\n", + /* 76*/ "Horizont-Scanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "FS XR-20\n", + /* 80*/ "R-Werfer\n", + /* 81*/ "A-Mine\n", + /* 82*/ "Psychosis\n", + /* 83*/ "Messer\n", + /* 84*/ "DY357\n", + /* 85*/ "Einzelfeuer\n", + /* 86*/ "Schnellfeuer\n", + /* 87*/ "Feuerstoß\n", + /* 88*/ "Streufeuer\n", + /* 89*/ "Schrotflintenfeuer\n", + /* 90*/ "Rail-gun-Effekt\n", + /* 91*/ "Raketenabschuss\n", + /* 92*/ "kalibrierte Rakete\n", + /* 93*/ "Fly-By-Wire-Rakete\n", + /* 94*/ "Schlag \n", + /* 95*/ "Explosiv-Munition\n", + /* 96*/ "gezielte Schüsse\n", + /* 97*/ "Magazin-Entleerung\n", + /* 98*/ "Granat-Werfer\n", + /* 99*/ "Wandhaftung\n", + /*100*/ "Schlag\n", + /*101*/ "entwaffnen\n", + /*102*/ "Zielaufschaltung\n", + /*103*/ "Zielfernrohr kompatibel\n", + /*104*/ "halbes Magazin wird entleert\n", + /*105*/ "Doppelschuss\n", + /*106*/ "Schleifer\n", + /*107*/ "Sedativ\n", + /*108*/ "letale Injektion\n", + /*109*/ "Messerstich\n", + /*110*/ "vergiftetes Wurfmesser\n", + /*111*/ "Zielsucher\n", + /*112*/ "sofortige Eliminierung\n", + /*113*/ "Verstärkung\n", + /*114*/ "Umkehr\n", + /*115*/ "High Impact-Munition\n", + /*116*/ "Tarnung\n", + /*117*/ "Selbstschussanlage\n", + /*118*/ "Annäherungsfunktion\n", + /*119*/ "Gefahrenmelder\n", + /*120*/ "verzögerte Explosion\n", + /*121*/ "Expl. bei Näherung\n", + /*122*/ "ferngez. Explosion\n", + /*123*/ "Detonator\n", + /*124*/ "Vier-Sekunden-Zündung\n", + /*125*/ "Annäherungs-Pinball\n", + /*126*/ "Verzögerte Detonation\n", + /*127*/ "Expl. bei Näherung\n", + /*128*/ "dreifacher Schuss\n", + /*129*/ "aufgeladener Schuss\n", + /*130*/ "Hocken\n", + /*131*/ "infizieren\n", + /*132*/ "Feuerstöße\n", + /*133*/ "Kurzstrecken-Strahl\n", + /*134*/ "Kontakt-Detonation\n", + /*135*/ "Restlichtverstärker\n", + /*136*/ "Mobile Kamera\n", + /*137*/ "Röntgen-Sicht\n", + /*138*/ "Infrarot-Scanning\n", + /*139*/ "Zoom\n", + /*140*/ "Störsender\n", + /*141*/ "Verbindung\n", + /*142*/ "Zielidentifizierung\n", + /*143*/ "Kann angelegt werden\n", + /*144*/ "Sprengsätze müssen platziert werden\n", + /*145*/ "Teleskop-Sicht\n", + /*146*/ "Schalldämpfer\n", + /*147*/ "Magazin-Erweiterung\n", + /*148*/ "Ziel-Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maianisch\n", + /*154*/ "JonesCorp\n", + /*155*/ "Auch ohne Waffen sind Sie ein würdiger Gegner. Setzen Sie Ihre Fäuste ein, um Gegner niederzuschlagen oder zu entwaffnen. Anschließend können Sie deren Waffen aufsammeln.\n", + /*156*/ "Diese zielgenaue und treffsichere Waffe wird von den Mitarbeitern des Instituts bevorzugt eingesetzt. Verwenden Sie die Laser-Zieleinheit, um Schüsse punktgenau zu platzieren. Im Gefecht empfiehlt es sich, von der Pistolen-Funktion Gebrauch zu machen.\n", + /*157*/ "Eine verbesserte Falcon 2, die noch zusätzlich über einen Schalldämpfer verfügt.\n", + /*158*/ "Eine verbesserte Falcon 2, die durch ein Präzisions-Fernrohr noch zusätzlich an Genauigkeit gewinnt.\n", + /*159*/ "Eine state-of-the-art Militär-Pistole, die hauptsächlich von Friedenstruppen eingesetzt wird. Die Waffe verfügt über eine leichte Zoom-Funktion und feuert drei Kugeln gleichzeitig ab (Sekundär).\n", + /*160*/ "Wenn Sie auf einen Skedar treffen, ist er vermutlich mit dieser Waffe ausgestattet. Ein großes Magazin macht diese Pistole zu einer formidablen Handfeuerwaffe. Aber die Sekundär-Funktion ist noch bemerkenswerter. Die Feuerkraft kann durch Aufladen verstärkt werden, kostet aber Munition.\n", + /*161*/ "Die dataDyne DY357 ist die stärkste Handfeuerwaffe der Welt. Jede Kugel verfügt über einen hohen Penetrations-Faktor und schleudert das Ziel zurück. Modifizierte Modelle werden nur für spezielle Kunden angefertigt. NSA-Chef Trent Easton verfügt angeblich über eine vergoldete Variante.\n", + /*162*/ "Die DY357-LX wurde speziell für Trent Easton angefertigt. Neben einem mit Tigerleder überzogenen Griff verfügt diese Pistole über einen integrierten Beschleuniger, der jeder Kugel noch mehr Kraft verleiht.\n", + /*163*/ "Die Maianische Standard-Waffe. Eine flexible Waffe, die in der Lage ist, sowohl normale als auch Explosiv-Geschosse abzufeuern. Bei letzterer Variante wird nicht mehr Munition als sonst verbraucht.\n", + /*164*/ "Ein dataDyne-Klassiker und Bestseller! Dieses Maschinengewehr verfügt über ein 32er Magazin und eine Sonderfunktion. Jedes sichtbare Ziel kann fixiert werden. Dieses Feature macht jeden durchschnittlichen Schützen zu einem Profi. Vorausgesetzt natürlich, er oder sie ist intelligent genug, die Waffe zu bedienen. Durchschnittliche Feuerrate: 900 rpm.\n", + /*165*/ "Das Sturmgewehr des Carrington Instituts. Diese Waffe zeichnet sich durch hohe Reichweite und Magazin-Kapazität aus. Die Sekundär-Funktion ermöglicht es dem Schützen, sich zu bewegen, während er auf ein Ziel zoomt. Durchschnittliche Feuerrate: 750 rpm.\n", + /*166*/ "Ein Standard-Gewehr mit Überraschungseffekt. Die Sekundär-Funktion verwandelt es in eine Mine, die auf Bewegungen reagiert, aber nach wie vor wie ein herumliegendes Gewehr aussieht. Durchschnittliche Feuerrate: 700 rpm.\n", + /*167*/ "Eine Variante des Dragon. Anstatt der Minen-Funktion verfügt die Waffe über einen kleinen Granat-Werfer. Hervorragend als Unterstützung. Durchschnittliche Feuerrate: 700 rpm.\n", + /*168*/ "High-tech pur von dataDyne. Der Avenger wird als Sturmgewehr eingesetzt. Die wichtigste Funktion ist ein Gefahren-Melder, der auf die Anwesenheit von Sprengkörpern, Selbstschußanlagen und Ähnlichem reagiert. Durchschnittliche Feuerrate: 950 rpm.\n", + /*169*/ "Speziell für Bodyguards. Die Cyclone wird auch von der Leibwache des Präsidenten eingesetzt. In Extremsituationen kann die Feuerrate um mehr als das Doppelte erhöht werden. Allerdings wird durch diese Aktion das Magazin in sekundenschnelle geleert. Durchschnittliche Feuerrate: 900 rpm bzw. 2000 rpm.\n", + /*170*/ "Die geheime Waffe des Carrington Instituts. Verfügt über eine hohe Feuerrate und ein großes Magazin. Die Sekundär-Funktion aktiviert eine Tarnfunktion, allerdings auf Kosten der Munition. Daher sollte diese Funktion mit größter Vorsicht gehandhabt werden. Durchschnittliche Feuerrate: 1100 rpm.\n", + /*171*/ "Ein weiteres Beispiel Maianischer Waffentechnik. Diese Waffe feuert normale Munition mit der gleichen Geschwindigkeit ab, wie jedes andere Gewehr. Es sind aber auch Hochgeschwindigkeits-Schüsse möglich, die Deckungen durchbrechen können. Der Nachteil dabei ist, dass die Feuerrate sinkt und aufgrund des Rückstoßes die Genauigkeit leidet. Durchschnittliche Feuerrate: 900 rpm bzw. 300 rpm.\n", + /*172*/ "Ein Maschinengewehr, das in der Form eines Laptops designt wurde. In Tarnform kann nicht gefeuert werden. Diese Waffe hält auch einer genaueren Untersuchung stand. Sie wird wie jeder PC gebootet, verfügt aber nur über ein Viertel des Speichers. Durschnittliche Feuerrate: 1000 rpm.\n", + /*173*/ "Eine dataDyne-Waffe für die hausinterne Security. Ein neunfaches Magazin in Kombination mit Einfach- oder Doppelfeuer macht diese Waffe zu einem gefährlichen Nahkampf-Instrument.\n", + /*174*/ "In den Händen von jemandem, der den starken Rückstoß ausgleichen kann, ist dies wohl die schrecklichste aller Waffen. Auf jeden Fall eignet sie sich hervorragend für Gefechte in engen Korridoren. Maximale Feuerrate: 1800 rpm.\n", + /*175*/ "An und für sich eine sehr unhandliche Waffe. Sie feuert eine Standard-Rakete oder eine langsamere Zielsuch-Rakete auf das Ziel ab.\n", + /*176*/ "Ein von dataDyne entworfener Granatwerfer. Die Sekundärfunktion umhüllt die Granate mit einer klebrigen Substanz, welche die Haftung an Wänden und Decken ermöglicht. Einige Sekunden später fällt die Granate zu Boden, wo sie detoniert.\n", + /*177*/ "Die Skedar lieben es, die Angst in den Augen ihrer Gegner zu sehen. Daher ist es beinahe selbstverständlich, dass sie mit der Sekundär-Funktion ihres Raketenwerfers ein Geschoss fernsteuern können. So können sie sich an den vergeblichen Fluchtversuchen ihrer Opfer weiden.\n", + /*178*/ "Das Fernsicht-Gewehr ist ein Maianischer Hybrid zwischen einem Röntgen-Scanner und einem Gewehr, das durch feste Objekte schießen kann. Das Fernrohr ist in der Lage, langsame lebende Objekte zu erfassen und als festgelegten Zielpunkt zu speichern.\n", + /*179*/ "Ausgestattet mit hervorragender Zoom-Fähigkeit und Hochgeschwindigkeits-Kugeln ist dies wohl eines der besten Sniper-Gewehre aller Zeiten. In geduckter Haltung erzielen Sie die bestmögliche Genauigkeit.\n", + /*180*/ "Die Armbrust ist nicht größer als eine Pistole, und wird am Handgelenk des Agenten befestigt. Die Spannweite der Waffe kann aus Gründen der Geheimhaltung verringert werden. Die Munition umfasst bis zu fünf entweder vergiftete oder regelrecht letale Bolzen.\n", + /*181*/ "Eine Vorrichtung, die im Notfall auch als Waffe benutzt werden kann. Der eigentliche Verwendungszweck dient aber der Verabreichung von Sedativen. Eine volle Entladung des Reservoirs kann durchaus fatale Folgen haben.\n", + /*182*/ "Ein sehr großes Kampfmesser. Es enthält eine Giftkapsel, die beim Aufprall nach einem Wurf zerbricht. Das Gift entfaltet im Normalfall nach ca. sechs Sekunden seine Wirkung. Eine typische dataDyne-Waffe.\n", + /*183*/ "Eine verbesserte Version der Granate. Kann sowohl mit verzögerter Detonation als auch mit Annäherungs-Sensor eingesetzt werden. \n", + /*184*/ "Eine kleine Neutronenbombe mit reduziertem Wirkungsradius. Die Detonation kann, je nach Wunsch, beim Aufprall oder bei Annäherung erfolgen.\n", + /*185*/ "Eine Mine mit verzögerter Detonation. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*186*/ "Eine Mine, die auf Bewegung reagiert. Diese Waffe verfügt über einen Gefahren-Sensor, der als Sekundär-Funktion aktiviert werden kann.\n", + /*187*/ "Diese Mine kann ferngezündet werden. Die Sekundär-Funktion stellt quasi die Aktivierung dar.\n", + /*188*/ "Diese Störsender-Vorrichtung ist in der Lage, in jedem System, mit dem sie verbunden ist, eine fokusierte elektrische Störung zu simulieren. Voraussetzung ist ein unmittelbarer Kontakt mit dem System.\n", + /*189*/ "Der Laser wird am Handgelenk getragen und verfügt über perfekte Präzision. Man kann mit ihm entweder Langstrecken-Energiestöße oder einen konstanten, hochkonzentrierten Kurstrecken-Energiestrom entladen.\n", + /*190*/ "Genetische Stimulation für die Anwendung im Kampf. Nach der Anwendung erscheint der zeitliche Ablauf verlangsamt, was eine wesentlich höhere Reaktionsfähigkeit zur Folge hat.\n", + /*191*/ "Das neueste Produkt in einer Reihe von Geräten, das nicht nur Restlicht verstärkt, um eine klarere Wahrnehmung der Umgebung zu ermöglichen, sondern auch mit Hilfe eines Ziel-Algorithmus mögliche Gefahren erkennt und entsprechend hervorhebt.\n", + /*192*/ "Dieses Gerät beinhaltet die kleinstmögliche Antigravitations-Technologie. Als ultimative Spionage-Einheit bietet der CamSpy Video- und Audio-Links, Aufzeichnungsfunktion und eine integrierte Vorrichtung für spektroskopische Holografie.\n", + /*193*/ "Dieser Scanner kann auf kurze Strecken jegliches Material durchleuchten. Blei bildet hier keine Ausnahme! Der Anwender nimmt eine vereinfachte, chromatisierte Darstellung der Umgebung wahr.\n", + /*194*/ "Der IR-Scanner setzt mit Ultraschall modulierte Infrarot-Strahlung ein, um die Umgebung auf strukturelle Irregularitäten zu untersuchen. Der Anwender erhält ein erstaunlich detailliertes Bild der Gegebenheiten. Außerdem durchdringt der Scanner auch jegliche Art von Tarnkappen-Technologie und andere optische Täuschungen.\n", + /*195*/ "Diese Maschine nutzt die lichtbrechenden Eigenschaften einer kristallinen extraterrestrischen Substanz, um den Träger unsichtbar erscheinen zu lassen. Solange es zu keinen kybernetischen Störungen kommt, bleibt das Feld intakt. Aber schon der Einsatz einer Waffe unterbricht diese Funktion.\n", + /*196*/ "Ein binokularer Langstrecken-Scanner. Im Sichtfenster erscheint ein Bild, welches aus den beiden optischen Eingaben zusammengestellt wird. Zoom vorhanden.\n", + /*197*/ "Mit Hilfe dieses Geräts können nahezu alle Arten von gespeicherten Daten abgerufen und direkt an die Hacker des Instituts gesandt werden. Eine Variante dieser Maschine erlaubt den Hackern durch einen direkten Link den Zutritt zum lokalen System.\n", + /*198*/ "Ein ausgezeichnetes Suchgerät, das auf jegliche Parameter konfiguriert werden kann: Personen, Waffen, Gegenstände und Orte sind nur ein Bruchteil der Optionen, welche der Tracker anbietet.\n", + /*199*/ "Ein modifizierter medizinischer Scanner, der die aktuellen Vital-Werte des Präsidenten anzeigt. Es werden auch ältere Daten und verschiedene Behandlungen archiviert. Der Scanner ist in der Lage, die entsprechenden Werte auch über größere Entfernungen zu erfassen. Dies ist auch möglich, wenn sich das Ziel inmitten einer Menschenmenge befindet.\n", + /*200*/ "Ein einfacher, aber wirkungsvoller Safeknacker, der elektronisch codierte Schlösser normalerweise innerhalb von Sekunden knackt. Selbstverständlich hängt dies auch vom jeweiligen Schloss ab.\n", + /*201*/ "Ein Wunder Maianischer Technologie. Dieses Instrument erstellt eine automatische Diagnose und führt die entsprechenden chirurgischen Eingriffe OHNE Einschnitte durch. Der Nachteil ist, dass es nur bei Maianern funktioniert.\n", + /*202*/ "Ein kleiner Plastik-Sprengsatz, dessen Timer durch ein Siegel vor Missbrauch geschützt wird. Die Schrapnelle sind mit Teflon ummantelt. Sehr böse!\n", + /*203*/ "Hierbei handelt es sich um eine direktionale Fusionsbombe, die so platziert wird, dass die Entladung nach unten geht. Dadurch werden die dataDyne-Labors verwüstet, und der Rest des Gebäudes stürzt in das so entstandene Loch.\n", + /*204*/ "Eine kleine Wanze, die an jedem Kommunikations-Gerät angebracht werden kann. Diese Vorrichtung benutzt das Fremdsignal, um eine Verbindung zwischen dem Agenten und dem Institut herzustellen. Das Signal kann auch zurückverfolgt werden, um den Standort des Agenten zu bestimmen. Vor allem in Situationen höchster Bedrängnis hat sich der Einsatz hervorragend bewährt. Ein unverzichtbares Zubehör für jeden Agenten.\n", + /*205*/ "Das Innenleben dieser Wanze ist ein gut gehütetes Geheimnis. Fest steht, dass der Selbstzerstörungsmechanismus ein wichtiger Bestandteil ist. Man vermutet, das die Wanze auf quantenmolekularer Kommunikation aufbaut, welche die phänomenale Verlässlichkeit des Geräts erklären würde.\n", + /*206*/ "Quantenmolekulare Technologie ermöglicht außerordentlich akkurate Zielerfassung für Orbitalwaffen. Dadurch wird der Schadensradius auf den nötigen Umfang beschränkt. \n", + /*207*/ "Detaillierte Flugpläne, Kommunikationscodes und Frequenzen für die Air Force One. Beinhaltet auch Dechiffrier-Codes.\n", + /*208*/ "Betrifft alle Daten der Forschungsarbeit, die durch dataDyne von der gekaperten Pelagic II am Meeresgrund durchgeführt wurden. Der Inhalt besteht aus Sonar-Karten, geologischen Daten, Gewebeproben etc.\n", + /*209*/ "Die letzte Aufzeichnung der Persönlichkeit der künstlichen Intelligenz, die sich selbst Dr. Caroll nennt. Die Aufzeichnung wurde vor der Löschung und cerebralen Restrukturierung durchgeführt. Kann zu Studienzwecken herangezogen worden. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Ein chemischer Cocktail, der die Realitätswahrnehmung der Zielperson umkehrt. Gut wird zu Böse, Böse wird zu gut, Freund und Feind tauschen die Plätze. Ein weiteres Forschungsergebnis, entwickelt von Trent Easton in der Area 51.\n", + /*211*/ "Tragen Sie diese Verkleidung, um unerkannt zu bleiben.\n", + /*212*/ "BEWEG\n", + /*213*/ "ZEIT\n", + /*214*/ "FERN\n", + /*215*/ "AUTO\n", + /*216*/ "SCHLAG\n", + /*217*/ "Big King-Rakete\n", + /*218*/ "Data Uplink\n", + /*219*/ "Präsidenten-Scanner\n", + /*220*/ "Auto-Chirurg\n", + /*221*/ "Skedar-Bombe\n", + /*222*/ "Komm-Wanze\n", + /*223*/ "Wanze\n", + /*224*/ "Peilgerät\n", + /*225*/ "Flugpläne\n", + /*226*/ "Forschungsdaten\n", + /*227*/ "Sicherungsdiskette\n", + /*228*/ "Schlüsselkarte\n", + /*229*/ "Aktentasche\n", + /*230*/ "Halskette\n", + /*231*/ "PräsidentScan\n", + /*232*/ "Adrenalin\n", + /*233*/ "R-Scanner\n", + /*234*/ "H-Scanner\n", + /*235*/ "Ziel-Verst.\n", + /*236*/ "Bei dieser Version des CamSpy wurde die Aufzeichnungs-Funktion durch einen starken Plastik-Sprengsatz ersetzt.\n", + /*237*/ "Diese Version des CamSpy verfügt über ein paralysierendes Nervengift, das die Zielperson fast augenblicklich in Katatonie versetzt.\n", + /*238*/ "Cassandra De Vries Halskette. Beinhaltet eine Annäherungs-Schlüsselkarte, um Sperrzonen betreten zu können. Das MK3 Modell funktioniert nur, solange der Besitzer am Leben ist. Sicherheitsklasse AA-1 (gamma).", + /*239*/ "Cassandra De Vries Ersatzhalskette. Benuzername: %s Passwort: %s\n", + /*240*/ "Schild\n", + /*241*/ "Der Schild schützt den Träger, indem er automatisch Gefahren erkennt und ein temporäres Kraftfeld errichtet. Dadurch wird die Attacke neutralisiert. Der Schild verfügt über einen begrenzten Energievorrat. Die Schutzfunktion kann also nur über eine bestimmte Zeitspanne gewährleistet werden. Im Normalfall werden Schilde aktiv, sobald sie von jemandem getragen werden, auch wenn es so aussieht, als wäre dieser spezielle Schild ein nicht-funktionabler Prototyp.\n", + /*242*/ "Adrenalin\n", + /*243*/ "Data Uplink\n", + /*244*/ "Nachtsicht\n", + /*245*/ "Decoder\n", + /*246*/ "Suizid-Pille\n", + /*247*/ "B-Gewehr\n", + /*248*/ "Medipack\n", + /*249*/ "Backup\n", + /*250*/ "Verkl.\n", + /*251*/ "Laptop\n", + /*252*/ "F-Mine\n", + /*253*/ "Schrotfl.\n", + /*254*/ "Sniper\n", + /*255*/ "Z-Mine\n", +}; diff --git a/src/files/lang/pal-final/gun_str_i.c b/src/files/lang/pal-final/gun_str_i.c new file mode 100644 index 000000000..19c595862 --- /dev/null +++ b/src/files/lang/pal-final/gun_str_i.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Vittime", + /* 2*/ "Morto una volta\n", + /* 3*/ "Morto", + /* 4*/ "volte", + /* 5*/ "Suicidi", + /* 6*/ "A mani nude\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenz.)\n", + /* 9*/ "Falcon 2 (cannoc.)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragon\n", + /* 18*/ "SuperDragon\n", + /* 19*/ "K7 Vendetta\n", + /* 20*/ "Ciclone\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Callisto NTG\n", + /* 24*/ "Pistola Laptop\n", + /* 25*/ "Fucile a pompa\n", + /* 26*/ "Falciatore\n", + /* 27*/ "Lanciamissili\n", + /* 28*/ "Devastatore\n", + /* 29*/ "Killer\n", + /* 30*/ "Granata Maian\n", + /* 31*/ "TeleVista XR-20\n", + /* 32*/ "Fucile cecchino\n", + /* 33*/ "Balestra\n", + /* 34*/ "Sedativo\n", + /* 35*/ "Pugnale da lotta\n", + /* 36*/ "Granata\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina orologeria\n", + /* 39*/ "Mina prossimità\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Travestimento\n", + /* 44*/ "Missile\n", + /* 45*/ "Missile ritorno\n", + /* 46*/ "Granata a giro\n", + /* 47*/ "Laser\n", + /* 48*/ "Dardo\n", + /* 49*/ "PsicoArma\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Special\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Tester\n", + /* 59*/ "Vista Notturna\n", + /* 60*/ "TeleSpia\n", + /* 61*/ "CapsuSpia\n", + /* 62*/ "BombaSpia\n", + /* 63*/ "Decodificatore\n", + /* 64*/ "Esplosivo\n", + /* 65*/ "Scanner a raggi X\n", + /* 66*/ "AutoChirurgo alieno\n", + /* 67*/ "Valigia\n", + /* 68*/ "Travestimento\n", + /* 69*/ "Scanner IR\n", + /* 70*/ "Puntatore-R\n", + /* 71*/ "Cartella\n", + /* 72*/ "Compressa suicidio\n", + /* 73*/ "Dispos. mimetico\n", + /* 74*/ "Booster lotta\n", + /* 75*/ "Connettore Dati\n", + /* 76*/ "TeleScanner\n", + /* 77*/ "Falcon 2 (s)\n", + /* 78*/ "Falcon 2 (+)\n", + /* 79*/ "TeleVista\n", + /* 80*/ "Lanciamissili\n", + /* 81*/ "Mina pross\n", + /* 82*/ "PsicoArma\n", + /* 83*/ "Pugnale\n", + /* 84*/ "DY357\n", + /* 85*/ "Colpo singolo\n", + /* 86*/ "Fuoco rapido\n", + /* 87*/ "Fuoco a raffica\n", + /* 88*/ "Falciata\n", + /* 89*/ "Fuoco a scoppio\n", + /* 90*/ "Effetto rail-gun\n", + /* 91*/ "Lancio missili\n", + /* 92*/ "Missile guidato\n", + /* 93*/ "Missile filoguidato\n", + /* 94*/ "Botta col calcio\n", + /* 95*/ "Capsule esplosive\n", + /* 96*/ "Spari guidati\n", + /* 97*/ "Scarica del caricatore\n", + /* 98*/ "Lanciagranate\n", + /* 99*/ "Arpione\n", + /*100*/ "Pugno\n", + /*101*/ "Disarma\n", + /*102*/ "Segui l'obiettivo\n", + /*103*/ "Usa cannocchiale\n", + /*104*/ "Mezza scarica caricatore\n", + /*105*/ "Doppio scoppio\n", + /*106*/ "Macinatore\n", + /*107*/ "Sedativo\n", + /*108*/ "Iniezione letale\n", + /*109*/ "Pugnalata\n", + /*110*/ "Lancia lama avvelenata\n", + /*111*/ "Localizza-Obiettivo\n", + /*112*/ "Morte istantanea\n", + /*113*/ "Booster\n", + /*114*/ "Invertitore\n", + /*115*/ "Capsule a impatto\n", + /*116*/ "Mimesi\n", + /*117*/ "Pistola sentinella\n", + /*118*/ "Autodistr. di pross.\n", + /*119*/ "Rilevatore minaccia\n", + /*120*/ "Esplosivo a orol.\n", + /*121*/ "Esplosivo di pross.\n", + /*122*/ "Esplosivo a distanza\n", + /*123*/ "Detonazione\n", + /*124*/ "Miccia a 4 secondi\n", + /*125*/ "Ping-pong di pross.\n", + /*126*/ "Detonazione a orol.\n", + /*127*/ "Detonazione di pross.\n", + /*128*/ "Triplice esplosione\n", + /*129*/ "Sparo a ricarica\n", + /*130*/ "Accucciarsi\n", + /*131*/ "Infettare\n", + /*132*/ "Fuoco a impulsi\n", + /*133*/ "Laser a breve raggio\n", + /*134*/ "Detonazione a impatto\n", + /*135*/ "Illuminatore\n", + /*136*/ "Telecamera mobile\n", + /*137*/ "Vista a raggi X\n", + /*138*/ "Immagine termica\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo disturbo\n", + /*141*/ "Connetti\n", + /*142*/ "Identifica obiettivi\n", + /*143*/ "Travestiti\n", + /*144*/ "Piazza esplosivo\n", + /*145*/ "Vista telescopica\n", + /*146*/ "Silenziatore\n", + /*147*/ "Estensione caricatore\n", + /*148*/ "Vista Laser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Chesluk Industries\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Anche disarmato sei ancora un temibile avversario. Usa il pugno per mandare KO o per disarmare i tuoi avversari e raccogli le loro armi.\n", + /*156*/ "Precisa e affidabile, questa è l'arma comunemente usata nelle operazioni dell'istituto. Usa la vista laser per sparare pallottole letali o colpisci i nemici con il calcio della pistola.\n", + /*157*/ "Una Falcon 2 potenziata, dotata di silenziatore e comunque letale.\n", + /*158*/ "Una Falcon 2 potenziata, dotata di cannocchiale a due ingrandimenti per il massimo della precisione.\n", + /*159*/ "Una pistola militare all'avanguardia comunemente usata dalle forze di pace. È dotata di zoom e di modalità secondaria di sparo a triplice esplosione.\n", + /*160*/ "Di solito queste armi sono tipiche degli Skedar. Il capiente caricatore e la canna affilata rendono questa pistola un'arma formidabile, sebbene il colpo letale sia dovuto alla sua funzione secondaria: ricaricala per maggiore potenza a costo di qualche giro di munizioni.\n", + /*161*/ "La DY357 dataDyne è la pistola più potente che esista. Ogni colpo ha un impressionante fattore di penetrazione e colpisce l'obiettivo con tutto il peso e la potenza dello sparo. Se ne producono modelli personalizzati su commissione. Pare che Trent Easton ne abbia una placcata d'oro.\n", + /*162*/ "La DY357-LX è stata creata per il direttore della NSA, Trent Easton. Oltre al calcio ricoperto in pelle di tigre, quest'arma dorata vanta anche una canna speciale che conferisce al proiettile incredibile velocità e forza.\n", + /*163*/ "È la dotazione Maian standard: una pistola versatile per colpi normali o esplosivi senza ripercussioni sul resto del caricatore.\n", + /*164*/ "Questo classico prodotto dataDyne è il fucile mitragliatore più venduto: vanta un caricatore a 32 colpi e la speciale caratteristica di identificare e mirare sul bersaglio nell'intero campo visivo. Trasforma un tiratore scelto medio in uno eccellente, sempre che sia in grado di manovrare l'arma. Velocità media di fuoco: 900 giri/min.\n", + /*165*/ "Il principale fucile d'assalto del Carrington Institute, dotato di gittata e caricatore ottimi. La modalità secondaria permette a chi lo usa di spostarsi mentre zooma sul bersaglio. Velocità media di fuoco: 750 giri/min.\n", + /*166*/ "Un fucile d'assalto standard con un'innovazione micidiale: nella modalità secondaria diventa una mina di prossimità molto simile ad una pistola. Velocità media di fuoco: 700 giri/min.\n", + /*167*/ "Una variante del fucile d'assalto Dragon: invece dell'esplosivo di prossimità è dotato un piccolo lanciagranate. Eccellente arma d'appoggio. Velocità media di fuoco: 700 giri/min.\n", + /*168*/ "Altro esempio di alta tecnologia della dataDyne. Solitamente un fucile d'assalto con un caricatore ridotto e perforazione potente, dotato di rilevatore di minaccia per identificare esplosivi, pistole a muro e altro.Velocità media di fuoco: 950 giri/min.\n", + /*169*/ "Progettata per le guardie del corpo, la Ciclone è stata adottata dalle Forze di Sicurezza del Presidente per gli eccezionali risultati in caso di soppressione. In estreme circostanze, la velocità di fuoco può essere raddoppiata, scaricando il caricatore in un secondo. Velocità media di fuoco: 900 giri/min. Scarica a 2000 giri/min.\n", + /*170*/ "L'arma segreta del Carrington Institute. Velocità di fuoco fenomenale e straordinaria capacità del caricatore. La modalità secondaria è una funzione nascosta che esaurisce le munizioni nel caricatore. Un'arma distruttiva. Velocità media di fuoco: 1100 giri/min.\n", + /*171*/ "Un altro eccellente esempio di arma Maian. Può sparare colpi ordinari alla velocità degli altri fucili mitragliatori, ma anche scariche ad alta velocità in grado di perforare oggetti e trovare obiettivi nascosti. Gli unici svantaggi della modalità secondaria sono la ridotta velocità di fuoco e la mancanza di precisione a causa della potenza dello sparo. Velocità media di fuoco: 900 giri/min. (m/s:300 giri/min.).\n", + /*172*/ "Un fucile mitragliatore dalle sembianze di un computer portatile. Quando è chiuso, non può sparare, ma attivandolo assume la sua forma micidiale. Se ispezionato a fondo può essere scoperto: il PC si avvia, ma la sua memoria è solo un quarto del normale.Velocità media di fuoco: 1000 giri/min.\n", + /*173*/ "Un'arma dataDyne realizzata per le forze di sicurezza. Il caricatore a nove cartucce assieme alla modalità di sparo semplice o doppia ne fanno un'arma pericolosa a distanze ravvicinate.\n", + /*174*/ "Un'arma terrificante se nelle mani di qualcuno abbastanza robusto da resistere al forte contraccolpo; altrimenti molto difficile da controllare ma comunque capace di aprire utili corridoi. Velocità massima di fuoco: 1800 giri/min.\n", + /*175*/ "Un'arma ingombrante capace di sparare un missile standard o uno più lento che rientra alla base dopo aver seguito lo sfortunato obiettivo.\n", + /*176*/ "Un sistema a lunga gittata per il lancio di granate realizzato dalla dataDyne. La modalità secondaria ricopre gli ordigni di una sostanza collosa: quando viene sparata, la granata si attacca alle pareti e ai soffitti. Dopo pochi secondi si stacca e cade a terra, esplodendo.\n", + /*177*/ "Gli Skedar godono nel vedere i nemici tremare di terrore. È dunque ovvio che sul loro lanciamissili standard abbiano un missile telecomandato nella modalità secondaria, in modo che possano divertirsi guardando la preda che cerca inutilmente di scappare al proiettile che si avvicina.\n", + /*178*/ "Il fucile TeleVista è un'arma Maian risultante dall'unione di un sistema di scansione a raggi X e un fucile capace di perforare oggetti solidi. Il dispositivo può puntare e seguire le forme di vita, sebbene non raggiunga la stessa velocità del nemico in corsa.\n", + /*179*/ "Grazie al potente zoom e alla pallottola ad elevata velocità, quest'arma del Carrington Institute è uno dei migliori fucili cecchino mai prodotti. Accucciandosi si ottiene la massima precisione.\n", + /*180*/ "Questa balestra è un esempio di 'pistola' di piccole dimensioni, portata al polso di un agente del Carrington Institute. Si può ripiegare per nasconderla e può sparare fino a cinque colpi dall'effetto narcotico o letale.\n", + /*181*/ "Un dispositivo per attacchi serrati che in casi di emergenza può essere usato anche come arma benché progettato come spray dermico per la somministrazione di sedativi. È bene ricordare che scaricare l'intero serbatoio può avere conseguenze fatali.\n", + /*182*/ "Un pugnale da combattimento dalle grandi dimensioni contenente una fiala di veleno che si frantuma al lancio, eliminando la vittima in sei secondi al massimo. Una tipica arma dataDyne.\n", + /*183*/ "Una versione aggiornata della tradizionale granata. Può essere lanciata con una miccia a quattro secondi o usata quale bomba di prossimità.\n", + /*184*/ "Una bomba a mano al neutrone dal raggio d'azione limitato. Può essere fatta esplodere al momento dell'impatto o con esplosione di prossimità.\n", + /*185*/ "Una mina con miccia a breve tempo. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*186*/ "Una mina con miccia di prossimità. Dotata di sensore di rilevamento e valutazione di minaccia attivabile quale modalità secondaria.\n", + /*187*/ "Una mina da fare esplodere a distanza. Il comando di attivazione è la sua modalità secondaria.\n", + /*188*/ "Un dispositivo di disturbo intenzionale di alta precisione, capace di simulare un comune guasto elettrico nel sistema a cui è applicato.\n", + /*189*/ "Il laser viene portato al polso ed è estremamente preciso. Può emettere impulsi a lunga gittata o un fascio di energia costante e concentrata per breve gittata.\n", + /*190*/ "Stimolanti genetici realizzati per il combattimento. Quando vengono somministrati, sembrano rallentare lo scorrere del tempo per consentire una finestra di reazione.\n", + /*191*/ "La versione più recente di una serie di sonde a 'luce lunare' che migliora l'illuminazione per produrre un'immagine più chiara dell'ambiente circostante. Utilizza un algoritmo basato sullo spostamento dell'obiettivo per rilevare le possibili minacce.\n", + /*192*/ "Pur utilizzando la minima applicazione della tecnologia antigravitazionale, questo è il più avanzato dispositivo di spionaggio. Dotato di collegamento audio/video con funzione di registrazione e strumentazione di bordo per l'olografia spettroscopica.\n", + /*193*/ "Una sonda a breve raggio d'azione capace di vedere attraverso ogni materiale, persino il piombo, che produce una raffigurazione cromatica semplificata dell'ambiente.\n", + /*194*/ "Questa sonda utilizza la tecnica di scansione a raggi rossi modulati con dati ultrasonici per fornire un'immagine più chiara dell'area circostante e identificare qualsiasi irregolarità strutturale. Inoltre può localizzare i nemici grazie alla tecnologia di mimetizzazione o altre illusioni ottiche.\n", + /*195*/ "Utilizza le qualità di distorsione della luce di un cristallo alieno per creare un campo di riflesso attorno a chi lo indossa. Funziona solo se i disturbi cinetici entro il campo delimitato sono ridotti: basta sparare con una pistola per ristabilire la piena visibilità.\n", + /*196*/ "Un dispositivo di scansione visiva binoculare a lungo raggio. Viene mostrata un'immagine composita delle due fonti visive. Dotato di zoom.\n", + /*197*/ "Capace di eseguire l'interrogazione a distanza dei dati memorizzati, rispediti direttamente agli hacker dei computer dell'istituto. Una variante di questo dispositivo fornisce agli hacker un collegamento diretto al sistema locale.\n", + /*198*/ "Un potente sistema in grado di puntare qualsiasi cosa sia impostata nei parametri: persone, armi, oggetti e luoghi sono solo alcune delle innumerevoli possibilità.\n", + /*199*/ "Un apparecchio di scansione medica modificato che contiene i record più aggiornati relativo allo stato di salute del Presidente, l'anamnesi e le terapie precedenti. È in grado di rilevare a distanza le funzioni vitali del Presidente, anche quando questi è in mezzo alla folla.\n", + /*200*/ "Un puro e semplice scassinatore di casseforti. Apre le chiusure a codice elettronico generalmente in pochi secondi, sebbene la velocità vari da serratura a serratura.\n", + /*201*/ "Meraviglia della medicina Maian, capace di effettuare autodiagnosi e operazioni chirurgiche senza dover incidere. Uno svantaggio è che funziona solo sui Maian; l'altro è la mancanza di assistenza postoperatoria.\n", + /*202*/ "Una piccola carica di esplosivo al plastico, completa di temporizzatore sigillato a prova di manomissione e schegge rivestite di teflon. Molto pericoloso.\n", + /*203*/ "Come noto, si tratta di una bomba direzionale a fusione da piazzare in modo che la carica sia diretta verso il basso e possa sventrare i laboratori di ricerca della dataDyne. L'intero edificio sarà inghiottito dalla voragine. \n", + /*204*/ "Una piccola cimice applicata al sistema di comunicazione. Trasporta il segnale ufficiale, permettendo il mantenimento del collegamento tra l'istituto e l'agente grazie a intense contromisure locali; è parte integrante del sistema di comunicazione per la localizzazione dell'obiettivo.\n", + /*205*/ "Il funzionamento interno di questa cimice è di estrema segretezza: il meccanismo di autodistruzione costituisce gran parte del dispositivo. Si dice che sia un esempio di comunicazione quantica molecolare, che spiega la fenomenale affidabilità del dispositivo usato sul campo.\n", + /*206*/ "Usa la tecnologia di comunicazione quantica per fornire informazioni accurate sugli obiettivi delle armi orbitanti, minimizzando così i danni collaterali. La stessa tecnologia è usata dalle cimici del Carrington Institute.\n", + /*207*/ "Dettagli della traiettoria di volo e dei codici di comunicazione e frequenze per l'Air Force One: anche la chiave attuale di decodifica.\n", + /*208*/ "Tutti i dati pertinenti alla ricerca sul fondo oceanico condotta da dataDyne sulle operazioni del vascello Pelagic II. I contenuti comprendono mappatura sonar, dati geologici, dati sui prodotti alieni, campioni da scafo, ecc.\n", + /*209*/ "L'ultima registrazione della personalità dell'intelligenza artificiale, autodefinita Dr. Caroll, prima della cancellazione della memoria e della ristrutturazione cerebrale. Uso per studi casistici e teorici. Moralmente incorrotto e dunque pericoloso. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Un cocktail chimico che distorce la realtà percepita dall'obiettivo. Il bene diventa male e viceversa; i nemici si confondono con gli amici. Un altro oscuro progetto di ricerca dell'Area 51 di Trent Easton.\n", + /*211*/ "Non è il tuo normale abbigliamento. Indossalo per camuffarti.\n", + /*212*/ "PROSSIM.\n", + /*213*/ "A OROLOG.\n", + /*214*/ "TELECOM.\n", + /*215*/ "AUTOMATIC\n", + /*216*/ "IMPATTO\n", + /*217*/ "Missile Big King\n", + /*218*/ "Connettore Dati\n", + /*219*/ "Scanner Presidente\n", + /*220*/ "AutoChirurgo\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Ponte Com.\n", + /*223*/ "Microspia\n", + /*224*/ "Bersaglio\n", + /*225*/ "Piani Volo\n", + /*226*/ "Nastro Ricerca\n", + /*227*/ "Disco Backup\n", + /*228*/ "Tessera Magnetica\n", + /*229*/ "Cartella\n", + /*230*/ "Collana\n", + /*231*/ "ScannerPres\n", + /*232*/ "Booster\n", + /*233*/ "Scanner-X\n", + /*234*/ "Telescanner\n", + /*235*/ "AmplObiett\n", + /*236*/ "In questa versione della TeleSpia il dispositivo di registrazione è stato sostituito da un potente esplosivo plastico.\n", + /*237*/ "Questa versione della TeleSpia utilizza una tossina paralizzante del sistema nervoso per provocare una catatonia quasi istantanea.\n", + /*238*/ "La collana di Cassandra De Vries. Dotata di una chiave magnetica per accedere ad aree riservate. Il modello Mk3 funziona solo se Cassandra è ancora viva. Classe di sicurezza AA-1 (gamma).", + /*239*/ "Collana sostitutiva di Cassandra De Vries. Utente: %s Password: %s\n", + /*240*/ "Scudo\n", + /*241*/ "Lo scudo protegge chi lo usa riconoscendo l'attacco e creando temporaneamente un campo magnetico concentrato per respingerlo. È dotato di riserva energetica limitata, quindi può proteggere solo fino ad un certo punto. Normalmente gli scudi sono sempre attivi, sebbene questo scudo in particolare sembri un prototipo non funzionale semifinito.\n", + /*242*/ "Booster lotta\n", + /*243*/ "C. Dati\n", + /*244*/ "Vista Nott.\n", + /*245*/ "Decodif.\n", + /*246*/ "Compressa suicidio\n", + /*247*/ "Sedativo\n", + /*248*/ "AutoChirurgo\n", + /*249*/ "Disco Backup\n", + /*250*/ "Travest.\n", + /*251*/ "PistLaptop\n", + /*252*/ "Mina distanza\n", + /*253*/ "Fuc.Pompa\n", + /*254*/ "Fuc.Cecch.\n", + /*255*/ "Mina Orol.\n", +}; diff --git a/src/files/lang/pal-final/gun_str_s.c b/src/files/lang/pal-final/gun_str_s.c new file mode 100644 index 000000000..2c51157fa --- /dev/null +++ b/src/files/lang/pal-final/gun_str_s.c @@ -0,0 +1,260 @@ +#include + +char *lang[] = { + /* 0*/ "\n", + /* 1*/ "Cuenta de muertes", + /* 2*/ "Muerto una vez\n", + /* 3*/ "Muerto", + /* 4*/ "veces", + /* 5*/ "Cuenta de suicidios", + /* 6*/ "Desarmado\n", + /* 7*/ "Falcon 2\n", + /* 8*/ "Falcon 2 (silenc.)\n", + /* 9*/ "Falcon 2 (mirilla)\n", + /* 10*/ "MagSec 4\n", + /* 11*/ "Mauler\n", + /* 12*/ "DY357 Magnum\n", + /* 13*/ "DY357-LX\n", + /* 14*/ "Phoenix\n", + /* 15*/ "CMP150\n", + /* 16*/ "AR34\n", + /* 17*/ "Dragón\n", + /* 18*/ "SuperDragón\n", + /* 19*/ "Vengador K7\n", + /* 20*/ "Ciclón\n", + /* 21*/ "MagSec SMG\n", + /* 22*/ "RC-P120\n", + /* 23*/ "Calisto NTG\n", + /* 24*/ "Arma PC\n", + /* 25*/ "Escopeta\n", + /* 26*/ "Segadora\n", + /* 27*/ "Lanzacohetes\n", + /* 28*/ "Devastador\n", + /* 29*/ "Slayer\n", + /* 30*/ "Granada Maian\n", + /* 31*/ "FarSight XR-20\n", + /* 32*/ "Rifle Fr\n", + /* 33*/ "Ballesta\n", + /* 34*/ "Tranquilizador\n", + /* 35*/ "Cuchillo Combate\n", + /* 36*/ "Granada\n", + /* 37*/ "Bomba-N\n", + /* 38*/ "Mina Tiempo\n", + /* 39*/ "Mina de Proximidad\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Mina ECM\n", + /* 42*/ "FlashBang\n", + /* 43*/ "Disfraz\n", + /* 44*/ "Cohete\n", + /* 45*/ "Cohete Buscador\n", + /* 46*/ "Cinto de Granadas\n", + /* 47*/ "Láser\n", + /* 48*/ "Rayo\n", + /* 49*/ "Psicosis\n", + /* 50*/ "PP9i\n", + /* 51*/ "CC13\n", + /* 52*/ "KL01313\n", + /* 53*/ "KF7 Especial\n", + /* 54*/ "ZZT (9mm)\n", + /* 55*/ "DMC\n", + /* 56*/ "AR53\n", + /* 57*/ "RC-P45\n", + /* 58*/ "Testeador\n", + /* 59*/ "Visión Nocturna\n", + /* 60*/ "CamSpy\n", + /* 61*/ "DrugSpy\n", + /* 62*/ "BombSpy\n", + /* 63*/ "Decodificador\n", + /* 64*/ "Explosivos\n", + /* 65*/ "Escáner Rayos-X\n", + /* 66*/ "Paquete Médico\n", + /* 67*/ "Maleta\n", + /* 68*/ "Disfraz\n", + /* 69*/ "Escáner IR\n", + /* 70*/ "Rastreador-R\n", + /* 71*/ "Maletín\n", + /* 72*/ "Píldora Suicidio\n", + /* 73*/ "Disp. Ocultación\n", + /* 74*/ "Reforzador\n", + /* 75*/ "Conector de Datos\n", + /* 76*/ "Esc. Horizonte\n", + /* 77*/ "Falcon 2 (+)\n", + /* 78*/ "Falcon 2 (s)\n", + /* 79*/ "FarSight\n", + /* 80*/ "L.Cohetes\n", + /* 81*/ "Mina Prox.\n", + /* 82*/ "Psicosis\n", + /* 83*/ "Cuchillo\n", + /* 84*/ "DY357\n", + /* 85*/ "Disparo único\n", + /* 86*/ "Fuego rápido\n", + /* 87*/ "Fuego en ráfaga\n", + /* 88*/ "Cosechar\n", + /* 89*/ "Fuego de escopeta\n", + /* 90*/ "Efecto carrete\n", + /* 91*/ "Lanzacohetes\n", + /* 92*/ "Cohete Dirigido\n", + /* 93*/ "Cohete Teledirigido\n", + /* 94*/ "Culatazo\n", + /* 95*/ "Cartuchos Explosivos\n", + /* 96*/ "Disparos Guiados\n", + /* 97*/ "Descarga de Cartuchos\n", + /* 98*/ "Lanzagranadas\n", + /* 99*/ "Mina Lapa\n", + /*100*/ "Puñetazo\n", + /*101*/ "Desarmar\n", + /*102*/ "Seguir Objetivo\n", + /*103*/ "Usar Mirilla\n", + /*104*/ "Dispara Medio Cargador\n", + /*105*/ "Disparo Doble\n", + /*106*/ "Trituradora\n", + /*107*/ "Sedante\n", + /*108*/ "Inyección Letal\n", + /*109*/ "Cuchillada\n", + /*110*/ "Cuchillo Envenenado\n", + /*111*/ "Localizador Objetivos\n", + /*112*/ "Muerte Instantánea\n", + /*113*/ "Reforzador\n", + /*114*/ "Revertir\n", + /*115*/ "Cartuchos Alto-Impacto\n", + /*116*/ "Ocultación\n", + /*117*/ "Dejar como Centinela\n", + /*118*/ "Autodestrucción Prox.\n", + /*119*/ "Detector de Trampas\n", + /*120*/ "Explosivo de Tiempo\n", + /*121*/ "Explosivo de Proximidad\n", + /*122*/ "Explosivo Remoto\n", + /*123*/ "Detonación\n", + /*124*/ "Fusible 4 segundos\n", + /*125*/ "Pinball Proximidad\n", + /*126*/ "Detonación temporal\n", + /*127*/ "Detonación Proximidad\n", + /*128*/ "Ráfaga 3 Cartuchos\n", + /*129*/ "Disparo Cargado\n", + /*130*/ "Agacharse\n", + /*131*/ "Infectar\n", + /*132*/ "Disparo con Ritmo\n", + /*133*/ "Rayo Bajo-Alcance\n", + /*134*/ "Detonación por Impacto\n", + /*135*/ "Amplificador de Luz\n", + /*136*/ "Cámara Móvil\n", + /*137*/ "Visión de Rayos-X\n", + /*138*/ "Imagen Termal\n", + /*139*/ "Zoom\n", + /*140*/ "Dispositivo de Bloqueo\n", + /*141*/ "Conectar\n", + /*142*/ "Identificar Objetivos\n", + /*143*/ "Llevar Disfraz\n", + /*144*/ "Colocar Explosivos\n", + /*145*/ "Mira Telescópica\n", + /*146*/ "Silenciador\n", + /*147*/ "Extensión de Cartucho\n", + /*148*/ "Mira Láser\n", + /*149*/ "dataDyne\n", + /*150*/ "Carrington\n", + /*151*/ "Industrias Chesluk\n", + /*152*/ "Skedar\n", + /*153*/ "Maian\n", + /*154*/ "JonesCorp\n", + /*155*/ "Incluso desarmado, eres un adversario respetable. Usa tus puños para noquear a tus oponentes o desarmarles para usar sus armas contra ellos.\n", + /*156*/ "Precisa y digna de confianza, esta arma es el caballo de batalla de las operaciones del Instituto. Usa la mira láser para situar las balas con un efecto mortal, o golpea a los adversarios para noquearles.\n", + /*157*/ "Una Falcon 2 mejorada, con la ventaja añadida de que es silenciosa, pero mortal.\n", + /*158*/ "Una Falcon 2 mejorada, que cuenta con una mirilla duplicadora que te permite beneficiarte de la superior precisión de la Falcon.\n", + /*159*/ "Una pistola de tecnología militar punta, usada en gran parte por fuerzas de paz. Cuenta con una ligera capacidad de zoom, y tiene un modo secundario de disparo de ráfaga de tres cartuchos.\n", + /*160*/ "Si ves a un Skedar viniendo hacia ti, es más que posible que lleve una de éstas. Un amplio cargador y su cañón rayado hacen de esta pistola una formidable arma de mano, pero la descarga asesina viene del modo secundario: carga el disparo para fuerza extra al coste de unos cuantos cartuchos.\n", + /*161*/ "La DY357 de dataDyne es la más poderosa arma de mano del mundo. Cada cartucho tiene un factor de penetración increíble y noquea al objetivo con el peso y fuerza del disparo. Se han hecho modelos de encargo para clientes importantes; se rumorea que el director de ANS, Trent Easton, tiene una variante bañada en oro.\n", + /*162*/ "La DY357-LX fue diseñada especialmente para el director de la ANS, Trent Easton. Además de tener una atractiva empuñadura de genuina piel de tigre, este arma dorada incluye un cañón optimizado, lo que significa que cada bala siempre encuentra su objetivo con una fuerza mortífera.\n", + /*163*/ "El arma Maian estándar. Se trata de un arma flexible, una pistola que dispara proyectiles estándar o proyectiles explosivos sin que afecte a la capacidad del cargador.\n", + /*164*/ "Un clásico de dataDyne, y excelentemente vendida, esta metralleta cuenta con un cargador de 32 cartuchos y una característica especial: la habilidad de designar y fijar objetivos en la línea de fuego. Convierte a un tirador medio en uno excelente, siempre que sea inteligente para manejar el arma. Ratio de disparo normal: 900 dpm.\n", + /*165*/ "El principal rifle de asalto del Instituto Carrington. Su gran alcance y el tamaño de su cargador hacen de ella un arma muy útil; el modo secundario permite al usuario moverse mientras hace zoom sobre un adversario. Ratio de disparo normal: 750 dpm.\n", + /*166*/ "Un rifle de asalto estándar con un giro diabólico: cuando se activa el modo secundario, se convierte en una mina activada por proximidad que parece un arma. Ratio de disparo normal: 700 dpm.\n", + /*167*/ "Es una variante del rifle de asalto Dragón: en vez de un explosivo de proximidad, es un pequeño lanzagranadas. Es una excelente arma de apoyo. Ratio de disparo normal: 700 dpm.\n", + /*168*/ "Es otra pieza de alta tecnología de dataDyne. Ordinariamente es un rifle de asalto con un cargador más bien pequeño y una descarga poderosa, cuenta con un modo detector de trampas que muestra explosivos, armas de pared y peligros similares. Ratio de disparo normal: 950 dpm.\n", + /*169*/ "Diseñado para ser usado por guardaespaldas, el Ciclón ha sido adoptado por la Seguridad Presidencial debido a su excelente capacidad cuando es usado para 'suprimir'. En circunstancias extremas, puede más que doblar el ritmo de disparo, descargando el cargador completo en un segundo. Ratio de disparo normal: 900 dpm. Descarga a 2000 dpm.\n", + /*170*/ "El arma secreta del Instituto Carrington. Dispara a un ritmo fenomenal y cuenta con una capacidad de cargador gigantesca. El modo secundario es un dispositivo de ocultación que funciona con la munición del cargador. Es un arma devastadora. Ratio de disparo normal: 1100 dpm.\n", + /*171*/ "Se trata de otro ejemplo del excelente diseño de armas de fuego Maian. Puede disparar tiros estándar tan rápido como cualquier otro SMG, o puede disparar cartuchos de alta velocidad que pueden penetrar fácilmente en objetos para encontrar al objetivo al otro lado. La única desventaja con el modo de disparo secundario es que el ritmo de disparo es lento y la precisión sufre con la potencia del disparo. Ratio de disparo normal: 950 dpm., (f/s: 300 dpm).\n", + /*172*/ "Una ametralladora diseñada para parecer un PC portátil. Disimulada, el arma no puede disparar, pero una vez activada, se despliega. El Arma PC no permite inspecciones detalladas; puede arrancar, pero la memoria es un cuarto de lo que se supone que es. Ratio de disparo normal: 1000 dpm.\n", + /*173*/ "Es un arma de dataDyne fabricada para fuerzas de seguridad. Su cargador de nueve cartuchos combinado con modos de disparo simple o doble hacen que se trate de una peligrosa arma de cerca.\n", + /*174*/ "Es un arma realmente aterradora en manos de alguien lo suficientemente fuerte para controlar su gran retroceso; para el resto, un arma difícil de manejar pero efectiva para despejar pasillos. Ratio de disparo normal: 1800 dpm.\n", + /*175*/ "Es un arma incómoda. Dispara tanto un cohete estándar como un cohete más lento dirigido cuando se centra en el desafortunado objetivo.\n", + /*176*/ "Se trata de un sistema lanzador de granadas de largo alcance fabricado por dataDyne. El modo de disparo secundario recubre las granadas con una sustancia pegajosa; cuando se dispara la bomba, ésta se pega en las paredes o el techo. Tras unos cuantos segundos, se suelta para caer al suelo, donde detona.\n", + /*177*/ "Los Skedar disfrutan viendo a sus enemigos aterrorizados. Parece natural que cuenten con un cohete a control remoto como modo secundario de fuego en su lanzacohetes básico, así pueden tener el placer de sentir los vanos intentos de escapar de su presa del proyectil que se acerca.\n", + /*178*/ "El rifle FarSight es un híbrido Maian de un dispositivo de escáner de Rayos-X emparejado con un rifle que puede disparar a través de objetos. La mira puede centrarse en formas de vida, aunque el dispositivo no puede centrar tan rápido como se mueve el enemigo.\n", + /*179*/ "Con su poderoso zoom y sus balas de alta velocidad, este arma del Instituto Carrington es uno de los mejores rifles de francotirador jamás hechos. Agáchate para una mayor precisión.\n", + /*180*/ "Esta ballesta es un ejemplo de 'pistola' de corto alcance, montada en la muñeca de un agente del Instituto Carrington. Se pliega para ocultarla y puede disparar hasta cinco flechas, entre los más usuales tiros sedantes o los dardos mortales.\n", + /*181*/ "Es un dispositivo de fuego rápido, que puede ser usado como arma en un caso de emergencia, pero que está diseñado en principio como un inyector dérmico de sedantes. Los usuarios son advertidos que una descarga completa de la reserva de droga puede ser fatal.\n", + /*182*/ "Es una versión ampliada del cuchillo de combate. Contiene una ampolla de veneno que se hace añicos cuando se lanza, dando al enemigo unos seis segundos de vida. Un arma que sólo podía haber sido creada por dataDyne.\n", + /*183*/ "Es una versión mejorada de la fiel granada. Puede ser lanzada con un fusible de cuatro segundos, o ser usada como una bomba de proximidad que rebota.\n", + /*184*/ "Es una bomba de neutrones de mano que afecta a un área muy pequeña. Puede detonar por impacto o ser fijada en detonación por proximidad.\n", + /*185*/ "Es una mina con un corto fusible de tiempo. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*186*/ "Es una mina con un sensor de proximidad. Tiene un sensor de detección/evaluación que puede ser activado como modo secundario.\n", + /*187*/ "Es una mina que puede ser activada remotamente. El comando de activación es el modo secundario.\n", + /*188*/ "Se trata de un dispositivo de bloqueo de 'ruido-blanco', capaz de simular alguno de los fallos eléctricos más comunes en cualquier sistema donde sea directamente colocado.\n", + /*189*/ "El láser está montado en la muñeca y su precisión es mortal. Puede disparar 'pulsos' de larga distancia, o puede mantener una constante y concentrada corriente de energía en corto alcance.\n", + /*190*/ "Son estimulantes genéticos diseñados para aplicar en combate. Cuando son administrados, parecen frenar el paso del tiempo para abrir una 'ventana de reacción'.\n", + /*191*/ "Lo último en la línea de miras 'starlight' que mejoran la luz visible para producir una imagen clara del ambiente que la rodea. Usa un algoritmo de movimiento de objetivo para mostrar posibles trampas.\n", + /*192*/ "Usando la aplicación más pequeña de la tecnología anti-gravedad, esto es lo último en dispositivos para fisgar. Tiene una conexión de audio/vídeo con función de grabación y la posibilidad interna de holografiar espectroscópicamente.\n", + /*193*/ "Una mira de corto alcance que puede ver a través de algunos materiales, incluso el acero, produciendo una representación cromática simplificada del entorno.\n", + /*194*/ "Esta mira usa escaneo de infrarrojos modulados con datos ultrasónicos para ofrecer no sólo una imagen clara del área colindante, sino también la ubicación de irregularidades estructurales. También puede localizar enemigos que empleen tecnología de ocultación u otros desconciertos ópticos.\n", + /*195*/ "Usa las cualidades de 'salto de luz' de cristales alienígenas para crear un campo refractivo alrededor del portador. Funciona mientras sólo existan pequeñas perturbaciones kinéticas en el campo límite; el acto de disparar un arma es suficiente para causar que vuelva la visibilidad.\n", + /*196*/ "Es un escáner binocular de largo alcance. El visor muestra una imagen compuesta por las dos fuentes recibidas. También cuenta con función zoom.\n", + /*197*/ "Es capaz de consultar remotamente casi cualquier tipo de datos guardados, los cuales son directamente enviados a los 'hackers' del Instituto. Una variante de este dispositivo provee a los 'hackers' de conexión directa con los sistemas locales.\n", + /*198*/ "Es un poderoso sistema de rastreo que puede ser preparado para encajar con cualquier tipo de parámetros: gente, armas, objetos y lugares son algunas de las posibilidades.\n", + /*199*/ "Se trata de un escáner médico modificado que contiene la más moderna información acerca del estado de salud del Presidente y una biblioteca de pasadas condiciones y tratamientos. Puede detectar las funciones vitales del Presidente a gran distancia, incluso cuando el objetivo esté en medio de una multitud.\n", + /*200*/ "Abre cajas fuertes, simple y llanamente. Rompe cierres codificados electrónicamente, habitualmente en cuestión de segundos, aunque esto, por supuesto, depende de cada cerradura.\n", + /*201*/ "Esta maravilla médica Maian puede auto-diagnosticar y realizar operaciones quirúrgicas sin necesidad de cortes. Una desventaja es que sólo funciona en Maian; la otra desventaja es que no tiene habilidad en el trato a los pacientes.\n", + /*202*/ "Se trata de una pequeña carga de explosivo plástico, completada con un temporizador sellado, e incrustada dentro de una capa de teflón con metralla. Muy desagradable.\n", + /*203*/ "Como ya eres consciente, se trata de una bomba de fusión direccional, que se coloca para que la carga se dirija hacia abajo. Esto arrasará los laboratorios de investigación de dataDyne y causará que el resto del edificio se colapse y caiga al agujero.\n", + /*204*/ "Es un pequeño 'bicho' que se coloca en cualquier parte de un transmisor de comunicaciones. Se oculta en la señal oficial, permitiendo la conexión entre el Instituto y el agente aunque haya importantes contramedidas locales; para todas las posibilidades y propósitos, es parte de la localización de las comunicaciones de los objetivos.\n", + /*205*/ "El funcionamiento interno de este 'bicho' es alto secreto: gran parte del dispositivo pertenece al mecanismo de autodestrucción. Se especula que esto es un ejemplo de comunicación molecular cuántica, lo cual explica la fenomenal fiabilidad del dispositivo cuando se usa.\n", + /*206*/ "Usa tecnología de comunicación cuántica para proveer información precisa de los objetivos a las armas orbitales, ayudándolas a minimizar los daños colaterales. La misma tecnología es usada en los rastreadores del Instituto Carrington.\n", + /*207*/ "Son detalles de la trayectoria de vuelo y los códigos de comunicación y frecuencias del Air Force One: incluso las claves actuales de encriptación.\n", + /*208*/ "Todos los datos relacionados con la investigación en el fondo oceánico desarrollada por dataDyne con el navío de operaciones submarinas Pelagic II. El contenido incluye mapeados de sónar, datos geológicos, datos del artefacto alienígena, muestras del casco, etc.\n", + /*209*/ "Es la última grabación del estado de personalidad de la inteligencia artificial, que se llama a sí misma Dr. Caroll, antes de su lavado de cerebro y reestructura cerebral. Usada para el estudio del caso, contiene sólo proyecciones teóricas. Moralmente incorrupta, y por lo tanto peligrosa. dataDyne I.S.C.E.O. 23/6/23\n", + /*210*/ "Se trata de un cóctel químico que cambia la realidad que el objetivo percibe. Lo bueno es malo, lo malo es bueno; enemigos y amigos intercambian sus papeles. Se trata de otra de las investigaciones 'oscuras' del Área 51 de Trent Easton.\n", + /*211*/ "No es tu vestimenta habitual. Llévalo para pretender no ser tú.\n", + /*212*/ "PROX.\n", + /*213*/ "TIEMPO\n", + /*214*/ "REMOTO\n", + /*215*/ "AUTOARMA\n", + /*216*/ "IMPACTO\n", + /*217*/ "Cohete Big King\n", + /*218*/ "Conector de Datos\n", + /*219*/ "Esc. Presidencial\n", + /*220*/ "AutoCirujano\n", + /*221*/ "Bomba Skedar\n", + /*222*/ "Controlador\n", + /*223*/ "'Bicho' R.\n", + /*224*/ "Amplificador\n", + /*225*/ "Planes de Vuelo\n", + /*226*/ "Cinta Investigación\n", + /*227*/ "Copia de Seguridad\n", + /*228*/ "Llave Magnética\n", + /*229*/ "Maletín\n", + /*230*/ "Collar\n", + /*231*/ "Esc. Pres.\n", + /*232*/ "Reforzador\n", + /*233*/ "Esc. R-X\n", + /*234*/ "Esc. Horiz.\n", + /*235*/ "Amplific.\n", + /*236*/ "En este modelo de la Cámara Espía el dispositivo de grabación ha sido reemplazado por un poderoso explosivo plástico.\n", + /*237*/ "Este modelo de la Cámara Espía usa una toxina nerviosa paralizadora para que los blancos queden en estado catatónico.\n", + /*238*/ "Es el collar de Cassandra De Vries. Está equipado con una llave de proximidad que permite el acceso a áreas restringidas. El modelo Mk3 sólo funciona si el propietario está vivo. Clase de Seguridad AA-1 (gamma).", + /*239*/ "Collar de repuesto de Cassandra De Vries. Usuario: %s Clave: %s\n", + /*240*/ "Escudo\n", + /*241*/ "El escudo protege al usuario detectando un ataque y generando momentáneamente un campo de fuerza concentrado para repeler el ataque. El escudo tiene una reserva de energía limitada, así que sólo puede proteger al usuario hasta cierto punto. Los escudos suelen permanecer activos cuando el usuario los lleva, aunque este escudo en particular parece no ser funcional, como un prototipo no finalizado.\n", + /*242*/ "Reforzadores\n", + /*243*/ "C. Datos\n", + /*244*/ "V. Nocturna\n", + /*245*/ "Decodif.\n", + /*246*/ "P. Suicidio\n", + /*247*/ "Tranquiliz.\n", + /*248*/ "AutoCirujano\n", + /*249*/ "Disco S.\n", + /*250*/ "Disfraz\n", + /*251*/ "Arma PC\n", + /*252*/ "Mina Remota\n", + /*253*/ "Escopeta\n", + /*254*/ "Rifle Fr\n", + /*255*/ "Mina Tiempo\n", +}; diff --git a/src/files/lang/pal-final/impE.c b/src/files/lang/pal-final/impE.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-final/impE.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/impJ.c b/src/files/lang/pal-final/impJ.c new file mode 100644 index 000000000..ff4e583f5 --- /dev/null +++ b/src/files/lang/pal-final/impJ.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. They could use it to wreak havoc on our allies.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defences\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panel and activate them they will help thin the attackers out.\n\n|Objective Two: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organised response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Minimise Hostage Casualties\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs thoughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachinegun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research'.\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb somewhere in the building! It is unlikely to be a subtle device, so merely getting it out of the Institute won't help. It needs to be deactivated. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Automatic Defences\n", + /* 6*/ "Minimise Hostage Casualties\n", + /* 7*/ "Retrieve Experimental Weapon\n", + /* 8*/ "Destroy Sensitive Information\n", + /* 9*/ "Deactivate Bomb\n", + /* 10*/ "Obtain Sensitive Info\n", + /* 11*/ "Guards\n", + /* 12*/ "Sensitive Info\n", + /* 13*/ "Sensitive Info\n", + /* 14*/ "Picked up Sensitive Info.\n", + /* 15*/ "Automatic gun activated\n", + /* 16*/ "Too many hostages killed\n", + /* 17*/ "Hostages have been saved\n", + /* 18*/ "Sensitive information has been destroyed\n", + /* 19*/ "Carrington has been Killed\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line, hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office.. if they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access Denied - Authorization failiure.\n", + /* 31*/ "Emergency Overrides Have Been Engaged.\n", + /* 32*/ "Well done Joanna, we're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical Mission Object Has Been Destroyed\n", + /* 35*/ "The autodefences will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully.. the hostages are\ncounting on me.\n", + /* 38*/ "Well, at least I won't know if i'm doing\nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You Have Been Given A Grenade Launcher\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!", + /* 43*/ "But you know how it is, Joanna; I had to make sure my hair was just right, and then there was the suit...", + /* 44*/ "They should keep you away from mirrors. Nervous?", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House and it will finally happen...", + /* 46*/ "Where did that come from?", + /* 47*/ "It was up on ground level...", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!", + /* 49*/ "Get clear! I'll hold them off, you can come back and get me later!", + /* 50*/ "At least, I hope you can.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/impP.c b/src/files/lang/pal-final/impP.c new file mode 100644 index 000000000..5c5940fc4 --- /dev/null +++ b/src/files/lang/pal-final/impP.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Destroy Sensitive Information\n\nIn Daniel's office there is a safe in which is kept the algorithm he used to crack the Maian communication codes so many years ago. It must be destroyed before dataDyne or the Skedar get hold of it. Use the laser to cut a way through the door.\n\n|Objective Five: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Reactivate Automatic Defenses\n\nThere are automatic guns situated at strategic locations throughout the Carrington Institute. At present they are inactive, but if you can get to the control panels and activate them, they will help thin the attackers out.\n\n|Objective Two: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Three: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Four: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 3*/ "|Background - \n\nIn revenge for the foiling of their grand plan, the Skedar have attacked the source of their troubles, the Carrington Institute. With an organized response out of the question, it falls to Joanna to save what she can of the Institute from total destruction.\n\n|Carrington - \n\nThey've caught us completely off guard, Jo! Save who and what you can, then get out yourself. After all, the Institute is the people, not the building.\n\n|Objective One: - Release Hostages\n\nSome of the invading forces are holding key Institute staff hostage. Save as many of the hostages as you can. Look in the various labs throughout the upper floors of the building.\n\n|Objective Two: - Retrieve Experimental Weapon\n\nIn Foster's weapons lab there is a prototype submachine gun that we cannot let fall into enemy hands. This is because the weapon is capable of creating a temporary cloaking field. Find it and carry out some 'field research.'\n\n|Objective Three: - Deactivate Bomb\n\nOur sensors indicate there is a bomb in the Skedar craft on the landing pad! The only thing that can help you is the Data Uplink - get close to the ship, and use it to install a virus. The ship should then float clear of the Institute, and the bomb will detonate without harming anyone.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate automatic defenses\n", + /* 6*/ "Release hostages\n", + /* 7*/ "Retrieve experimental weapon\n", + /* 8*/ "Destroy sensitive information\n", + /* 9*/ "Deactivate bomb\n", + /* 10*/ "Obtain sensitive info.\n", + /* 11*/ "Guard's\n", + /* 12*/ "Sensitive info\n", + /* 13*/ "Sensitive info\n", + /* 14*/ "Picked up sensitive info.\n", + /* 15*/ "Automatic gun activated.\n", + /* 16*/ "Too many hostages killed.\n", + /* 17*/ "Hostages have been saved.\n", + /* 18*/ "Sensitive information has been destroyed.\n", + /* 19*/ "Carrington has been killed.\n", + /* 20*/ "Joanna - we're under attack.\n", + /* 21*/ "Get the guns back on line - hurry.\n", + /* 22*/ "The Skedar have taken hostages.\n", + /* 23*/ "Get up to the offices and save them.\n", + /* 24*/ "They're using a new form of shield technology.\n", + /* 25*/ "Foster was working on a new weapon which may \nbe useful.\n", + /* 26*/ "Damn it. My office... If they get access...\n", + /* 27*/ "Get there first, Jo, and destroy the files.\n", + /* 28*/ "Things are desperate. They've planted a bomb.\n", + /* 29*/ "Find it and get it out of the building.\n", + /* 30*/ "Access denied - authorization failure.\n", + /* 31*/ "Emergency overrides have been engaged.\n", + /* 32*/ "Well done, Joanna. We're nearly clear...\n", + /* 33*/ "The last dropship is waiting for you. Hurry.\n", + /* 34*/ "Critical mission object has been destroyed.\n", + /* 35*/ "The autodefenses will really help me out.\n", + /* 36*/ "So this is what Foster was working on.\n", + /* 37*/ "I'll have to go carefully... The hostages are \ncounting on me.\n", + /* 38*/ "Well, at least I won't know if I'm doing \nanything wrong.\n", + /* 39*/ "The bomb has been detonated...\n", + /* 40*/ "You have been given a Devastator.\n", + /* 41*/ "All ready, Joanna? We can't keep the Maian delegation waiting. Or the President, of course.\n", + /* 42*/ "Am I ready? What do you mean? I was ready half an hour ago. It was you holding us up!\n", + /* 43*/ "But you know how it is, Joanna... I had to make sure my hair was just right, and then there was the suit...\n", + /* 44*/ "They should keep you away from mirrors. Nervous?\n", + /* 45*/ "Very. I've waited for this moment for so many years. Contact, friendly contact, between Humans and Maians is what the Institute was founded for. And in a few minutes we'll be at the White House, and it will finally happen...\n", + /* 46*/ "Where did that come from?\n", + /* 47*/ "It was up on ground level...\n", + /* 48*/ "Looks like someone doesn't know when to quit. We've got to get everyone out!\n", + /* 49*/ "Get clear! I'll hold them off... You can come back and get me later!\n", + /* 50*/ "At least, I hope you can.\n", + /* 51*/ "You need the Data Uplink.\n", + /* 52*/ "Connection has been made.\n", + /* 53*/ "Bypassing security systems.\n", + /* 54*/ "Virus has been downloaded successfully.\n", + /* 55*/ "Ship's engines have been activated.\n", + /* 56*/ "Connection to ship has been broken.\n", + /* 57*/ "Obtain Data Uplink.\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink\n", + /* 60*/ "A Data Uplink\n", + /* 61*/ "Picked up a Data Uplink.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_f.c b/src/files/lang/pal-final/imp_str_f.c new file mode 100644 index 000000000..a8f4a5f67 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_f.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ils dérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - Détruire les informations sensibles\n\nLe coffre du bureau de Daniel contient un algorithme utilisé il y a des années pour briser les codes de communications Maian. Il doit être détruit à tout prix avant que la dataDyne ou les Skedars s'en emparent. Utilisez le laser pour percer la porte.\n\n|Objectif 5: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 1*/ "INSTITUT CARRINGTON\n", + /* 2*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Réactiver les défenses automatiques\n\nIl y a des fusils automatiques situés à des points stratégiques de l'Institut Carrington. Ils sont en ce moment désactivés mais si vous accédez au panneau de contrôle pour les brancher, ils dérouteront bon nombre d'ennemis.\n\n|Objectif 2: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 3: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 4: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nEn réponse de la mise en échec de leurs plans, les Skedars ont attaqué la source de leurs problèmes, l'Institut Carrington. Il est du devoir de Joanna de sauver l'Institut de la destruction totale.\n\n|Carrington - \n\nIls nous ont pris par surprise, Joanna! Sauvez qui vous pouvez et enfuyez-vous. Après tout, l'Institut c'est le personnel, pas l'immeuble.\n\n|Objectif 1: - Libérer les otages\n\nCertains des soldats ennemis détiennent du personnel important de l'Institut. Sauvez un maximum d'otages. Fouillez les labos des étages supérieurs.\n\n|Objectif 2: - Récupérer l'arme expérimentale\n\nDans le labo d'armement de Foster se trouve le prototype d'un mitrailleur que nous ne pouvons laisser à l'ennemi. Cette arme est capable de créer une occultation temporaire. Trouvez-la et 'testez-la' en milieu hostile.\n\n|Objectif 3: - Désactiver la bombe\n\nNos relevés indiquent la présence d'une bombe dans l'appareil Skedar au point d'atterrissage! Seul le récepteur peut vous aider: approchez-vous du vaisseau et utilisez-le pour installer un virus. Il décollera alors et s'éloignera de l'Institut. La bombe explosera ainsi sans blesser personne.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver les défenses automatiques\n", + /* 6*/ "Libérer les otages\n", + /* 7*/ "Récupérer l'arme expérimentale\n", + /* 8*/ "Détruire les informations sensibles\n", + /* 9*/ "Désactiver la bombe\n", + /* 10*/ "Obtenir infos sensibles.\n", + /* 11*/ "Garde: \n", + /* 12*/ "Infos sensibles\n", + /* 13*/ "Infos sensibles\n", + /* 14*/ "Infos sensibles obtenues.\n", + /* 15*/ "Fusils automatiques activés.\n", + /* 16*/ "Trop d'otages abattus.\n", + /* 17*/ "Otages sauvés.\n", + /* 18*/ "Informations sensibles détruites.\n", + /* 19*/ "Carrington abattu.\n", + /* 20*/ "Joanna - nous sommes attaqués. \n", + /* 21*/ "Branchez les fusils - vite.\n", + /* 22*/ "Les Skedars ont pris des otages. \n", + /* 23*/ "Montez aux bureaux et sauvez-les.\n", + /* 24*/ "Ils utilisent un nouveau système de bouclier. \n", + /* 25*/ "Foster travaillait sur une nouvelle arme qui \npeut être utile.\n", + /* 26*/ "Bon sang. Mon bureau... S'ils y ont accès...\n", + /* 27*/ "Allez-y en premier, Joanna, et détruisez les fichiers.\n", + /* 28*/ "Il y a urgence. Ils ont placé une bombe. \n", + /* 29*/ "Trouvez-la et sortez de l'immeuble.\n", + /* 30*/ "Accès refusé - Echec autorisation. \n", + /* 31*/ "Mesures d'urgences lancées.\n", + /* 32*/ "Beau boulot, Joanna. C'est presque fini...\n", + /* 33*/ "La dernière navette vous attend. Faites vite.\n", + /* 34*/ "Objet crucial détruit.\n", + /* 35*/ "Les défenses automatiques vont m'aider.\n", + /* 36*/ "Voilà sur quoi Foster travaillait.\n", + /* 37*/ "Je dois y aller doucement... Les otages \ncomptent sur moi.\n", + /* 38*/ "Au moins je ne saurai pas s'y je m'y \nprends mal.\n", + /* 39*/ "La bombe a explosé...\n", + /* 40*/ "Vous recevez un Devastator.\n", + /* 41*/ "Prête, Joanna? Nous ne pouvons pas faire attendre la délégation maian. Le Président non plus, bien sûr.\n", + /* 42*/ "Moi prête? Pardon? Je suis prête depuis une demi-heure! C'est moi qui vous attends!\n", + /* 43*/ "Vous savez ce que c'est, Joanna: il fallait que je me coiffe, que j'arrange mon costume...\n", + /* 44*/ "Vous avez combien de miroirs chez vous? Nerveux?\n", + /* 45*/ "Très. J'attends ce moment depuis si longtemps. L'Institut a été fondé pour faciliter les contacts entre humains et Maians. Et dans quelques minutes nous serons à la Maison Blanche... Le rêve deviendra alors réalité...\n", + /* 46*/ "D'où cela venait-il?\n", + /* 47*/ "Du rez-de-chaussée...\n", + /* 48*/ "Il y en a qui ne savent pas s'arrêter. Tout le monde doit évacuer!\n", + /* 49*/ "Mettez-vous à l'abri! Je vais les retenir! Venez me chercher plus tard!\n", + /* 50*/ "J'espère juste que vous le pourrez.\n", + /* 51*/ "Il vous faut le récepteur.\n", + /* 52*/ "Connexion établie.\n", + /* 53*/ "Dérivation systèmes de sécurité.\n", + /* 54*/ "Virus téléchargé avec succès.\n", + /* 55*/ "Moteurs du vaisseau activés.\n", + /* 56*/ "Connexion au vaisseau perdue.\n", + /* 57*/ "Obtenir récepteur.\n", + /* 58*/ "\n", + /* 59*/ "Récepteur\n", + /* 60*/ "Un récepteur\n", + /* 61*/ "Récepteur obtenu.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_g.c b/src/files/lang/pal-final/imp_str_g.c new file mode 100644 index 000000000..6e6667657 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_g.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Vernichten Sie die geheimen Informationen!\n\nIn Daniels Büro steht ein Safe, in dem der Algorithmus aufbewahrt wird, mit dem vor Jahren der Maianische Kom-Code geknackt wurde. Diese Information muss vernichtet werden, bevor dataDyne oder die Skedar darauf zugreifen können. Setzen Sie den Laser ein, um sich den Weg durch die Tür zu bahnen.\n\n|5. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 1*/ "CARRINGTON INSTITUT\n", + /* 2*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Reaktivieren Sie die automatischen Verteidigungsanlagen!\n\nIm gesamten Gebäude sind an strategisch wichtigen Punkten Selbstschuss- Anlagen installiert. Zurzeit sind sie zwar inaktiv, aber wenn Sie das Schaltpult erreichen und sie reaktivieren, werden die feindlichen Linien rasch ausgedünnt.\n\n|2. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|3. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|4. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nAus Rache für die Vereitelung ihres großangelegten Plans, haben die Skedar den Urheber dieser Aktion attackiert, nämlich das Carrington Institut. Aus Gründen der erforderlichen Effektivität steht es außer Frage, dass dieser Auftrag von Joanna auszuführen ist. Ihre Aufgabe ist es, zu retten, was noch zu retten ist.\n\n|Carrington - \n\nDie Skedar haben völlig überraschend angegriffen, Jo! Retten Sie alles und jeden, und dann machen Sie, dass Sie dort rauskommen! Es sind seine Mitarbeiter, die das Institut repräsentieren, nicht das Gebäude.\n\n|1. Ziel: - Befreien Sie die Geiseln!\n\nEinige der Eindringlinge haben wichtige Mitglieder des Instituts in ihrer Gewalt. Retten Sie so viele Geiseln wie möglich. Suchen Sie vor allem in den Labors in den oberen Stockwerken.\n\n|2. Ziel: - Finden Sie die experimentelle Waffe!\n\nIn Fosters Waffenlabor befindet sich der Prototyp eines Sub-MGs. Diese Waffe darf auf keinen Fall in die falschen Hände geraten, da sie in der Lage ist, ein temporäres Tarnfeld zu erzeugen. Finden Sie den Prototyp und nutzen Sie ihn gleich zur 'Feldforschung'.\n\n|3. Ziel: - Reprogrammieren Sie die Bombe!\n\nUnsere Sensoren zeigen an, dass sich an Bord des Skedar-Schiffs eine Bombe befindet. Sie müssen so nahe wie möglich an das Schiff gelangen, das Data Uplink-Gerät einsetzen und einen Virus installieren. Wenn das Schiff dann abhebt und sich in sicherer Entfernung befindet, sollte die Bombe explodieren, ohne, dass jemand im Institut zu Schaden kommt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Aktivieren Sie die Verteidigung!\n", + /* 6*/ "Befreien Sie die Geiseln!\n", + /* 7*/ "Finden Sie die Versuchs-Waffe!\n", + /* 8*/ "Vernichten Sie die Informationen!\n", + /* 9*/ "Reprogrammieren Sie die Bombe!\n", + /* 10*/ "Vernichten Sie die Informationen!\n", + /* 11*/ "Geheime Informationen\n", + /* 12*/ "der Wache\n", + /* 13*/ "Geheime Informationen\n", + /* 14*/ "Geheime Informationen aufgenommen\n", + /* 15*/ "Selbstschussanlage aktiviert\n", + /* 16*/ "Es sind zu viele Opfer zu beklagen.\n", + /* 17*/ "Geiseln wurden gerettet.\n", + /* 18*/ "Die geheimen Informationen wurden zerstört.\n", + /* 19*/ "Carrington wurde eliminiert.\n", + /* 20*/ "Joanna - Wir werden angegriffen!\n", + /* 21*/ "Aktivieren Sie die Selbstschussanlagen - RASCH!\n", + /* 22*/ "Die Skedar haben Geiseln genommen.\n", + /* 23*/ "Dringen Sie zu den Büros vor und retten Sie sie!\n", + /* 24*/ "Sie verwenden eine neuartige Form der Schildtechnologie.\n", + /* 25*/ "Foster hat an einer Waffe gearbeitet, die sich als \nnützlich erweisen könnte.\n", + /* 26*/ "Verdammt! Mein Büro... Wenn Sie die Daten finden...\n", + /* 27*/ "Gehen Sie zuerst dorthin und vernichten Sie die Daten, Jo.\n", + /* 28*/ "Die Dinge überstürzen sich. Sie haben eine Bombe versteckt.\n", + /* 29*/ "Finden Sie sie und schaffen Sie sie aus dem Gebäude raus!\n", + /* 30*/ "Zugriff verweigert - Keine Zugriffsberechtigung.\n", + /* 31*/ "Notfallprogramm wurde initiiert.\n", + /* 32*/ "Ausgezeichnet, Joanna. Wir haben es fast geschafft...\n", + /* 33*/ "Das letzte Schiff wartet auf Sie. Beeilung!\n", + /* 34*/ "Wichtiges Objekt wurde zerstört.\n", + /* 35*/ "Die Selbstschussanlagen werden sehr hilfreich sein.\n", + /* 36*/ "Daran hat Foster also gearbeitet.\n", + /* 37*/ "Ich muss vorsichtig sein... Die Geiseln \nverlassen sich auf mich.\n", + /* 38*/ "Wenigstens werde ich es nie erfahren, \nwenn ich einen Fehler gemacht habe.\n", + /* 39*/ "Die Bombe ist detoniert...\n", + /* 40*/ "Sie haben einen Devastator erhalten.\n", + /* 41*/ "Sind Sie fertig, Joanna? Wir können die Maianische Delegation nicht warten lassen. Den Präsidenten natürlich auch nicht.\n", + /* 42*/ "Ob ich fertig bin? Wovon reden Sie? Ich war schon vor einer halben Stunde fertig. SIE haben uns aufgehalten!\n", + /* 43*/ "Sie wissen ja, Joanna; Ich musste mich noch frisieren, und dann musste ich auch noch den passenden Anzug auswählen...\n", + /* 44*/ "Man sollte Sie von Spiegeln fernhalten. Nervös?\n", + /* 45*/ "Sehr sogar. Auf diesen Moment habe ich schon seit Jahren gewartet. Kontakt, friedlicher Kontakt zwischen Menschen und Maianern. Für diesen Zweck wurde das Institut gegründet. In wenigen Minuten sind wir im Weißen Haus, und die Zusammenkunft wird endlich stattfinden...\n", + /* 46*/ "Woher kam das?\n", + /* 47*/ "Es war im Erdgeschoss...\n", + /* 48*/ "Sieht so aus, als wüsste jemand nicht, wann er genug hat. Wir müssen die Leute hier rausschaffen!\n", + /* 49*/ "Bringen Sie sich in Sicherheit! Ich halte sie auf; Sie können später zurückkommen und mich abholen!\n", + /* 50*/ "Zumindest hoffe ich, dass Sie das können.\n", + /* 51*/ "Sie benötigen das Data Uplink-Gerät.\n", + /* 52*/ "Verbindung wurde hergestellt.\n", + /* 53*/ "Sicherheitssystem wird umgangen.\n", + /* 54*/ "Virus wurde erfolgreich kopiert.\n", + /* 55*/ "Der Antrieb des Schiffs wurde aktiviert.\n", + /* 56*/ "Verbindung wurde unterbrochen.\n", + /* 57*/ "Erlangen Sie das Data Uplink-Gerät!\n", + /* 58*/ "\n", + /* 59*/ "Data Uplink-Gerät\n", + /* 60*/ "Ein Data Uplink-Gerät\n", + /* 61*/ "Data Uplink-Gerät aufgenommen\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_i.c b/src/files/lang/pal-final/imp_str_i.c new file mode 100644 index 000000000..d31e9e8dd --- /dev/null +++ b/src/files/lang/pal-final/imp_str_i.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Distruggi le informazioni riservate\n\nNell'ufficio di Daniel si trova una cassaforte che custodisce l'algoritmo che a suo tempo lui stesso usò per decifrare il codice di comunicazione Maian. Devi distruggerlo prima che cada nelle mani della dataDyne o degli Skedar. Usa il laser per aprire un varco attraverso la porta.\n\n|Obiettivo 5: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanandosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 1*/ "CARRINGTON INSTITUTE\n", + /* 2*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Riattiva le difese automatiche\n\nIn punti strategici del Carrington Institute sono collocate armi automatiche di difesa. Al momento non sono attive, ma se riesci a raggiungere i quadri comandi per attivarle, ti aiuteranno a sconfiggere gli invasori.\n\n|Obiettivo 2: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 3: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 4: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo aver visto andare in fumo il loro piano grandioso gli Skedar, in segno di vendetta, attaccano la fonte di tutti i loro guai, il Carrington Institute. Con un'azione organizzata al limite dell'impossibile tocca ora a Joanna salvare l'istituto dalla distruzione totale.\n\n|Carrington:\n\nCi hanno preso in contropiede, Jo! Salva il salvabile, cose e persone, poi scappa anche tu! Dopotutto l'istituto sono le persone e non l'edificio.\n\n|Obiettivo 1: - Libera gli ostaggi\n\nGli invasori tengono in ostaggio personale indispensabile per l'istituto. Salva quanti più ostaggi possibile! Guarda in tutti i laboratori dei piani superiori dell'edificio.\n\n|Obiettivo 2: - Recupera l'arma sperimentale\n\nNel laboratorio armi di Foster si trova il prototipo del fucile mitragliatore. Attenzione: non deve assolutamente cadere nelle mani del nemico, poiché è in grado di creare un campo mimetico temporaneo. Trovalo e porta a termine alcune 'ricerche di campo'!\n\n|Obiettivo 3: - Disattiva la bomba\n\nI nostri sensori hanno rilevato una bomba nell'astronave degli Skedar sulla base di atterraggio! L'unico strumento utile è il Connettore Dati: avvicinati al mezzo e usa il Connettore Dati per installare un virus. A questo punto il mezzo si solleverà allontanadosi dall'istituto e la bomba esploderà senza danneggiare nessuno.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva le difese automatiche\n", + /* 6*/ "Libera gli ostaggi\n", + /* 7*/ "Recupera l'arma sperimentale\n", + /* 8*/ "Distruggi le informazioni riservate\n", + /* 9*/ "Disattiva la bomba\n", + /* 10*/ "Procurati informazioni riservate\n", + /* 11*/ "Guardia:\n", + /* 12*/ "Informazioni riservate \n", + /* 13*/ "Informazioni riservate\n", + /* 14*/ "Prese informazioni riservate\n", + /* 15*/ "Attivate armi automatiche\n", + /* 16*/ "Uccisi troppi ostaggi\n", + /* 17*/ "Salvati gli ostaggi\n", + /* 18*/ "Distrutte informazioni riservate\n", + /* 19*/ "Carrington è stato ucciso\n", + /* 20*/ "Joanna! Ci attaccano!\n", + /* 21*/ "Riattiva le armi! Presto!\n", + /* 22*/ "Gli Skedar hanno degli ostaggi!\n", + /* 23*/ "Corri negli uffici e salvali!\n", + /* 24*/ "Usano una nuova forma di tecnologia scudo.\n", + /* 25*/ "Foster lavorava ad una nuova arma \nche potrebbe tornare utile.\n", + /* 26*/ "Dannazione! Il mio ufficio... se entrano...\n", + /* 27*/ "Jo, va sul luogo e distruggi i file!\n", + /* 28*/ "La situazione è disperata! Hanno messo una bomba!\n", + /* 29*/ "Trovala e allontanala dall'edificio!\n", + /* 30*/ "ACCESSO NEGATO - Autorizzazione non concessa\n", + /* 31*/ "Sono state adottate misure d'emergenza.\n", + /* 32*/ "Bel lavoro, Joanna. Ce l'abbiamo quasi fatta!\n", + /* 33*/ "L'ultima navetta ti sta aspettando! Presto!\n", + /* 34*/ "Distrutto strumento essenziale alla missione.\n", + /* 35*/ "La difesa automatica mi aiuterà a venirne fuori!\n", + /* 36*/ "Ecco a cosa stava lavorando Foster!\n", + /* 37*/ "Devo andarci piano... Gli ostaggi \ncontano su di me.\n", + /* 38*/ "Così almeno non saprò se sto facendo \nqualcosa che non va.\n", + /* 39*/ "La bomba è esplosa...\n", + /* 40*/ "Hai trovato un Devastatore.\n", + /* 41*/ "Sei pronta, Joanna? Non possiamo far aspettare la delegazione Maian o il Presidente, naturalmente!\n", + /* 42*/ "Se sono pronta?! Sta scherzando? Ero già pronta mezz'ora fa. Ci ha trattenuto lei!\n", + /* 43*/ "Ma lo sai com'è, Joanna... Dovevo assicurarmi di avere i capelli in ordine e poi... il vestito...\n", + /* 44*/ "Dovrebbero tenerla lontana dallo specchio! Nervoso?\n", + /* 45*/ "Sì, molto. Sono anni che aspetto questo momento. L'istituto è stato fondato proprio per i contatti, i rapporti d'amicizia tra gli umani e i Maian... e tra pochi minuti saremo alla Casa Bianca... e finalmente arriverà il grande momento...\n", + /* 46*/ "Da dove viene questo rumore?\n", + /* 47*/ "Dal pianterreno... Sicuro!\n", + /* 48*/ "C'è qualcuno che non capisce quando è ora di finirla. Dobbiamo tirar fuori tutti di qui!\n", + /* 49*/ "Si metta in salvo! Me ne occupo io! Può tornare a prendermi più tardi!\n", + /* 50*/ "O almeno, lo spero!\n", + /* 51*/ "Ti serve il Connettore Dati!\n", + /* 52*/ "Connessione avvenuta\n", + /* 53*/ "Sistemi di sicurezza superati\n", + /* 54*/ "Il virus è stato scaricato.\n", + /* 55*/ "I motori della navetta si sono accesi.\n", + /* 56*/ "Connessione alla navetta interrotta.\n", + /* 57*/ "Procurati Connettore Dati.\n", + /* 58*/ "\n", + /* 59*/ "C. Dati\n", + /* 60*/ "Connettore Dati\n", + /* 61*/ "Preso Connettore Dati.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/imp_str_s.c b/src/files/lang/pal-final/imp_str_s.c new file mode 100644 index 000000000..ec9b06cd2 --- /dev/null +++ b/src/files/lang/pal-final/imp_str_s.c @@ -0,0 +1,68 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Destruir Información Sensible\n\nEn la oficina de Daniel hay una caja fuerte donde se guardan los algoritmos que usó para descifrar los códigos de comunicación Maian hace unos años. Deben ser destruidos antes de que dataDyne o los Skedar se hagan con ellos. Usa el láser para abrir la puerta.\n\n|Objetivo Cinco: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 1*/ "INSTITUTO CARRINGTON\n", + /* 2*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Reactivar Defensas Automáticas\n\nHay armas automáticas situadas en lugares estratégicos por todo el Instituto Carrington. En este momento están inactivas, pero si puedes llegar a los paneles de control y activarlas, te ayudarán a terminar con los atacantes.\n\n|Objetivo Dos: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Tres: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Cuatro: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEn venganza por desbaratar su gran plan, los Skedar han atacado la fuente de sus problemas, el Instituto Carrington. Con una reacción organizada fuera de toda duda, recae en Joanna salvar lo que pueda del Instituto de la destrucción total.\n\n|Carrington - \n\n¡Nos han cogido completamente desprevenidos, Joanna! Salva a todo el que puedas, entonces sal tú misma. Después de todo, el Instituto es la gente, no el edificio.\n\n|Objetivo Uno: - Liberar a los Rehenes\n\nParte de las fuerzas invasoras mantienen a personal clave del Instituto como rehenes. Salva a tantos como puedas. Mira en los diversos laboratorios.\n\n|Objetivo Dos: - Recuperar Arma Experimental\n\nEn el laboratorio de armas de Foster hay un prototipo de metralleta que no podemos dejar caer en manos enemigas. Esto se debe a que ese arma es capaz de crear un campo temporal de ocultación. Encuéntrala y lleva a cabo un poco de 'investigación de campo'.\n\n|Objetivo Tres: - Desactivar Bomba\n\n¡Nuestros sensores indican que hay una bomba en la nave Skedar de la plataforma de aterrizaje! Lo único que puede ayudarte es el Conector de Datos: acércate a la nave, y úsalo para instalar un virus. La nave volará fuera del Instituto, y la bomba detonará sin dañar a nadie.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar defensas automáticas\n", + /* 6*/ "Liberar a los rehenes\n", + /* 7*/ "Recuperar arma experimental\n", + /* 8*/ "Destruir información sensible\n", + /* 9*/ "Desactivar bomba\n", + /* 10*/ "Obtén información sensible.\n", + /* 11*/ "Guarda:\n", + /* 12*/ "Información sensible\n", + /* 13*/ "Información sensible\n", + /* 14*/ "Información sensible obtenida.\n", + /* 15*/ "Arma automática activada.\n", + /* 16*/ "Demasiados rehenes muertos.\n", + /* 17*/ "Los rehenes han sido salvados.\n", + /* 18*/ "La información sensible ha sido destruida.\n", + /* 19*/ "Carrington ha muerto.\n", + /* 20*/ "Joanna, nos atacan.\n", + /* 21*/ "Activa las armas, deprisa.\n", + /* 22*/ "Los Skedar han tomado rehenes.\n", + /* 23*/ "Sube a las oficinas y sálvalos.\n", + /* 24*/ "Están usando una nueva forma de tecnología de escudo.\n", + /* 25*/ "Foster estaba trabajando en una nueva arma que \npodría ser útil.\n", + /* 26*/ "Maldición. Mi oficina... Si logran acceder...\n", + /* 27*/ "Ve allí primero, Joanna, y destruye los ficheros.\n", + /* 28*/ "Las cosas van muy mal. Han puesto una bomba.\n", + /* 29*/ "Encuéntrala y sácala del edificio.\n", + /* 30*/ "Acceso denegado: autorización fallida.\n", + /* 31*/ "Las medidas de emergencia se han activado.\n", + /* 32*/ "Bien hecho, Joanna. Estamos casi a salvo...\n", + /* 33*/ "La última nave te está esperando. Deprisa.\n", + /* 34*/ "Objeto crítico de la misión destruido.\n", + /* 35*/ "Las autodefensas me ayudarán de veras.\n", + /* 36*/ "Así que esto es en lo que Foster estaba trabajando.\n", + /* 37*/ "Debo de ir con cuidado... Los prisioneros \ncuentan conmigo.\n", + /* 38*/ "Bien, al menos no sabré si estoy \nhaciendo algo mal.\n", + /* 39*/ "La bomba ha sido detonada...\n", + /* 40*/ "Has obtenido un Devastador.\n", + /* 41*/ "¿Preparada, Joanna? No podemos hacer esperar a la delegación Maian. Ni al Presidente, por supuesto.\n", + /* 42*/ "¿Preparada? ¿Qué quieres decir? Llevo preparada desde hace media hora. \n¡Tú nos has entretenido!\n", + /* 43*/ "Pero ya sabes cómo va, Joanna... Tengo que estar seguro de que mi pelo está bien, y también estaba el traje...\n", + /* 44*/ "Deberían alejarte de los espejos. ¿Nervioso?\n", + /* 45*/ "Mucho. Llevo esperando este momento desde hace bastantes años. El contacto, amigable, entre Humanos y Maian es para lo que se fundó el Instituto. Y en unos minutos estaremos en la Casa Blanca, y ocurrirá finalmente...\n", + /* 46*/ "¿De dónde proviene ese ruido?\n", + /* 47*/ "Parece la planta baja...\n", + /* 48*/ "Parece que alguien no sabe cuándo retirarse. ¡Tenemos que sacar a todo el mundo fuera!\n", + /* 49*/ "¡Largo! Les mantendré alejados... ¡Puedes volver y recogerme luego!\n", + /* 50*/ "Al menos, espero que puedas.\n", + /* 51*/ "Necesitas el Conector de Datos.\n", + /* 52*/ "Se ha realizado la conexión.\n", + /* 53*/ "Saltando sistemas de seguridad.\n", + /* 54*/ "El virus ha sido descargado con éxito.\n", + /* 55*/ "Los motores de la nave han sido activados.\n", + /* 56*/ "La conexión con la nave se ha cortado.\n", + /* 57*/ "Obtén el Conector de Datos.\n", + /* 58*/ "\n", + /* 59*/ "C. Datos\n", + /* 60*/ "Un Conector de Datos\n", + /* 61*/ "Conector de Datos obtenido.\n", + /* 62*/ NULL, + /* 63*/ NULL, +}; diff --git a/src/files/lang/pal-final/junE.c b/src/files/lang/pal-final/junE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/junJ.c b/src/files/lang/pal-final/junJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/junP.c b/src/files/lang/pal-final/junP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/junP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_f.c b/src/files/lang/pal-final/jun_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_g.c b/src/files/lang/pal-final/jun_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_i.c b/src/files/lang/pal-final/jun_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/jun_str_s.c b/src/files/lang/pal-final/jun_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/jun_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamE.c b/src/files/lang/pal-final/lamE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamJ.c b/src/files/lang/pal-final/lamJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lamP.c b/src/files/lang/pal-final/lamP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lamP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_f.c b/src/files/lang/pal-final/lam_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_g.c b/src/files/lang/pal-final/lam_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_i.c b/src/files/lang/pal-final/lam_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lam_str_s.c b/src/files/lang/pal-final/lam_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lam_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/leeE.c b/src/files/lang/pal-final/leeE.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-final/leeE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/leeJ.c b/src/files/lang/pal-final/leeJ.c new file mode 100644 index 000000000..a7b7f5c75 --- /dev/null +++ b/src/files/lang/pal-final/leeJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the Assault Ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar Assault Ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the Assault Ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking manoeuvres from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the Starmap so that he can find out where the Assault Ship is heading. There might also be the locations of Skedar strongholds within the Starmap - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control Of Bridge\n\nOnce the Bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable Shield System\n", + /* 6*/ "Open Hangar Doors\n", + /* 7*/ "Access Navigational Systems\n", + /* 8*/ "Sabotage Engine Systems\n", + /* 9*/ "Gain Control Of Bridge\n", + /* 10*/ "Ships Shields Have Been Lowered\n", + /* 11*/ "Hangar doors have been opened\n", + /* 12*/ "Elvis has been killed\n", + /* 13*/ "Navigational Information Has Been Retrieved\n", + /* 14*/ "Lift has been activated\n", + /* 15*/ "All hanagar skedar have been killed.\n", + /* 16*/ "We're outside Joanna. Get the shields down and\nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you Joanna.\n", + /* 20*/ "Take this, you should find it useful...\n", + /* 21*/ "Recieved AR34 Assault RIfle\n", + /* 22*/ "Time to head upwards. I'll take this lift,\nyou take the other one\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Heads up Jo. I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "Okay Jo, you head upwards. I'll stop any pursuit.\n", + /* 27*/ "I've got to get those shields down to let Elvis\nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge then the ship is ours.\n", + /* 31*/ "Time to head upwards....\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar. As you and Mr. Carrington just discovered.", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.", + /* 37*/ "Why are you doing this, Cassandra?", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.", + /* 39*/ "Eeeeaaarrrrggghhh!!!", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.", + /* 41*/ "Hmmmm?", + /* 42*/ "I don't... I don't believe it!", + /* 43*/ "Elvis? what is it?", + /* 44*/ "Where are you going?", + /* 45*/ "We have to get down to the surface! Follow me!", + /* 46*/ NULL, + /* 47*/ NULL, + /* 48*/ NULL, + /* 49*/ NULL, + /* 50*/ NULL, + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/leeP.c b/src/files/lang/pal-final/leeP.c new file mode 100644 index 000000000..4c73a6269 --- /dev/null +++ b/src/files/lang/pal-final/leeP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Open Hangar Doors\n\nThe docking system is normally controlled automatically - it must have been overridden from the bridge. Open the doors using the local controls overlooking the hangar, and Elvis can finish the landing cycle.\n\n|Objective Three: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Four: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Five: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Sabotage Engine Systems\n\nThe plan to take over the assault ship might go awry if the Commander alters from the set course. Tamper with the engines so that the ship comes to a halt.\n\n|Objective Four: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 3*/ "|Background - \n\nKnocked unconscious during the evacuation of the Carrington Institute, Joanna wakes to find herself a prisoner aboard a Skedar assault ship.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nJoanna! I'm following the assault ship that is holding you! With me are two Maian protectors from the delegation at the White House. If you can get us aboard, we can help you take over the ship.\n\n|Objective One: - Disable Shield System\n\nThe shield system prevents any docking maneuvers from taking place. Drop the shields so Elvis and his companions can start an approach.\n\n|Objective Two: - Access Navigational Systems\n\nGet Elvis to the star map so that he can find out where the assault ship is heading. There might also be the locations of Skedar strongholds within the star map - this information can be used for decisive strikes by the Maian Fleet.\n\n|Objective Three: - Gain Control of Bridge\n\nOnce the bridge is taken, the ship is no longer under Skedar control. Only the Commander remains inside.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Disable shield system\n", + /* 6*/ "Open hangar doors\n", + /* 7*/ "Access navigational systems\n", + /* 8*/ "Sabotage engine systems\n", + /* 9*/ "Gain control of bridge\n", + /* 10*/ "Ship's shields have been lowered.\n", + /* 11*/ "Hangar doors have been opened.\n", + /* 12*/ "Elvis has been killed.\n", + /* 13*/ "Navigational information has been retrieved.\n", + /* 14*/ "Lift has been activated.\n", + /* 15*/ "All hangar Skedar have been killed.\n", + /* 16*/ "Outside, Joanna. Get the shields down and \nwe can help you.\n", + /* 17*/ "You've got to open the hangar doors so we can dock.\n", + /* 18*/ "Okay, we're in. I'll meet you in the hangar.\n", + /* 19*/ "Good to see you, Joanna.\n", + /* 20*/ "Take this - you should find it useful...\n", + /* 21*/ "Received AR34 assault rifle.\n", + /* 22*/ "Time to head upwards. I'll take this lift; \nyou take the other one.\n", + /* 23*/ "Engines have been disabled.\n", + /* 24*/ "Look out, Joanna! I think we've made them angry...\n", + /* 25*/ "Bridge has been captured.\n", + /* 26*/ "You go on ahead, Jo. I'll secure the perimeter. \nWe'll meet up later.\n", + /* 27*/ "I've got to get those shields down to let Elvis \nin. I need all the help I can get.\n", + /* 28*/ "Now only the hangar bay doors are in the way.\n", + /* 29*/ "This machine contains the Skedar star maps.\n", + /* 30*/ "If we control the bridge, then the ship is ours.\n", + /* 31*/ "Time to head upwards...\n", + /* 32*/ "Oohhh... I'd better not be where I think I am.\n", + /* 33*/ "And it's worse than that, my dear. Just look who you've got for company.\n", + /* 34*/ "You! I thought you'd managed to escape. We found no trace of you at all.\n", + /* 35*/ "You couldn't find me. But there was no hiding from the Skedar, as you and Mr. Carrington just discovered.\n", + /* 36*/ "This is it. Wait there! I'll make a distraction; it will give you a chance to get out. Use it or we'll both die.\n", + /* 37*/ "Why are you doing this, Cassandra?\n", + /* 38*/ "The Skedar used me, Joanna. You are my best chance for revenge.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. That's the first time I've seen another planet from space. It's beautiful.\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "I don't... I don't believe it!\n", + /* 43*/ "Elvis? What is it?\n", + /* 44*/ "Where are you going?\n", + /* 45*/ "We have to get down to the surface! Follow me!\n", + /* 46*/ "We have to get out of here!\n", + /* 47*/ "Hangar doors locked - shields still active.\n", + /* 48*/ "Critical mission object destroyed.\n", + /* 49*/ "Ammo depleted - consoles can't be destroyed.\n", + /* 50*/ "Obtain De Vries' necklace.\n", + /* 51*/ "Cassandra De Vries'\n", + /* 52*/ "Necklace\n", + /* 53*/ "De Vries' necklace\n", + /* 54*/ "Picked up De Vries' necklace.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_f.c b/src/files/lang/pal-final/lee_str_f.c new file mode 100644 index 000000000..4f1edeef8 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Ouvrir les portes du hangar\n\nLe système d'accostage est d'habitude contrôlé en auto: il a dû être dévié depuis le pont. Ouvrez les portes en vous servant des commandes au-dessus du hangar et Elvis pourra accomplir son accostage.\n\n|Objectif 3: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 4: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 5: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 1*/ "SKEDAR ASSAULT SHIP\n", + /* 2*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Saboter les systèmes de propulsion\n\nLe plan d'assaut du croiseur risque d'échouer si le commandant change de cap. Trafiquez les moteurs pour que l'appareil s'arrête.\n\n|Objectif 4: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nAssommée lors de l'évacuation de l'Institut Carrington, Joanna reprend ses esprits et se retrouve prisonnière d'un croiseur Skedar.\n\n|Carrington - Non disponible.\n\n|Elvis - \n\nJoanna! Je file le croiseur qui te retient! Deux protecteurs maians de la Maison Blanche m'accompagnent. Si tu peux nous faire monter à bord, nous pourrons t'aider à prendre le vaisseau d'assaut.\n\n|Objectif 1: - Annuler le système de bouclier\n\nLe bouclier enraye toute manoeuvre d'accostage. Baissez les boucliers et Elvis et ses compagnons pourront entamer leur approche.\n\n|Objectif 2: - Accéder aux systèmes de navigation\n\nMenez Elvis à la carte stellaire et il en déduira la destination du croiseur. La position des bases Skedars peut aussi y figurer: cette information peut être d'une grande valeur aux yeux de la flotte maian, en vue d'une possible attaque.\n\n|Objectif 3: - Contrôler le pont\n\nUne fois le pont pris, le vaisseau ne sera plus sous le contrôle des Skedars. Seul le commandant doit rester.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Annuler le système de bouclier\n", + /* 6*/ "Ouvrir les portes du hangar\n", + /* 7*/ "Accéder aux systèmes de navigation\n", + /* 8*/ "Saboter les systèmes de propulsion\n", + /* 9*/ "Contrôler le pont\n", + /* 10*/ "Boucliers du vaisseau baissés.\n", + /* 11*/ "Portes du hangar ouvertes.\n", + /* 12*/ "Elvis abattu.\n", + /* 13*/ "Infos de navigation récupérées.\n", + /* 14*/ "Ascenseur activé.\n", + /* 15*/ "Skedars du hangar abattus.\n", + /* 16*/ "Joanna! Baisse les boucliers \net nous t'aiderons.\n", + /* 17*/ "Ouvre les portes du hangar pour que l'on puisse accoster.\n", + /* 18*/ "OK. Nous y sommes. Je te retrouve dans le hangar.\n", + /* 19*/ "Ca me fait plaisir de te voir, Joanna. \n", + /* 20*/ "Prends ça. C'est utile, tu verras...\n", + /* 21*/ "Fusil d'assaut AR34 obtenu.\n", + /* 22*/ "Il faut monter. Je prends cet ascenseur. \nPrends l'autre.\n", + /* 23*/ "Moteurs coupés.\n", + /* 24*/ "Attention Joanna! Ils sont en colère je crois...\n", + /* 25*/ "Pont capturé.\n", + /* 26*/ "Vas-y, Joanna. Je sécurise le périmètre. \nOn se retrouve plus tard.\n", + /* 27*/ "Je dois abaisser les boucliers pour faire entrer \nElvis. J'ai besoin d'aide...\n", + /* 28*/ "Seules les portes de hangar sont sur le chemin.\n", + /* 29*/ "Cette machine contient les cartes stellaires skedars.\n", + /* 30*/ "Si nous contrôlons le pont, le vaisseau sera à notre merci.\n", + /* 31*/ "Il est temps de monter...\n", + /* 32*/ "Oohhh... Dites-moi que ce n'est pas vrai.\n", + /* 33*/ "Et si. Regardez donc qui est avec vous, ma chère.\n", + /* 34*/ "Vous! Vous ne vous êtes pas enfuie? Nous avions perdu votre trace...\n", + /* 35*/ "Leurrer les Skedars était plus difficile. Vous et Mr. Carrington avez pu vous en rendre compte.\n", + /* 36*/ "Attendez ici! Je vais créer une diversion. Cela vous donnera l'occasion de partir. Faites vite ou nous mourrons.\n", + /* 37*/ "Pourquoi faites-vous tout ça, Cassandra?\n", + /* 38*/ "Les Skedars m'ont utilisée. Vous êtes ma seule chance de me venger.\n", + /* 39*/ "Aaaaaahhhhhhh!!!\n", + /* 40*/ "C'est la première fois que je vois une planète depuis l'espace... C'est magnifique.\n", + /* 41*/ "Hein?\n", + /* 42*/ "Je... Je ne le crois pas!\n", + /* 43*/ "Elvis? Qu'est-ce qu'il y a?\n", + /* 44*/ "Où vas-tu?\n", + /* 45*/ "Nous devons descendre à la surface! Suis-moi!\n", + /* 46*/ "Il faut sortir d'ici!\n", + /* 47*/ "Portes hangar fermées - boucliers actifs.\n", + /* 48*/ "Objet crucial détruit.\n", + /* 49*/ "Munitions épuisées - panneaux ne peuvent être détruits.\n", + /* 50*/ "Obtenir collier de De Vries.\n", + /* 51*/ "Cassandra De Vries: \n", + /* 52*/ "Collier\n", + /* 53*/ "Collier de De Vries\n", + /* 54*/ "Collier de De Vries obtenu.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_g.c b/src/files/lang/pal-final/lee_str_g.c new file mode 100644 index 000000000..a38c4b6ed --- /dev/null +++ b/src/files/lang/pal-final/lee_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Öffnen Sie die Hangartore!\n\nDas Andock-System wird im Normalfall automatisch gesteuert. Es muss von der Brücke aus auf manuelle Bedienung umgestellt worden sein. Öffnen Sie die Tore mit Hilfe der lokalen Kontrollinstrumente, um Elvis das Andocken zu ermöglichen.\n\n|3. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|4. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|5. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHIFF\n", + /* 2*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Sabotieren Sie die Antriebssysteme!\n\nDer Plan, das Schiff zu übernehmen, könnte schief gehen, wenn der Kommandant den vorgegebenen Kurs ändert. Manipulieren Sie den Antrieb, um das Schiff zu stoppen.\n\n|4. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nWährend der Evakuierung des Carrington-Instituts wurde Joanna bewusstlos geschlagen. Als Sie das Bewusstsein wiedererlangt, befindet sie sich als Gefangene auf einem Schiff der Skedar.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nJoanna! Ich folge dem Schiff, auf dem du dich befindest! Zwei der Maianer von der Delegation aus dem Weißen Haus sind mit mir unterwegs. Wenn du uns an Bord bringst, können wir gemeinsam versuchen, das Schiff zu übernehmen.\n\n|1. Ziel: - Setzen Sie den Schutzschild außer Betrieb!\n\nDer Schutzschild verhindert jegliches Andockmanöver. Fahren Sie die Schilde herunter, um Elvis und seinen Begleitern den Zutritt zum Schiff zu ermöglichen.\n\n|2. Ziel: - Nehmen Sie Einblick in die Sternenkarte!\n\nBringen Sie Elvis zu der Sternenkarte, damit er die Destination des Schiffes ausfindig machen kann. Eventuell sind auf der Karte auch die Positionen von Skedar-Festungen verzeichnet. Diese Information kann der Maianischen Flotte sehr nützlich sein.\n\n|3. Ziel: - Bringen Sie die Brücke unter Ihre Kontrolle!\n\nSobald Sie die Brücke eingenommen haben, befindet sich das Schiff nicht mehr unter der Kontrolle der Skedar. Nur der Kommandant verbleibt.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Setzen Sie den Schild außer Betrieb!\n", + /* 6*/ "Öffnen Sie die Hangartore!\n", + /* 7*/ "Nehmen Sie Einblick in die Sternenkarte!\n", + /* 8*/ "Sabotieren Sie die Antriebssysteme!\n", + /* 9*/ "Entern Sie die Brücke!\n", + /* 10*/ "Die Schilde wurden heruntergefahren.\n", + /* 11*/ "Die Hangartore wurden geöffnet.\n", + /* 12*/ "Elvis wurde eliminiert.\n", + /* 13*/ "Navigationsinformation wurde erlangt.\n", + /* 14*/ "Aufzug wurde aktiviert.\n", + /* 15*/ "Alle Skedar im Hangarbereich wurden eliminiert.\n", + /* 16*/ "Joanna! Fahr die Schilde runter! Dann \nkönnen wir dir helfen.\n", + /* 17*/ "Du musst die Hangartore öffnen, sonst können wir nicht andocken!\n", + /* 18*/ "Okay, wir sind drin. Wir treffen uns im Hangar.\n", + /* 19*/ "Es ist schön dich zu sehen, Joanna.\n", + /* 20*/ "Nimm das - das kannst du sicher gut gebrauchen...\n", + /* 21*/ "AR34 erhalten\n", + /* 22*/ "Wir sollten nach oben gehen. Ich nehme diesen Aufzug; \nnimm du den anderen.\n", + /* 23*/ "Die Maschinen wurden unbrauchbar gemacht.\n", + /* 24*/ "Vorsicht Joanna! Ich glaube, sie sind jetzt sauer...\n", + /* 25*/ "Die Brücke wurde eingenommen.\n", + /* 26*/ "Du gehst voraus, Jo. Ich sichere diesen Teil des Schiffes. \nWir treffen uns später.\n", + /* 27*/ "Ich muss die Schilde runterfahren, damit Elvis \nlanden kann. Ich brauche jede Hilfe, die ich kriegen kann.\n", + /* 28*/ "Jetzt sind nur noch die Hangartore im Weg.\n", + /* 29*/ "In dieser Maschine werden die Sternenkarten gespeichert.\n", + /* 30*/ "Wenn wir die Brücke einnehmen, gehört das Schiff uns.\n", + /* 31*/ "Wir sollten nach oben gehen...\n", + /* 32*/ "Oohhh... Ich hoffe, ich bin nicht da, wo ich befürchte zu sein.\n", + /* 33*/ "Es ist sogar noch schlimmer als das, Schätzchen. Und sieh nur, wer dir Gesellschaft leistet.\n", + /* 34*/ "Sie! Ich dachte, Sie wären entkommen. Wir konnten keine Spur von Ihnen finden.\n", + /* 35*/ "Ihr konntet mich zwar nicht finden, die Skedar konnten es sehr wohl. Das dürfte dir und Mr. Carrington auch aufgefallen sein.\n", + /* 36*/ "Bleib da stehen! Ich werde sie ablenken. Das verschafft dir eine Chance, um hier rauszukommen. Nimm sie wahr, oder...\n", + /* 37*/ "Warum tun Sie das, Cassandra?\n", + /* 38*/ "Die Skedar haben mich benutzt. Du bietest mir die Möglichkeit, Rache zu nehmen.\n", + /* 39*/ "Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Wow. Das ist das erste Mal, dass ich einen anderen Planeten vom Weltall aus sehe. Wunderschön!\n", + /* 41*/ "Hmmmm?\n", + /* 42*/ "Ich... Ich glaube das nicht!\n", + /* 43*/ "Elvis? Was ist das?\n", + /* 44*/ "Wohin gehst du?\n", + /* 45*/ "Wir müssen die Oberfläche erreichen! Folge mir!\n", + /* 46*/ "Wir müssen hier raus!\n", + /* 47*/ "Hangartore verriegelt - Schilde sind noch aktiv.\n", + /* 48*/ "Wichtiges Objekt zerstört.\n", + /* 49*/ "Die Konsolen können ohne Munition nicht zerstört werden.\n", + /* 50*/ "Erlangen Sie De Vries Halskette!\n", + /* 51*/ "Cassandra De Vries\n", + /* 52*/ "Halskette\n", + /* 53*/ "Cassandra De Vries Halskette\n", + /* 54*/ "De Vries Halskette aufgenommen\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_i.c b/src/files/lang/pal-final/lee_str_i.c new file mode 100644 index 000000000..a1124b6b1 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Apri le porte dell'hangar\n\nIl sistema di attracco è normalmente comandato in automatico e deve quindi essere disattivato dal ponte. Apri le porte azionando i comandi collocati sopra all'hangar, in modo che Elvis possa portare a termine la manovra di atterraggio.\n\n|Obiettivo 3: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 4: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 5: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 1*/ "ASTRONAVE D'ASSALTO SKEDAR\n", + /* 2*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Sabotaggio al sistema motore\n\nIl piano per prendere il sopravvento sull'astronave può fallire se il comandante modifica la rotta stabilita. Manometti i motori in modo che l'astronave si fermi.\n\n|Obiettivo 4: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSvenuta in seguito ad un'aggressione durante l'evacuamento dal Carrington Institute, Joanna si sveglia prigioniera degli Skedar a bordo della loro astronave d'assalto.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nJoanna! Sto seguendo l'astronave che ti tiene prigioniera! Con me ci sono due difensori Maian della delegazione della Casa Bianca. Se riesci a farci salire a bordo, ti aiuteremo a prendere il controllo dell'astronave.\n\n|Obiettivo 1: - Disattiva il sistema scudo\n\nIl sistema scudo impedisce qualsiasi tentativo di attracco da parte di un altro mezzo. Disattiva gli scudi in modo che Elvis e i suoi compagni possano tentare la manovra di avvicinamento.\n\n|Obiettivo 2: - Accedi al sistema di navigazione\n\nPorta Elvis alla mappa astronomica in modo che riesca a scoprire in che direzione è diretta l'astronave. Tale mappa potrebbe anche rivelare la posizione della roccaforte Skedar: un'informazione fondamentale per un'azione decisiva da parte della flotta Maian.\n\n|Obiettivo 3: - Assumi il controllo del ponte\n\nUna volta assunto il controllo del ponte, l'astronave non può più essere comandata dagli Skedar. Rimane lì solo il comandante.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Disattiva il sistema scudo\n", + /* 6*/ "Apri le porte dell'hangar\n", + /* 7*/ "Accedi al sistema di navigazione\n", + /* 8*/ "Sabotaggio al sistema motore\n", + /* 9*/ "Assumi il controllo del ponte\n", + /* 10*/ "Abbassati gli scudi dell'astronave.\n", + /* 11*/ "Aperte le porte dell'hangar.\n", + /* 12*/ "Elvis è stato ucciso.\n", + /* 13*/ "Recuperate informazioni di navigazione.\n", + /* 14*/ "Attivato l'ascensore.\n", + /* 15*/ "Uccisi tutti gli Skedar nell'hangar.\n", + /* 16*/ "Avanti, Joanna! Disattiva gli scudi \ncosì potremo aiutarti!\n", + /* 17*/ "Devi aprire le porte dell'hangar affinché possiamo attraccare!\n", + /* 18*/ "Bene, ci siamo! Ci vediamo nell'hangar.\n", + /* 19*/ "Vedo che stai bene, Joanna!\n", + /* 20*/ "Ecco, tieni! Ti sarà utile!\n", + /* 21*/ "Preso il fucile d'assalto AR34.\n", + /* 22*/ "È ora di salire, forza! Io prendo quest'ascensore, \ntu prendi quell'altro.\n", + /* 23*/ "I motori sono stati disattivati.\n", + /* 24*/ "Attenta, Joanna! Mi sembrano leggermente irritati...\n", + /* 25*/ "Assunto controllo del ponte.\n", + /* 26*/ "Va avanti tu, Jo! Io ti copro le spalle! \nCi vediamo dopo!\n", + /* 27*/ "Devo disattivare quegli scudi per far entrare Elvis. \nMi serve aiuto!\n", + /* 28*/ "Ora mi restano solo le porte dell'hangar.\n", + /* 29*/ "Questa macchina contiene la mappa astronomica Skedar.\n", + /* 30*/ "Se riusciamo a prendere il controllo del ponte, \nl'astronave sarà nostra.\n", + /* 31*/ "È ora di salire...\n", + /* 32*/ "Ops... Sono sicuramente nel posto sbagliato al momento sbagliato.\n", + /* 33*/ "E c'è di peggio, immagino! Guarda un po' chi c'è qui!!!\n", + /* 34*/ "Lei! Pensavo che fosse riuscita a squagliarsela. È sparita senza lasciare traccia!!!\n", + /* 35*/ "Non mi avete trovato VOI! Ma dagli Skedar non si scappa, come avrete sicuramente notato tu e Carrington!\n", + /* 36*/ "Prendi questo e aspetta lì! Se riesco a distrarli, avrai la possibilità di uscire di qua! Forza, usalo o moriremo entrambe!\n", + /* 37*/ "Perché lo fa, Cassandra?\n", + /* 38*/ "Gli Skedar mi hanno usata, Joanna e tu sei la mia unica possibilità di vendetta!\n", + /* 39*/ "Aaaaargh!!!\n", + /* 40*/ "Ehi! È la prima volta che vedo un altro pianeta dallo spazio! È fantastico!\n", + /* 41*/ "Eeeeeh?\n", + /* 42*/ "Non... non ci posso credere!\n", + /* 43*/ "Elvis? Che roba è?\n", + /* 44*/ "Che fai? Dove vai?\n", + /* 45*/ "Dobbiamo raggiungere la superficie! Dai, vieni!\n", + /* 46*/ "Dobbiamo uscire di qua!\n", + /* 47*/ "Porte hangar bloccate - Scudi ancora attivi.\n", + /* 48*/ "Distrutto strumento essenziale alla missione.\n", + /* 49*/ "Finite le munizioni - Impossibile distruggere quadro comandi.\n", + /* 50*/ "Collana di De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collana\n", + /* 53*/ "Collana di De Vries\n", + /* 54*/ "Presa collana di De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lee_str_s.c b/src/files/lang/pal-final/lee_str_s.c new file mode 100644 index 000000000..be7bf3c60 --- /dev/null +++ b/src/files/lang/pal-final/lee_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Abrir Puertas del Hangar\n\nNormalmente el sistema de atraque se controla de forma automática: debe ser anulado desde el puente. Abre las puertas usando los controles locales sin tener en cuenta el hangar, y Elvis podrá terminar el ciclo de aterrizaje.\n\n|Objetivo Tres: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Cuatro: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cinco: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 1*/ "NAVE DE ASALTO SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Sabotear los Motores\n\nEl plan para tomar la nave de asalto debería salir mal si el Comandante altera el curso establecido. Manipula los motores para que así la nave se pare.\n\n|Objetivo Cuatro: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nQuedando inconsciente durante la evacuación del Instituto Carrington, Joanna despierta para encontrarse prisionera abordo de una nave de asalto Skedar.\n\n|Carrington - No disponible.\n\n|Elvis - \n\n¡Joanna! ¡Estoy siguiendo a la nave de asalto que te retiene! Conmigo están dos protectores Maian de la delegación que estuvo en la Casa Blanca. Si nos puedes meter a bordo, podremos ayudarte a tomar la nave.\n\n|Objetivo Uno: - Desactivar Sistemas de Escudo\n\nEl sistema de escudo evita que haya maniobras de atraque. Baja los escudos para que Elvis y sus compañeros puedan iniciar la aproximación.\n\n|Objetivo Dos: - Acceder a los Sistemas de Navegación\n\nLleva a Elvis hasta el mapa estelar para que pueda descubrir hacia donde se dirige la nave de asalto. En el mismo, debería estar también la posición de las fortalezas Skedar: esta información puede ser usada para los ataques de la Flota Maian.\n\n|Objetivo Tres: - Ganar el Control del Puente\n\nUna vez el Puente haya sido tomado, la nave no estará más bajo el control Skedar. Sólo quedará dentro el Comandante.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Desactivar sistemas de escudo\n", + /* 6*/ "Abrir puertas del hangar\n", + /* 7*/ "Acceder a los sistemas de navegación\n", + /* 8*/ "Sabotear los motores\n", + /* 9*/ "Ganar el control del puente\n", + /* 10*/ "Los escudos de la nave han sido bajados.\n", + /* 11*/ "Las puertas del hangar han sido abiertas.\n", + /* 12*/ "Elvis ha muerto.\n", + /* 13*/ "La información de navegación ha sido recuperada.\n", + /* 14*/ "El ascensor ha sido activado.\n", + /* 15*/ "Todos los Skedar del hangar han muerto.\n", + /* 16*/ "Espera, Joanna. Baja los escudos y \nte podremos ayudar.\n", + /* 17*/ "Tienes que abrir las puertas del hangar \npara que podamos atracar.\n", + /* 18*/ "Vale, estamos dentro. Te veré en el hangar.\n", + /* 19*/ "Me alegro de verte, Joanna.\n", + /* 20*/ "Toma esto: lo encontrarás útil...\n", + /* 21*/ "Rifle de asalto AR34 recibido.\n", + /* 22*/ "Es hora de avanzar. Yo tomaré este ascensor; \ntú toma el otro.\n", + /* 23*/ "Los motores han sido desactivados.\n", + /* 24*/ "¡Cuidado, Joanna! Creo que les hemos hecho enfadar...\n", + /* 25*/ "El puente ha sido capturado.\n", + /* 26*/ "Ve delante, Joanna. Aseguraré el perímetro. \nNos vemos luego.\n", + /* 27*/ "Tengo que conseguir bajar esos escudos para \nmeter a Elvis. Necesito toda la ayuda que pueda obtener.\n", + /* 28*/ "Ahora sólo las puertas del hangar nos molestan.\n", + /* 29*/ "Esta máquina contiene los mapas estelares Skedar.\n", + /* 30*/ "Si controlamos el puente, entonces la nave será nuestra.\n", + /* 31*/ "Es hora de avanzar...\n", + /* 32*/ "Oohhh... Preferiría no estar donde creo que estoy.\n", + /* 33*/ "Y es peor que eso, querida. Sólo mira a quién tienes por compañía.\n", + /* 34*/ "¡Tú! Creía que habías escapado. No encontramos ningún rastro tuyo.\n", + /* 35*/ "No pudisteis encontrarme. Pero no me escondía de los Skedar, como tú y el Sr. Carrington descubristeis.\n", + /* 36*/ "Eso es. ¡Espera aquí! Crearé una distracción; te daré la oportunidad de escapar. Úsala o moriremos ambas.\n", + /* 37*/ "¿Por qué haces esto, Cassandra?\n", + /* 38*/ "Los Skedar me usaron, Joanna. Tú eres mi mejor baza para vengarme.\n", + /* 39*/ "¡¡¡Eeeeaaarrrrggghhh!!!\n", + /* 40*/ "Guau. Ésta es la primera vez que veo otro planeta desde el espacio. Es precioso.\n", + /* 41*/ "¿Hmmmm?\n", + /* 42*/ "No... ¡No puedo creerlo!\n", + /* 43*/ "¿Elvis? ¿Qué pasa?\n", + /* 44*/ "¿Dónde vas?\n", + /* 45*/ "¡Tenemos que bajar a la superficie! ¡Sígueme!\n", + /* 46*/ "¡Tenemos que salir de aquí!\n", + /* 47*/ "Puertas del hangar cerradas - escudos todavía activos.\n", + /* 48*/ "Objeto crítico de la misión destruido.\n", + /* 49*/ "Munición agotada - las consolas no pueden ser destruidas.\n", + /* 50*/ "Obtén el collar de De Vries.\n", + /* 51*/ "Cassandra De Vries:\n", + /* 52*/ "Collar\n", + /* 53*/ "Collar de De Vries\n", + /* 54*/ "Recogiste el collar de De Vries.\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/lenE.c b/src/files/lang/pal-final/lenE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lenJ.c b/src/files/lang/pal-final/lenJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lenP.c b/src/files/lang/pal-final/lenP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/lenP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_f.c b/src/files/lang/pal-final/len_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_g.c b/src/files/lang/pal-final/len_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_i.c b/src/files/lang/pal-final/len_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/len_str_s.c b/src/files/lang/pal-final/len_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/len_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/lipE.c b/src/files/lang/pal-final/lipE.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-final/lipE.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lipJ.c b/src/files/lang/pal-final/lipJ.c new file mode 100644 index 000000000..369b31590 --- /dev/null +++ b/src/files/lang/pal-final/lipJ.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. Install a virus using the Data Uplink device, but be alert for the possibility that this may set off an alarm.\n\n|Objective Three: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJohnathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the deaths of the three other passengers of the craft.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that but it won't last forever, so make good use of it. Wipe out their records and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue The Crash Survivor\n\nOnce you are in the Lab you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive, or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain Laboratory Technician Disguise\n", + /* 10*/ "Destroy Computer Records\n", + /* 11*/ "Locate Conspiracy Evidence\n", + /* 12*/ "Gain Access To Autopsy Lab\n", + /* 13*/ "Rescue Elvis\n", + /* 14*/ "Research Records Destroyed\n", + /* 15*/ "Obtain Lab CLothes\n", + /* 16*/ "Lab Techs\n", + /* 17*/ "Lab Clothes\n", + /* 18*/ "Lab Clothes\n", + /* 19*/ "Picked up Lab Clothes\n", + /* 20*/ "Access To Door Control Systems Denied\n", + /* 21*/ "Access To Light Control Systems Denied\n", + /* 22*/ "Access To Security Control Systems Denied\n", + /* 23*/ "Virus Downloaded To Console\n", + /* 24*/ "Obtain Data Uplink\n", + /* 25*/ "Lab Techs\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink\n", + /* 29*/ "Laboratory Accessed Successfully\n", + /* 30*/ "Data Uplink Connected\n", + /* 31*/ "Data Uplink Connection Broken\n", + /* 32*/ "Obtain Medlab2 Keycard\n", + /* 33*/ "Guards\n", + /* 34*/ "Medlab 2 Keycard\n", + /* 35*/ "Medlab 2 Keycard\n", + /* 36*/ "Picked up Medlab 2 Keycard.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes\n", + /* 39*/ "Help - Help\n", + /* 40*/ "Don't shoot me\n", + /* 41*/ "Oh my god - a gun!\n", + /* 42*/ "There's an intruder in the complex\n", + /* 43*/ "Give me back my clothes - or else\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes\n", + /* 46*/ "I don't have much time before the body's discovered\n", + /* 47*/ "The enemy has discovered the disguise\n", + /* 48*/ "Virus has already been downloaded\n", + /* 49*/ "Initiating virus download\n", + /* 50*/ "So, you've got here at last.\n", + /* 51*/ "Hey, you're not.... SECURITY ALERT\n", + /* 52*/ "Not guns allowed in here - put away you're weapon.\n", + /* 53*/ "I won't ask you again - ditch the weapon\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical Mission Personnel Killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain Op-room Keycard\n", + /* 60*/ "Guards\n", + /* 61*/ "Oproom Keycard\n", + /* 62*/ "Oproom Keycard\n", + /* 63*/ "Picked up Operation Room Keycard.\n", + /* 64*/ "Elvis has been Killed.\n", + /* 65*/ "Get The Hell Out Of Here!\n", + /* 66*/ "Containment Unit Raised Up\n", + /* 67*/ "Containment Unit Lowered Down\n", + /* 68*/ "Mission Critical Equipment Destroyed\n", + /* 69*/ "Obtain X-ray scanner\n", + /* 70*/ "\n", + /* 71*/ "X-ray scanner\n", + /* 72*/ "X-ray scanner\n", + /* 73*/ "Picked up X-ray scanner.\n", + /* 74*/ "Scanner Target Aquired\n", + /* 75*/ "Target ID confirmed - XT origin\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... now, if I can convince someone\nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... you must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled round here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy.....\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Impostor!\n", + /* 88*/ "Lighting Systems Overloaded.\n", + /* 89*/ "The problem you have is that there is no way to sneak into the research section. The only way in available to you is a weak section of wall I've marked in the room beyond the stores. It can be destroyed with explosives.", + /* 90*/ "Doesn't sound like a problem to me. Where are these explosives?", + /* 91*/ "In that crate.", + /* 92*/ "Cute. Very cute.", + /* 93*/ "By the way, the stores are crawling with guards. It may go against your nature, but try sneaking through rather than blasting everything.", + /* 94*/ "Certainly. Any other pearls of wisdom?", + /* 95*/ "That crate...", + /* 96*/ "Yes?", + /* 97*/ "It really doesn't like being shot.", + /* 98*/ "Great. Now, if I can just fight the urge to report him to Base Security...", + /* 99*/ "Put your hands up and step away from the alien.", + /*100*/ "What the hell do you think you're doing? This is supposed to be a sealed room! Don't you know anything about autopsy procedures?", + /*101*/ "Don't make me tell you again, Doctor. And turn that laser off.", + /*102*/ "Director Easton will hear about this, young lady.", + /*103*/ "Of course he's going to hear of it, you moron. I've just got into his top secret base and now I'm stealing his alien.", + /*104*/ "You can't take that! It's government property! This is intolerable! It's... it's... unprofessional!!", + /*105*/ NULL, + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lipP.c b/src/files/lang/pal-final/lipP.c new file mode 100644 index 000000000..df5546489 --- /dev/null +++ b/src/files/lang/pal-final/lipP.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Destroy Computer Research Records\n\nAny information that the Area 51 techs were able to get from the crash wreckage and objects must be wiped from their databases. The main databank terminal is kept in a locked room at the top of the main corridor. Install a virus using the Data Uplink device, and then destroy the terminal itself. If the virus is loaded into other terminals, it may produce helpful effects.\n\n|Objective Two: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Three: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Four: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Five: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Locate Conspiracy Evidence\n\nJonathan's report made reference to a tissue containment unit where organic samples are stored at extremely low temperatures. He believes that it could be used to cryogenically freeze bodies before surgery or dissection. Find this area and confirm the death of any of the three other passengers of the craft.\n\n|Objective Two: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Three: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Four: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nYou need to cover our tracks and rescue our friend as fast as you can. A disguise will help you do that, but it won't last forever, so make good use of it. Wipe out their records, and make sure there are no more survivors we are unaware of. Time is pressing, so hurry.\n\n|Objective One: - Obtain and Use Lab Technician Disguise\n\nFind a Lab Technician's outfit and use it to get past the security. Once you have, move fast, since the theft won't go unnoticed for long.\n\n|Objective Two: - Gain Access to Autopsy Lab\n\nA premature autopsy will soon be taking place in one of the secure medical laboratories. It will be locked to those without clearance, so get a card with the appropriate level to get in. Not all cards will work, and there may be door guards as well.\n\n|Objective Three: - Rescue the Crash Survivor\n\nOnce you are in the lab, you will have to get into the autopsy chamber before any harm comes to the subject. The scientists will try to kill him if they think he's alive or will attempt to damage what they think is a corpse as soon as they see you. Yet again, speed is vital.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtain and use lab technician disguise\n", + /* 10*/ "Destroy computer records\n", + /* 11*/ "Locate conspiracy evidence\n", + /* 12*/ "Gain access to autopsy lab\n", + /* 13*/ "Rescue the crash Survivor\n", + /* 14*/ "Research records destroyed.\n", + /* 15*/ "Obtain lab clothes.\n", + /* 16*/ "Lab Tech's\n", + /* 17*/ "Lab clothes\n", + /* 18*/ "Lab clothes\n", + /* 19*/ "Picked up lab clothes.\n", + /* 20*/ "Access to door control systems denied.\n", + /* 21*/ "Access to light control systems denied.\n", + /* 22*/ "Access to security control systems denied.\n", + /* 23*/ "Virus downloaded to console.\n", + /* 24*/ "Obtain Data Uplink.\n", + /* 25*/ "Lab Tech's\n", + /* 26*/ "Data Uplink\n", + /* 27*/ "Data Uplink\n", + /* 28*/ "Picked up Data Uplink.\n", + /* 29*/ "Laboratory accessed successfully.\n", + /* 30*/ "Data Uplink connected.\n", + /* 31*/ "Data Uplink connection broken.\n", + /* 32*/ "Obtain medlab 2 key card.\n", + /* 33*/ "Guard's\n", + /* 34*/ "Medlab 2 key card\n", + /* 35*/ "Medlab 2 key card\n", + /* 36*/ "Picked up medlab 2 key card.\n", + /* 37*/ "Who are you?\n", + /* 38*/ "Hey - you've got my clothes.\n", + /* 39*/ "Help - help!\n", + /* 40*/ "Don't shoot me!\n", + /* 41*/ "Oh, my God - a gun!\n", + /* 42*/ "There's an intruder in the complex.\n", + /* 43*/ "Give me back my clothes - or else!\n", + /* 44*/ "Right - you've asked for it!\n", + /* 45*/ "Give me my clothes.\n", + /* 46*/ "I don't have much time!!!\n", + /* 47*/ "The enemy has discovered the disguise.\n", + /* 48*/ "Virus has already been downloaded.\n", + /* 49*/ "Initiating virus download.\n", + /* 50*/ "So, you got here at last.\n", + /* 51*/ "Hey, you're not... SECURITY ALERT!\n", + /* 52*/ "No guns allowed in here - put your weapon away.\n", + /* 53*/ "I won't tell you again - lose the weapon.\n", + /* 54*/ "Right - I'm calling security.\n", + /* 55*/ "Everyone's been waiting for you...\n", + /* 56*/ "Critical mission personnel killed.\n", + /* 57*/ "Cannot gain access to autopsy lab.\n", + /* 58*/ "Hey, that's not Harry. It's an intruder.\n", + /* 59*/ "Obtain op room key card.\n", + /* 60*/ "Guard's\n", + /* 61*/ "Op room key card\n", + /* 62*/ "Op room key card\n", + /* 63*/ "Picked up operation room key card.\n", + /* 64*/ "Elvis has been killed.\n", + /* 65*/ "Get the hell out of here!\n", + /* 66*/ "Containment unit raised up.\n", + /* 67*/ "Containment unit lowered down.\n", + /* 68*/ "Mission critical equipment destroyed.\n", + /* 69*/ "Obtain X-Ray Scanner.\n", + /* 70*/ "\n", + /* 71*/ "X-Ray Scanner\n", + /* 72*/ "X-Ray Scanner\n", + /* 73*/ "Picked up X-Ray Scanner.\n", + /* 74*/ "Scanner target acquired.\n", + /* 75*/ "Target ID confirmed - XT origin.\n", + /* 76*/ "Scanner lock lost.\n", + /* 77*/ "Disguise has been worn.\n", + /* 78*/ "The showers... Now, if I can convince someone \nto part with their uniform...\n", + /* 79*/ "The temperature's dropping... You must be \nclose to the cryo room.\n", + /* 80*/ "The air's heavily recycled around here - must\n be near the autopsy lab.\n", + /* 81*/ "There he is, Jo! Hurry or you'll be too late!\n", + /* 82*/ "Leave this area now.\n", + /* 83*/ "Should you be in here?\n", + /* 84*/ "Holy...\n", + /* 85*/ "It's a spy!\n", + /* 86*/ "Warn the others...\n", + /* 87*/ "Imposter!\n", + /* 88*/ "Lighting systems overloaded.\n", + /* 89*/ "Alternative entrance to medlabs created.\n", + /* 90*/ "The problem you have is that there is no \nway to sneak into the research section. \nThe only way in available to you is a \nweak section of wall I've marked in the \nroom beyond the stores. It can be destroyed \nwith explosives.\n", + /* 91*/ "Doesn't sound like a problem to me. Where \nare these explosives?\n", + /* 92*/ "In that crate.\n", + /* 93*/ "Cute. Very cute.\n", + /* 94*/ "By the way, the stores are crawling with \nguards. It may go against your nature, but \ntry sneaking through rather than blasting \neverything.\n", + /* 95*/ "Certainly. Any other pearls of wisdom?\n", + /* 96*/ "That crate...\n", + /* 97*/ "Yes?\n", + /* 98*/ "It really doesn't like being shot.\n", + /* 99*/ "Great. Now, if I can just fight the urge \nto report him to Base Security...\n", + /*100*/ "Put your hands up and step away from the \nalien.\n", + /*101*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /*102*/ "Don't make me tell you again, Doctor. And \nturn that laser off.\n", + /*103*/ "Director Easton will hear about this, \nyoung lady.\n", + /*104*/ "Of course he's going to hear of it, you \nmoron. I've just got into his top secret \nbase, and now I'm stealing his alien.\n", + /*105*/ "Automatic Defenses Disabled.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_f.c b/src/files/lang/pal-final/lip_str_f.c new file mode 100644 index 000000000..433df94df --- /dev/null +++ b/src/files/lang/pal-final/lip_str_f.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Détruire les archives informatiques\n\nToute information sur le crash et les éléments récupérés détenue par le Secteur 51 doit être effacée de leurs fichiers. Le terminal est gardé dans une pièce fermée en haut du couloir principal. Installez un virus grâce au récepteur et détruisez le terminal. Si le virus infecte d'autres terminaux, leur réseau sera corrompu.\n\n|Objectif 2: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caissons dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort des trois autres passagers de l'appareil.\n\n|Objectif 3: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 4: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 5: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 1*/ "AREA 51 - MEDLABS\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Trouver les preuves de la conspiration\n\nLe rapport de Jonathan indique la présence de caissons dans lesquels des échantillons organiques sont maintenus à de très basses températures. Il pense que ceux-ci servent à geler des corps avant de les opérer ou de les disséquer. Trouvez cette zone et confirmez la mort d'au moins un des trois passagers de l'appareil.\n\n|Objectif 2: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 3: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 4: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. La mission est de sauver ce rescapé.\n\n|Carrington - \n\nSuivez nos pistes et sauvez notre ami le plus vite possible. Un costume vous aidera mais cela ne durera pas longtemps, alors utilisez-le avec sagesse. Effacez leurs archives et assurez-vous qu'il n'y a pas d'autres rescapés ayant échappé à notre contact. Agissez rapidement.\n\n|Objectif 1: - Obtenir et utiliser l'uniforme de labo\n\nTrouvez un uniforme de laborantin et utilisez-le pour tromper la sécurité. Une fois en votre possession, agissez vite avant que le vol ne soit repéré.\n\n|Objectif 2: - Accéder au labo d'autopsie\n\nUne autopsie prématurée sera bientôt conduite dans l'un des laboratoires de haute sécurité. Il sera fermé à tous ceux ne possédant pas de carte de niveau approprié. Trouvez-en une et accédez au labo. Certaines cartes ne fonctionneront pas et des gardes seront souvent sur votre route.\n\n|Objectif 3: - Sauver le rescapé du crash\n\nUne fois dans le labo, entrez dans la salle d'autopsie avant que le sujet ne soit en danger. Les scientifiques tenteront de le tuer s'ils le croient en vie ou endommageront ce qu'ils estiment être un cadavre dès qu'ils vous verront. Une fois encore, agissez rapidement.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtenir et utiliser l'uniforme de labo\n", + /* 10*/ "Détruire les archives informatiques\n", + /* 11*/ "Trouver les preuves de la conspiration\n", + /* 12*/ "Accéder au labo d'autopsie\n", + /* 13*/ "Sauver le rescapé du crash\n", + /* 14*/ "Archives de recherche détruites.\n", + /* 15*/ "Obtenir uniforme de labo.\n", + /* 16*/ "Laborantin: \n", + /* 17*/ "Uniforme\n", + /* 18*/ "Uniforme labo\n", + /* 19*/ "Uniforme labo obtenu.\n", + /* 20*/ "Accès système contrôle des portes refusé.\n", + /* 21*/ "Accès système contrôle éclairage refusé.\n", + /* 22*/ "Accès système contrôle sécurité refusé.\n", + /* 23*/ "Virus téléchargé dans la console.\n", + /* 24*/ "Obtenir récepteur.\n", + /* 25*/ "Laborantin: \n", + /* 26*/ "Récepteur\n", + /* 27*/ "Récepteur\n", + /* 28*/ "Récepteur obtenu.\n", + /* 29*/ "Accès laboratoire: succès.\n", + /* 30*/ "Récepteur connecté.\n", + /* 31*/ "Connexion récepteur coupée.\n", + /* 32*/ "Obtenir carte medlab 2.\n", + /* 33*/ "Garde: \n", + /* 34*/ "Carte medlab 2\n", + /* 35*/ "Carte medlab 2\n", + /* 36*/ "Carte medlab 2 obtenue.\n", + /* 37*/ "Qui êtes-vous?\n", + /* 38*/ "Hé! Mais c'est mes fringues!\n", + /* 39*/ "Au...au secours!\n", + /* 40*/ "Ne me tuez pas!\n", + /* 41*/ "Oh, mon Dieu! Une arme!\n", + /* 42*/ "Il y a un intrus dans le complexe.\n", + /* 43*/ "Donnez-moi mes vêtements, sinon...!\n", + /* 44*/ "OK. Tu l'auras voulu, poulette!\n", + /* 45*/ "Donnez-moi mes fringues.\n", + /* 46*/ "Je n'ai pas beaucoup de temps!!!\n", + /* 47*/ "L'ennemi a détecté le costume.\n", + /* 48*/ "Virus déjà téléchargé.\n", + /* 49*/ "Lancement téléchargement virus.\n", + /* 50*/ "Enfin vous voilà.\n", + /* 51*/ "Mais, vous n'êtes pas... ALEEEERTE!\n", + /* 52*/ "Armes interdites! Rangez votre arme.\n", + /* 53*/ "Je ne le répèterai pas: lâchez votre arme!\n", + /* 54*/ "Bon. J'appelle la sécurité.\n", + /* 55*/ "Tout le monde vous attendait...\n", + /* 56*/ "Personnel crucial abattu.\n", + /* 57*/ "Accès au labo d'autopsie impossible.\n", + /* 58*/ "Hé! Ce n'est pas Harry. C'est un intrus!\n", + /* 59*/ "Obtenir carte salle d'opération.\n", + /* 60*/ "Garde: \n", + /* 61*/ "Carte salle d'opération\n", + /* 62*/ "Carte salle d'opération\n", + /* 63*/ "Carte salle d'opération obtenue.\n", + /* 64*/ "Elvis a été abattu.\n", + /* 65*/ "Sortez de là, bon Dieu!!\n", + /* 66*/ "Caisson élevé.\n", + /* 67*/ "Caisson abaissé.\n", + /* 68*/ "Equipement crucial détruit.\n", + /* 69*/ "Obtenir scanner rayons X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner rayons X\n", + /* 72*/ "Scanner rayons X\n", + /* 73*/ "Scanner rayons X obtenu.\n", + /* 74*/ "Cible scanner accrochée.\n", + /* 75*/ "ID cible confirmée - origine extraterr.\n", + /* 76*/ "Cible scanner perdue.\n", + /* 77*/ "Costume porté.\n", + /* 78*/ "Les douches... Il faut convaincre quelqu'un \nde se séparer de son uniforme...\n", + /* 79*/ "La température tombe... La salle de \ncryogénisation est proche.\n", + /* 80*/ "L'air est recyclé par ici... Le labo\n d'autopsie est par là.\n", + /* 81*/ "Le voilà, Joanna! Faites vite!\n", + /* 82*/ "Quitter cette zone maintenant.\n", + /* 83*/ "Vous avez le droit d'être ici, vous?\n", + /* 84*/ "Nom de D...\n", + /* 85*/ "C'est une espionne!\n", + /* 86*/ "Prévenez les autres...\n", + /* 87*/ "Imposteur!\n", + /* 88*/ "Surcharge systèmes d'éclairage.\n", + /* 89*/ "Entrée supplémentaire aux labos créée.\n", + /* 90*/ "Vous ne pourrez trouver un moyen d'investir \nla zone de recherche, croyez-moi. \nLa seule possibilité reste une cloison \nque j'ai repérée dans une salle après \nl'entrepôt. Essayez de la faire sauter.\n", + /* 91*/ "Pas de problème. Et où sont \nles explosifs?\n", + /* 92*/ "Dans cette caisse.\n", + /* 93*/ "Hé hé. Terrible.\n", + /* 94*/ "Au fait, l'entrepôt est bourré de vigiles. \nBien que ce ne soit pas votre genre, essayez \nde vous faire discrète plutôt que de buter \ntout le monde.\n", + /* 95*/ "Entendu. Autre chose, maestro?\n", + /* 96*/ "Cette caisse...\n", + /* 97*/ "Oui?\n", + /* 98*/ "Elle n'aime pas qu'on lui tire dessus.\n", + /* 99*/ "Parfait. Bon... On va dire que \nlui il m'énerve...\n", + /*100*/ "Levez les mains et écartez-vous de \nl'extraterrestre.\n", + /*101*/ "Qu'est-ce que vous foutez ici? \nCette salle doit être scellée! \nNe connaissez-vous pas les consignes \nd'une autopsie?\n", + /*102*/ "Ne me faites pas répéter, Docteur. Et \néteignez-moi ce laser tout de suite.\n", + /*103*/ "Le Directeur Easton en sera informé, \nmademoiselle.\n", + /*104*/ "Mais j'y compte bien, mon cher! \nJe me suis amusée dans sa jolie base et \nmaintenant je vole son joujou.\n", + /*105*/ "Défenses automatiques neutralisées.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_g.c b/src/files/lang/pal-final/lip_str_g.c new file mode 100644 index 000000000..8f0b0ef16 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_g.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Löschen Sie die Aufzeichnungen!\n\nJegliche Informationen, welche die Area 51-Techniker aus dem Flugzeugwrack extrahieren konnten, muss aus ihren Datenbanken gelöscht werden. Das Hauptterminal befindet sich in einem versperrten Raum am Ende eines der Korridore. Installieren Sie mit Hilfe des Data Uplink-Geräts einen Virus, zerstören Sie anschließend das Terminal. Wenn der Virus in andere Terminals kopiert wird, ist mit hilfreichen Nebeneffekten zu rechnen.\n\n|2. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|3. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|4. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|5. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 1*/ "AREA 51 - MEDI-LABORS\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Finden Sie einen Beweis für die Verschwörung!\n\nIn Jonathans Report ist von einem Raum die Rede, in dem organische Gewebeproben bei extrem niedrigen Temperaturen gelagert werden. Er glaubt, dass man dort Körper cryogenisiert, um sie in weiterer Folge für Operationen oder Sektionen zu verwenden. Finden Sie diesen Raum und stellen Sie fest, ob die anderen drei Flugpassagiere noch am Leben sind!\n\n|2. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|3. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|4. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nSie müssen unseren Freund so schnell wie möglich retten! Sie werden in Verkleidung operieren, aber diese wird nicht ewig unerkannt bleiben. Löschen Sie alle Aufzeichnungen aus den Computern und stellen Sie fest, ob es noch weitere Überlebende gibt. Die Zeit drängt, also beeilen Sie sich, Joanna!\n\n|1. Ziel: - Verkleiden Sie sich als Labortechniker!\n\nFinden Sie eine Verkleidung und setzen Sie sie ein, um an der Security vorbeizukommen. Ist Ihnen das gelungen, müssen Sie schnell sein, da der Diebstahl nicht lange unentdeckt bleiben wird.\n\n|2. Ziel: - Verschaffen Sie sich Zutritt zum Autopsie-Labor!\n\nDemnächst findet eine zeitlich vorverlegte Autopsie in einem der gesicherten medizinischen Labors statt. Die Türen werden für alle Unbefugten verriegelt. Sie brauchen daher eine entsprechende Zutrittskarte. Aber nicht jede Karte wird funktionieren. Außerdem könnten auch noch Wachleute anwesend sein.\n\n|3. Ziel: - Retten Sie den Überlebenden des Absturzes!\n\nSobald Sie im Labor sind, müssen Sie den Autopsie-Saal erreichen, bevor dem 'Patienten' etwas zustößt. Die Wissenschaftler werden versuchen, ihn auszuschalten, wenn sie bemerken, dass er noch lebt. Andernfalls werden sie den vermeintlich leblosen Körper beschädigen, sobald sie Sie sehen, Joanna. Einmal mehr ist Geschwindigkeit von höchster Notwendigkeit!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Verkleiden Sie sich als Labortechniker!\n", + /* 10*/ "Vernichten Sie die Aufzeichnungen!\n", + /* 11*/ "Finden Sie den Beweis!\n", + /* 12*/ "Verschaffen Sie sich Zutritt zum Labor!\n", + /* 13*/ "Retten Sie den Überlebenden!\n", + /* 14*/ "Aufzeichnungen zerstört.\n", + /* 15*/ "Finden Sie die Laborkleidung!\n", + /* 16*/ "eines Technikers\n", + /* 17*/ "Laborkleidung\n", + /* 18*/ "Laborkleidung eines Technikers\n", + /* 19*/ "Laborkleidung aufgenommen\n", + /* 20*/ "Zugriff auf den Türöffnungsmechanismus verweigert\n", + /* 21*/ "Zugriff auf die Beleuchtungskontrollen verweigert\n", + /* 22*/ "Zugriff auf das Sicherheitssystem verweigert\n", + /* 23*/ "Virus wurde installiert.\n", + /* 24*/ "Finden Sie das Data Uplink-Gerät!\n", + /* 25*/ "des Labortechnikers\n", + /* 26*/ "Data Uplink-Gerät\n", + /* 27*/ "Data Uplink-Gerät\n", + /* 28*/ "Data Uplink-Gerät aufgenommen\n", + /* 29*/ "Zutritt zum Labor erfolgreich durchgeführt\n", + /* 30*/ "Verbindung hergestellt\n", + /* 31*/ "Verbindung abgebrochen\n", + /* 32*/ "Erlangen Sie die Schlüsselkarte für Medlab 2.\n", + /* 33*/ "der Wache\n", + /* 34*/ "Medlab 2-Schlüsselkarte\n", + /* 35*/ "Medlab 2-Schlüsselkarte\n", + /* 36*/ "Medlab 2-Schlüsselkarte aufgenommen\n", + /* 37*/ "Wer sind Sie?\n", + /* 38*/ "Hey - Sie haben meine Ausrüstung.\n", + /* 39*/ "Hilfe! Hilfe!\n", + /* 40*/ "Nicht schießen!\n", + /* 41*/ "Oh nein, eine Waffe!\n", + /* 42*/ "Es befindet sich ein Eindringling im Komplex.\n", + /* 43*/ "Geben Sie mir meine Ausrüstung zurück, oder...!\n", + /* 44*/ "Na gut, Sie betteln ja förmlich darum!\n", + /* 45*/ "Geben Sie mir meine Ausrüstung.\n", + /* 46*/ "Ich habe nicht viel Zeit!!!\n", + /* 47*/ "Der Feind hat die Tarnung durchschaut.\n", + /* 48*/ "Der Virus wurde bereits installiert.\n", + /* 49*/ "Virusinstallation initiiert.\n", + /* 50*/ "Sie haben es bis hierher geschafft.\n", + /* 51*/ "Hey, Sie sind nicht... ALARM! ALARM!\n", + /* 52*/ "Waffen sind hier nicht erlaubt. Legen Sie Ihre Waffe ab.\n", + /* 53*/ "Ich sage es nur einmal: Legen Sie die Waffe ab!\n", + /* 54*/ "Na gut, ich rufe die Security.\n", + /* 55*/ "Alle haben nur auf Sie gewartet...\n", + /* 56*/ "Wichtige Person eliminiert.\n", + /* 57*/ "Zugang zum Autopsie-Labor kann nicht erfolgen.\n", + /* 58*/ "Hey, das ist nicht Harry. Es ist ein Eindringling.\n", + /* 59*/ "Erlangen Sie die Schlüsselkarte zum OP!\n", + /* 60*/ "der Wache\n", + /* 61*/ "OP-Schlüsselkarte\n", + /* 62*/ "OP-Schlüsselkarte\n", + /* 63*/ "OP-Schlüsselkarte aufgenommen.\n", + /* 64*/ "Elvis wurde eliminiert.\n", + /* 65*/ "Mach, dass du hier rauskommst!\n", + /* 66*/ "Abwehreinheit wurde hochgefahren.\n", + /* 67*/ "Abwehreinheit wurde heruntergefahren.\n", + /* 68*/ "Wichtige Ausrüstung wurde zerstört.\n", + /* 69*/ "Finden Sie den Röntgen-Scanner.\n", + /* 70*/ "\n", + /* 71*/ "Röntgen-Scanner\n", + /* 72*/ "Röntgen-Scanner\n", + /* 73*/ "Röntgen-Scanner aufgenommen\n", + /* 74*/ "Scanner-Ziel erfasst\n", + /* 75*/ "Ziel-ID bestätigt - extraterrestrischer Ursprung.\n", + /* 76*/ "Scanner-Erfassung unterbrochen\n", + /* 77*/ "Verkleidung wurde getragen.\n", + /* 78*/ "Die Duschen... Wenn ich jemanden überzeugen kann, \nsich von seiner Uniform zu trennen...\n", + /* 79*/ "Die Temperatur fällt... Du musst \nin der Nähe des Cryo-Raums sein.\n", + /* 80*/ "Die Luft riecht, als ob sie stark gefiltert worden ist.\n Das Autopsie-Labor muss nahe sein.\n", + /* 81*/ "Da ist er, Jo! Rasch, oder du kommst zu spät!\n", + /* 82*/ "Verlassen Sie sofort dieses Gebiet!\n", + /* 83*/ "Dürfen Sie sich hier aufhalten?\n", + /* 84*/ "Was zum...\n", + /* 85*/ "Ein Spion!\n", + /* 86*/ "Warnt die anderen!\n", + /* 87*/ "Betrüger!\n", + /* 88*/ "Beleuchtungssystem überladen.\n", + /* 89*/ "Alternativer Zugang zu den medizinischen Labors erschaffen\n", + /* 90*/ "Das Problem ist, dass es keine Möglichkeit gibt, \nsich in die Forschungsabteilung zu schleichen. \nAber ich habe im Raum hinter den Lagerräumen \neine brüchige Stelle an der Wand markiert. \nAn dieser Stelle kannst du Sprengkörper anbringen, \num ein Loch in die Wand zu sprengen.\n", + /* 91*/ "Klingt nicht sehr problematisch. Wo \nfinde ich die Sprengkörper?\n", + /* 92*/ "In dieser Kiste.\n", + /* 93*/ "Reizend. Wirklich reizend.\n", + /* 94*/ "Ganz nebenbei: Die Lagerräume sind voller \nWachen. Es mag vielleicht nicht deinem Naturell \nentsprechen, aber du solltest dich eher \nanschleichen, als alles in die Luft zu jagen.\n", + /* 95*/ "Aber klar. Hast du noch weitere Perlen der Weisheit?\n", + /* 96*/ "Diese Kiste...\n", + /* 97*/ "Ja?\n", + /* 98*/ "Sie mag es nicht, wenn man auf sie schießt.\n", + /* 99*/ "Großartig! Wenn ich jetzt noch mein Verlangen \nunterdrücken könnte, dich zu verpfeifen...\n", + /*100*/ "Hände hoch und weg von dem Alien!\n", + /*101*/ "Was, zum Henker, glauben Sie hier zu tun? \nDieser Raum sollte versiegelt sein! \nWissen Sie gar nichts über den Vorgang \nder Autopsie?\n", + /*102*/ "Fordern Sie es nicht heraus, Doktor. Und \nschalten Sie diesen Laser ab!\n", + /*103*/ "Direktor Easton wird über diesen Vorfall \ninformiert werden, junge Dame.\n", + /*104*/ "Natürlich wird er darüber informiert werden, \nSie Trottel. Immerhin bin ich gerade in seine \ngeheime Basis eingedrungen und stehle das Alien.\n", + /*105*/ "Automatische Verteidigung wurde deaktiviert.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_i.c b/src/files/lang/pal-final/lip_str_i.c new file mode 100644 index 000000000..795428fe6 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_i.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Distruggi i file di ricerca nel PC\n\nLe informazioni che i tecnici dell'Area 51 sono riusciti ad ottenere dai resti del disastro devono essere eliminate dalla loro banca dati. Il terminale centrale si trova in una stanza chiusa a chiave in fondo al corridoio principale. Installa un virus tramite il Connettore Dati e poi distruggi anche il computer. Se il virus viene propagato anche agli altri terminali potrebbe avere effetti formidabili.\n\n|Obiettivo 2: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 3: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 4: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 5: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 1*/ "AREA 51 - LABORATORI MEDICI\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Trova le prove della cospirazione\n\nNella sua relazione Jonathan menzionava un'unità di contenimento tessuti in cui vengono conservati campioni di tessuto organico a temperature molto basse. Ritiene che tale unità possa servire a congelare criogenicamente i corpi prima di interventi chirurgici o di sezionamento. Trova questa unità e conferma la morte dei tre passeggeri del velivolo.\n\n|Obiettivo 2: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 3: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 4: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nDevi fare un lavoro pulito senza lasciare tracce e portare in salvo il nostro uomo più in fretta che puoi. Un travestimento ti sarà utile, ma non durerà in eterno, quindi cerca di farne buon uso. Distruggi le informazioni che hanno raccolto e assicurati che non ci siano altri sopravvissuti di cui siamo ignari. Il tempo stringe: sbrigati!\n\n|Obiettivo 1: - Procurati travestimento da tecnico\n\nTrova un camice di uno dei tecnici di laboratorio e indossalo per superare la sicurezza. Una volta che ti sarai travestita muoviti in fretta, poiché il tuo furto non passerà inosservato per molto!\n\n|Obiettivo 2: - Entra nel laboratorio autopsie\n\nIn uno dei laboratori medici di sicurezza avrà presto luogo un'autopsia. Sarà vietato l'accesso a tutti coloro senza autorizzazione, quindi procurati la tessera giusta per entrare. Ricorda che non tutte le tessere funzioneranno e che in alcuni punti potrai anche trovare delle guardie.\n\n|Obiettivo 3: - Salva il sopravvissuto al disastro\n\nUna volta nel laboratorio dovrai riuscire ad accedere alla sala autopsie prima che succeda qualcosa al soggetto in questione. Gli scienziati tenteranno di ucciderlo se scoprono che è ancora vivo o cercheranno di danneggiare ciò che ritengono essere un cadavere non appena si accorgono chi sei. Attenzione, ancora una volta la velocità è fondamentale!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Procurati travestimento da tecnico\n", + /* 10*/ "Distruggi i file nel PC\n", + /* 11*/ "Trova le prove della cospirazione\n", + /* 12*/ "Entra nel laboratorio autopsie\n", + /* 13*/ "Salva il sopravvissuto al disastro\n", + /* 14*/ "Distrutti file di ricerca\n", + /* 15*/ "Procurati camice\n", + /* 16*/ "Tecnico di laboratorio:\n", + /* 17*/ "Camice\n", + /* 18*/ "Camice\n", + /* 19*/ "Preso camice\n", + /* 20*/ "Negato accesso al sistema comando porte\n", + /* 21*/ "Negato accesso al sistema comando luci\n", + /* 22*/ "Negato accesso al sistema comando sicurezza\n", + /* 23*/ "Scaricato il virus\n", + /* 24*/ "Procurati Connettore Dati.\n", + /* 25*/ "Tecnico di laboratorio:\n", + /* 26*/ "C. Dati\n", + /* 27*/ "Connettore Dati\n", + /* 28*/ "Preso Connettore Dati.\n", + /* 29*/ "Accesso laboratorio: riuscito.\n", + /* 30*/ "Connettore Dati connesso.\n", + /* 31*/ "Connessione Connettore Dati interrotta.\n", + /* 32*/ "Procurati tessera lab.2\n", + /* 33*/ "Guardia:\n", + /* 34*/ "Tessera lab.2\n", + /* 35*/ "Tessera lab.2 \n", + /* 36*/ "Presa tessera lab.2\n", + /* 37*/ "Chi diavolo sei?\n", + /* 38*/ "Ehi, hai rubato il mio camice!\n", + /* 39*/ "Aiuto, aiuto!!!\n", + /* 40*/ "Non spararmi!\n", + /* 41*/ "Oh, maledizione! Una pistola!\n", + /* 42*/ "C'è un intruso nel complesso!\n", + /* 43*/ "Ridammi il camice, altrimenti...\n", + /* 44*/ "Bene, l'hai voluto tu!\n", + /* 45*/ "Ridammi indietro il camice!\n", + /* 46*/ "Non ho molto tempo!!!\n", + /* 47*/ "Il nemico ha scoperto il travestimento.\n", + /* 48*/ "Il virus è già stato scaricato.\n", + /* 49*/ "Scaricamento virus in corso...\n", + /* 50*/ "Bene, finalmente sei qui!\n", + /* 51*/ "Ehi, ma tu non sei... SICUREZZA ALL'ERTA!\n", + /* 52*/ "Non sono ammesse pistole qui: posa quell'arma!\n", + /* 53*/ "Non fartelo ripetere: posa l'arma!\n", + /* 54*/ "Benissimo, chiamerò la sicurezza!\n", + /* 55*/ "Ti stavamo giusto aspettando...\n", + /* 56*/ "Ucciso personale essenziale alla missione.\n", + /* 57*/ "Non puoi accedere al laboratorio.\n", + /* 58*/ "Ehi, non è Harry! È un intruso!!!\n", + /* 59*/ "Procurati chiave sala operatoria.\n", + /* 60*/ "Guardia:\n", + /* 61*/ "Chiave sala operatoria\n", + /* 62*/ "Chiave sala operatoria\n", + /* 63*/ "Presa chiave sala operatoria.\n", + /* 64*/ "Elvis è stato ucciso.\n", + /* 65*/ "Porta il tuo muso fuori di qua!\n", + /* 66*/ "Alzata unità di contenimento.\n", + /* 67*/ "Abbassata unità di contenimento.\n", + /* 68*/ "Distrutto strumento essenziale alla missione.\n", + /* 69*/ "Procurati scanner a raggi X.\n", + /* 70*/ "\n", + /* 71*/ "Scanner a raggi X\n", + /* 72*/ "Scanner a raggi X\n", + /* 73*/ "Preso scanner a raggi X.\n", + /* 74*/ "Localizzato obiettivo scanner\n", + /* 75*/ "Obiettivo identificato: extraterrestre\n", + /* 76*/ "Perso obiettivo scanner\n", + /* 77*/ "Indossato il travestimento\n", + /* 78*/ "Le docce... Se riuscissi a convincere \nqualcuno a cedermi il camice...\n", + /* 79*/ "La temperatura sta scendendo: devi essere \nvicino alla sala criogena.\n", + /* 80*/ "Qui c'è un forte ricircolo d'aria: devi essere \nvicino al laboratorio autopsie.\n", + /* 81*/ "Eccolo, Jo! Fa presto o sarà troppo tardi!\n", + /* 82*/ "Abbandona subito quest'area.\n", + /* 83*/ "Che diavolo ci fai qua?\n", + /* 84*/ "Santo...\n", + /* 85*/ "È una spia, dannazione!\n", + /* 86*/ "Avverti gli altri...\n", + /* 87*/ "Impostore!\n", + /* 88*/ "Sistema di illuminazione in sovraccarico\n", + /* 89*/ "Creato ingresso alternativo ai laboratori\n", + /* 90*/ "Il tuo problema è che non esiste nessun \nmodo per infiltrarsi nel reparto ricerca. \nL'unica possibilità è un sottile tratto \ndi muro che ho contrassegnato nella stanza \ndietro ai magazzini. Lo potrai abbattere \ncon un po' di esplosivo.\n", + /* 91*/ "Non mi pare si tratti di un problema! \nDov'è l'esplosivo?\n", + /* 92*/ "In quella cassa!\n", + /* 93*/ "Fantastico... veramente!\n", + /* 94*/ "Ah, a proposito... i magazzini brulicano \ndi guardie. Magari è contro la tua natura, \nma cerca di insinuarti in mezzo a loro, \npiuttosto che far saltar per aria tutto!\n", + /* 95*/ "Certamente! Altri consigli illuminanti?\n", + /* 96*/ "Quella cassa...\n", + /* 97*/ "Allora?\n", + /* 98*/ "Meglio non sparargli contro...\n", + /* 99*/ "Bravo ragazzo! Cercherò di resistere \nal piacere di denunciarti alle forze \ndi sicurezza della base...\n", + /*100*/ "Mani in alto e sta lontano dall'alieno.\n", + /*101*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /*102*/ "Non se lo faccia ripetere, Dottore! \nSpenga subito quel laser!\n", + /*103*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /*104*/ "Certo che lo verrà a sapere, idiota! \nSono riuscita ad entrare nella sua base \nsegretissima e ora sto anche rubando il \nsuo alieno. E non lo deve venire a \nsapere?! Fammi ridere!!!\n", + /*105*/ "Disattivate difese automatiche\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lip_str_s.c b/src/files/lang/pal-final/lip_str_s.c new file mode 100644 index 000000000..8dc2741e8 --- /dev/null +++ b/src/files/lang/pal-final/lip_str_s.c @@ -0,0 +1,112 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Destruir Registros Científicos del Ordenador\n\nCualquier información y objetos que los técnicos del Área 51 hayan sido capaces de sacar de los restos del choque deben ser suprimidos de sus bases de datos. La terminal del banco principal está en una habitación cerrada en el corredor principal. Instala un virus usando el Conector de Datos, y destruye la propia terminal. Si el virus es instalado en otras terminales, producirá efectos beneficiosos.\n\n|Objetivo Dos: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este área y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Tres: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Cuatro: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cinco: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 1*/ "ÁREA 51 - LABORATORIOS MÉDICOS\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Localizar Evidencias de Conspiración\n\nEl informe de Jonathan hace referencia a contenedores de tejido donde se guardan muestras orgánicas a temperaturas extremadamente bajas. Él cree que se pueden usar para congelar cuerpos criogénicamente antes de la cirugía o la disección. Encuentra este área y confirma las muertes de cualquiera de los otros tres pasajeros de la nave.\n\n|Objetivo Dos: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Tres: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Cuatro: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nNecesitas cubrir nuestras pistas y rescatar a nuestro amigo tan rápido como puedas. Un disfraz te ayudará, pero no para siempre, así que úsalo bien. Borra sus grabaciones, y asegúrate de que no haya más supervivientes que los que conocemos. El tiempo apremia, así que date prisa.\n\n|Objetivo Uno: - Obtener y Usar el Disfraz de Técnico de Laboratorio\n\nEncuentra un traje de técnico de laboratorio y úsalo para pasar el control de seguridad. Una vez hecho esto, muévete rápido, ya que el engaño no durará mucho.\n\n|Objetivo Dos: - Acceder al Laboratorio de Autopsias\n\nPronto se practicará una autopsia prematura en uno de los laboratorios médicos seguros. Será cerrado para todos aquellos sin autorización, así que obtén una tarjeta del nivel adecuado. No todas las tarjetas valen, y también hay guardas en las puertas.\n\n|Objetivo Tres: - Rescatar al Superviviente del Impacto\n\nUna vez en el laboratorio, deberás entrar en la cámara de autopsias antes de que dañen al sujeto. Los científicos intentarán matarle si piensan que está vivo o lo dañarán si piensan que es un cadáver en cuanto te vean. Otra vez, la velocidad es vital.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Obtener y usar el disfraz de técnico\n", + /* 10*/ "Destruir registros del ordenador\n", + /* 11*/ "Localizar evidencias de conspiración\n", + /* 12*/ "Acceder al laboratorio de autopsias\n", + /* 13*/ "Rescatar al Superviviente del impacto\n", + /* 14*/ "Registros científicos destruidos.\n", + /* 15*/ "Obtén ropas de laboratorio.\n", + /* 16*/ "Técnico:\n", + /* 17*/ "Ropas lab.\n", + /* 18*/ "Ropas de laboratorio\n", + /* 19*/ "Ropas de laboratorio obtenidas.\n", + /* 20*/ "Acceso al sistema de control de puertas denegado.\n", + /* 21*/ "Acceso al sistema de control de luces denegado.\n", + /* 22*/ "Acceso al sistema de control de seguridad denegado.\n", + /* 23*/ "Virus descargado en la consola.\n", + /* 24*/ "Obtén el Conector de Datos.\n", + /* 25*/ "Técnico:\n", + /* 26*/ "C. Datos\n", + /* 27*/ "Conector de Datos\n", + /* 28*/ "Conector de Datos obtenido.\n", + /* 29*/ "Has accedido al laboratorio con éxito.\n", + /* 30*/ "Conector de Datos en marcha.\n", + /* 31*/ "Conexión perdida.\n", + /* 32*/ "Obtén llave magnética del lab. 2.\n", + /* 33*/ "Guarda:\n", + /* 34*/ "Llave del lab. 2\n", + /* 35*/ "Llave magnética del lab. 2\n", + /* 36*/ "Llave magnética del lab. 2 obtenida.\n", + /* 37*/ "¿Y tú quién eres?\n", + /* 38*/ "Hey. Tienes mis ropas.\n", + /* 39*/ "¡Socorro, socorro!\n", + /* 40*/ "¡No me dispares!\n", + /* 41*/ "¡Oh, Dios mío, un arma!\n", + /* 42*/ "Hay un intruso en el complejo.\n", + /* 43*/ "Dame mis ropas... ¡o verás!\n", + /* 44*/ "Vale. ¡Tú lo has querido!\n", + /* 45*/ "Dame mis ropas.\n", + /* 46*/ "¡¡¡No tengo mucho tiempo!!!\n", + /* 47*/ "El enemigo ha descubierto el disfraz.\n", + /* 48*/ "El virus ya ha sido descargado.\n", + /* 49*/ "Iniciando descarga del virus.\n", + /* 50*/ "Así que por fin has llegado.\n", + /* 51*/ "Hey, tú no eres... ¡ALERTA, SEGURIDAD!\n", + /* 52*/ "No se permiten armas aquí. Deja tu arma.\n", + /* 53*/ "No te lo diré de nuevo. Tira tu arma.\n", + /* 54*/ "Vale. Estoy llamando a seguridad.\n", + /* 55*/ "Todos te están esperando...\n", + /* 56*/ "Ha muerto personal crítico de la misión.\n", + /* 57*/ "No puedes acceder al laboratorio de autopsias.\n", + /* 58*/ "Hey, ése no es Harry. Es un intruso.\n", + /* 59*/ "Obtén llave magnética del quirófano.\n", + /* 60*/ "Guarda:\n", + /* 61*/ "Llave del quirófano\n", + /* 62*/ "Llave magnética del quirófano\n", + /* 63*/ "Llave magnética del quirófano obtenida.\n", + /* 64*/ "Elvis ha muerto.\n", + /* 65*/ "¡Salgamos de aquí!\n", + /* 66*/ "Contenedor subido.\n", + /* 67*/ "Contenedor bajado.\n", + /* 68*/ "Equipo crítico de la misión destruido.\n", + /* 69*/ "Obtén Escáner de Rayos-X.\n", + /* 70*/ "\n", + /* 71*/ "Escáner de Rayos-X\n", + /* 72*/ "Escáner de Rayos-X\n", + /* 73*/ "Escáner de Rayos-X obtenido.\n", + /* 74*/ "Sujeto de escaneo adquirido.\n", + /* 75*/ "ID. del sujeto confirmada - Origen E.T.\n", + /* 76*/ "Conexión del escáner perdida.\n", + /* 77*/ "El disfraz ha sido usado.\n", + /* 78*/ "Las duchas... Ahora, si pudiera convencer a alguien \npara irme con su uniforme...\n", + /* 79*/ "La temperatura está bajando... Debes de estar \ncerca de la sala de criogenización.\n", + /* 80*/ "El aire está fuertemente reciclado aquí: debo\n estar cerca del laboratorio de autopsias.\n", + /* 81*/ "¡Ahí está, Joanna! ¡Deprisa o será tarde!\n", + /* 82*/ "Salga de este área.\n", + /* 83*/ "¿Debe estar dentro?\n", + /* 84*/ "Por t...\n", + /* 85*/ "¡Es una espía!\n", + /* 86*/ "Avisa a los otros...\n", + /* 87*/ "¡Impostora!\n", + /* 88*/ "Sistemas de luz sobrecargados.\n", + /* 89*/ "Creada entrada alternativa a los laboratorios.\n", + /* 90*/ "El problema que tienes es que no hay ningún \nmodo de entrar en la sección de desarrollo. \nEl único camino disponible es una parte \ndébil del muro que he marcado en la \nhabitación tras los almacenes. Puede ser \ndestruida con explosivos.\n", + /* 91*/ "No me parece un problema. ¿Dónde\nestán esos explosivos?\n", + /* 92*/ "En esa caja.\n", + /* 93*/ "Bien. Muy bien.\n", + /* 94*/ "Eso sí, los almacenes están repletos de \nguardas. Puede ir contra tu naturaleza, \npero intenta evitarlos antes de hacer \nsaltar todo por los aires.\n", + /* 95*/ "Ciertamente. ¿Alguna otra perla de sabiduría?\n", + /* 96*/ "Esa caja...\n", + /* 97*/ "¿Sí?\n", + /* 98*/ "No le gusta que le disparen.\n", + /* 99*/ "Genial. Ahora, si sólo pudiera luchar contra \nel impulso de informar de él a Seguridad...\n", + /*100*/ "Levantad las manos y alejaos del\nalienígena.\n", + /*101*/ "¿Qué demonios te crees que estás haciendo? \n¡Esto se supone que es una sala sellada! \n¿No sabes nada acerca de los procedimientos \nde autopsia?\n", + /*102*/ "No me haga repetírselo, doctor. Y \napague ese láser.\n", + /*103*/ "El Director Easton se enterará de esto, \njovencita.\n", + /*104*/ "Por supuesto que va a enterarse, idiota. \nHe logrado entrar en su base ultra-secreta, \ny ahora le estoy robando su alienígena.\n", + /*105*/ "Defensas Automáticas Desactivadas.\n", + /*106*/ NULL, + /*107*/ NULL, +}; diff --git a/src/files/lang/pal-final/lueE.c b/src/files/lang/pal-final/lueE.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-final/lueE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-final/lueJ.c b/src/files/lang/pal-final/lueJ.c new file mode 100644 index 000000000..8446ed412 --- /dev/null +++ b/src/files/lang/pal-final/lueJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down the robot interceptors themselves will be a problem. Take out as many of the grounded units out as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful you must destroy the radar control unit with the explosives. This might activate a backup system, so be careful.\n\n|Objective Two: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft as well which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Plant Comms Rider On Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a keycard to operate the lift, and that a maintenance technicians will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is unfortunately as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shutdown Air Intercept Radar\n", + /* 10*/ "Plant Comms Device On Antenna\n", + /* 11*/ "Disable All Robot Interceptors\n", + /* 12*/ "Gain Access To Hangar Lift\n", + /* 13*/ "Make Contact With C.I. Spy\n", + /* 14*/ "Obtain Grenades\n", + /* 15*/ "Dr Carolls\n", + /* 16*/ "Grenade\n", + /* 17*/ "An Grenade\n", + /* 18*/ "Picked up a Grenade\n", + /* 19*/ "Robot Interceptor Disabled\n", + /* 20*/ "All Robot Interceptors Disabled\n", + /* 21*/ "Obtain Comms Rider\n", + /* 22*/ "Dr Carolls\n", + /* 23*/ "Comms Rider\n", + /* 24*/ "Comms Rider\n", + /* 25*/ "Picked up Comms Rider\n", + /* 26*/ "Communications Bug Placed Correctly\n", + /* 27*/ "Communications Bug Placed Incorrectly\n", + /* 28*/ "Antenna Has Been Destroyed\n", + /* 29*/ "Antenna Raised\n", + /* 30*/ "Antenna Lowered\n", + /* 31*/ "Obtain Lift Keycard\n", + /* 32*/ "Dr Carolls\n", + /* 33*/ "Lift Keycard\n", + /* 34*/ "Lift Keycard\n", + /* 35*/ "Picked up Lift Keycard\n", + /* 36*/ "Lift Access Denied - Keycard Needed\n", + /* 37*/ "Keycard Accepted - Lift Operational\n", + /* 38*/ "Lift Is Fully Operational\n", + /* 39*/ "Hangar Has Been Accessed\n", + /* 40*/ "Met up with CI Agent\n", + /* 41*/ "Air Intercept Radar Shutdown\n", + /* 42*/ "Critical Mission Object Destroyed\n", + /* 43*/ "Main Gate Has Been Opened\n", + /* 44*/ "Main Gate Has Been Closed\n", + /* 45*/ "Access Denied\n", + /* 46*/ "Explosive has been placed\n", + /* 47*/ "Foreign object detected - security fields activated\n", + /* 48*/ "Obtain Explosive\n", + /* 49*/ "Dr Carolls\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up Explosives\n", + /* 53*/ "The air intercept radar is controlled from that\nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug\nthat high!\n", + /* 55*/ "The Hangar lift is the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift Access Terminals Destroyed\n", + /* 58*/ "Okay, Joanna, take a look at this. Our operative inside Area 51 was able to get this out to us.", + /* 59*/ "This is your entry point; a deserted helipad on the edge of the base.", + /* 60*/ "The lift down to the hangars and the rendezvous point is beyond that wall; watch out for these guards.", + /* 61*/ "Here is the communications antenna; attach a comms rider bug so we can talk to you when you're inside the base. Again, watch out for hostiles.", + /* 62*/ "Oh my god!", + /* 63*/ "Here is our friend. He appears to be physically unhurt, though he hasn't regained consciousness yet. By the look of it, the surgeons are almost done with their preliminary tests and will begin dissection soon.", + /* 64*/ "But who was...?", + /* 65*/ "Any questions? No? Good. Away you go to the hangar.", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against my better judgement, I'm about to enter Area 51.", + /* 67*/ "Agent Dark! Over here!", + /* 68*/ "There you are! I was beginning to wonder if...", + /* 69*/ "If what?", + /* 70*/ "If you'd been discovered yet. And frankly, if this is how you work, I'm amazed that you lasted longer than five minutes.", + /* 71*/ "I was tidying up one of your loose ends.", + /* 72*/ "My loose ends?", + /* 73*/ "I'm sorry, I didn't realise you wanted him to shoot you. I can call in some more guards if you like.", + /* 74*/ "Okay, okay, forget about it. I'm going to let the Institute know we've made contact.", + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/lueP.c b/src/files/lang/pal-final/lueP.c new file mode 100644 index 000000000..9706fbe27 --- /dev/null +++ b/src/files/lang/pal-final/lueP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Disable Grounded Robot Interceptors\n\nEven with the Air Intercept Radar down, the robot interceptors themselves will be a problem. Take out as many of the grounded units as possible; our last sat photo showed two on the ground, but there may be more.\n\n|Objective Four: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Five: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Plant Comms Rider on Antenna Array\n\nThe underground sections of Area 51 are protected from eavesdropping devices, which means that our link with you will be broken as soon as you enter the base. To remedy this, you should place a Communications Rider device on the satellite dish near the foot entrance.\n\n|Objective Three: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Four: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nThis is a disaster for us, Joanna. We need to get our ally out of there before it becomes too late. And there was some special equipment inside the craft, as well, which must not remain in Trent Easton's clutches. You'll have some support on this mission in the form of our spy inside Area 51 who is disguised as a guard.\n\n|Objective One: - Shut Down Air Intercept Radar\n\nThis device was capable of penetrating the stealth shielding of our allies' craft so that the robot interceptors could be vectored in to bring them down. If your escape is to be successful, you must destroy the radar control unit with the explosives, and it will likely be hidden underground surrounded by lots of mainframes.\n\n|Objective Two: - Gain Access to Hangar Lift\n\nGoing in through the foot entrance would be suicide, so direct your attention to the hangar lift instead. Our spy reports that you need a key card to operate the lift and that a maintenance technician will be your best bet to find one.\n\n|Objective Three: - Make Contact With Agent\n\nOur agent will be dressed as a guard. It means he cannot stray too far from his posting inside the base without attracting attention, so it's up to you to find him. He is stationed in one of the two main hangar levels, which is, unfortunately, as specific as we can be.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Shut down air intercept radar\n", + /* 10*/ "Plant comms device on antenna\n", + /* 11*/ "Disable all robot interceptors\n", + /* 12*/ "Gain access to hangar lift\n", + /* 13*/ "Make contact with CI spy\n", + /* 14*/ "Obtain grenades.\n", + /* 15*/ "Dr. Caroll's\n", + /* 16*/ "Grenade\n", + /* 17*/ "A grenade\n", + /* 18*/ "Picked up a grenade.\n", + /* 19*/ "Robot interceptor disabled.\n", + /* 20*/ "All robot interceptors disabled.\n", + /* 21*/ "Obtain comms rider.\n", + /* 22*/ "Dr. Caroll's\n", + /* 23*/ "Comms rider\n", + /* 24*/ "Comms rider\n", + /* 25*/ "Picked up comms rider.\n", + /* 26*/ "Communications bug placed correctly.\n", + /* 27*/ "Communications bug placed incorrectly.\n", + /* 28*/ "Antenna has been destroyed.\n", + /* 29*/ "Antenna raised.\n", + /* 30*/ "Antenna lowered.\n", + /* 31*/ "Obtain lift key card.\n", + /* 32*/ "Dr. Caroll's\n", + /* 33*/ "Lift key card\n", + /* 34*/ "Lift key card\n", + /* 35*/ "Picked up lift key card.\n", + /* 36*/ "Lift access denied - key card needed.\n", + /* 37*/ "Key card accepted - lift operational.\n", + /* 38*/ "Lift is fully operational.\n", + /* 39*/ "Hangar has been accessed.\n", + /* 40*/ "Met up with CI agent.\n", + /* 41*/ "Air intercept radar shut down.\n", + /* 42*/ "Critical mission object destroyed.\n", + /* 43*/ "Main gate has been opened.\n", + /* 44*/ "Main gate has been closed.\n", + /* 45*/ "Access denied.\n", + /* 46*/ "Explosive has been placed.\n", + /* 47*/ "Intruder detected - security system online.\n", + /* 48*/ "Obtain explosive.\n", + /* 49*/ "Dr. Caroll's\n", + /* 50*/ "Explosives\n", + /* 51*/ "Explosives\n", + /* 52*/ "Picked up explosives.\n", + /* 53*/ "The air intercept radar is controlled from that \nbunker.\n", + /* 54*/ "There's the antenna, but... I can't throw a bug \nthat high!\n", + /* 55*/ "The hangar lift is on the other side \nof that huge door.\n", + /* 56*/ "Careful with that trigger finger, Agent Dark - \nyou're closing in on my position.\n", + /* 57*/ "Lift access terminals destroyed.\n", + /* 58*/ "Okay, Joanna, take a look at this. Our \noperative inside Area 51 was able to get \nthis out to us.\n", + /* 59*/ "This is your entry point... A deserted helipad \non the edge of the base.\n", + /* 60*/ "The lift down to the hangars and the \nrendezvous point is beyond that wall... \nWatch out for these guards.\n", + /* 61*/ "Here is the communications antenna. \nAttach a comms rider bug so we can talk to \nyou when you're inside the base. Again, \nwatch out for hostiles.\n", + /* 62*/ "Oh, my God!\n", + /* 63*/ "Here is our friend. He appears to be \nphysically unhurt, though he hasn't \nregained consciousness yet. By the look \nof it, the surgeons are almost done with \ntheir preliminary tests and will begin \ndissection soon.\n", + /* 64*/ "But who was...?\n", + /* 65*/ "Any questions? No. Good. Away you go to \nthe hangar.\n", + /* 66*/ "Agent Dark Mission Log, 1028 hours. Against \nmy better judgement, I'm about to enter \nArea 51.\n", + /* 67*/ "Agent Dark! Over here!\n", + /* 68*/ "There you are! I was beginning to wonder \nif...\n", + /* 69*/ "If what?\n", + /* 70*/ "If you'd been discovered yet. And frankly, \nif this is how you work, I'm amazed that \nyou lasted longer than five minutes.\n", + /* 71*/ "I was tidying up one of your loose ends.\n", + /* 72*/ "My loose ends?\n", + /* 73*/ "I'm sorry, I didn't realize you wanted him \nto shoot you. I can call in some more guards \nif you like.\n", + /* 74*/ "Okay, okay, forget about it. I'm going to let \nthe Institute know we've made contact.\n", + /* 75*/ "Foreign object detected - security alerted.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_f.c b/src/files/lang/pal-final/lue_str_f.c new file mode 100644 index 000000000..55cdb911a --- /dev/null +++ b/src/files/lang/pal-final/lue_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Désactiver robots Interceptors\n\nUne fois le radar coupé, les robots Interceptors vous poseront un problème. Détruisez un maximum d'unités au sol. Notre dernière photo satellite en révèle deux mais il risque d'y en avoir plus.\n\n|Objectif 4: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 5: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 1*/ "AREA 51 - EXTERIOR\n", + /* 2*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Installer Déroute-Comms sur antenne\n\nLes zones souterraines du Secteur 51 sont protégées par des mouchards, ce qui neutralisera notre connexion dès que vous entrerez dans la base. Pour y remédier, placez un Déroute-Comms sur l'antenne satellite près de l'entrée.\n\n|Objectif 3: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 4: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil transportant des conseillers de l'Institut a été abattu au-dessus du Nevada. Les débris et les corps des conseillers ont été menés au Secteur 51. Un de nos contacts infiltré dans la base a pu nous communiquer l'existence d'un survivant. L'objectif de la mission est de sauver ce rescapé.\n\n|Carrington - \n\nC'est un désastre, Joanna. Il faut faire sortir notre allié avant qu'il ne soit trop tard. Il y avait également de l'équipement spécial dans l'appareil qui ne doit pas rester dans les mains de Trent Easton. Notre contact du Secteur 51 déguisé en garde vous aidera.\n\n|Objectif 1: - Couper le radar d'interception\n\nCet engin a pu pénétrer le bouclier furtif du vaisseau allié afin de permettre aux robots Interceptors de le descendre. Pour vous enfuir, détruisez l'unité de contrôle du radar à l'aide d'explosifs. Elle se trouve probablement en sous-sol entourée de matériel informatique.\n\n|Objectif 2: - Accéder à l'ascenseur du hangar\n\nPasser par l'entrée principale serait du pur suicide. Utilisez plutôt l'ascenseur du hangar. Notre contact affirme qu'une carte gardée par un technicien le fera fonctionner.\n\n|Objectif 3: - Contacter l'agent\n\nNotre agent sera déguisé en garde, ce qui l'obligera à rester à son poste pour ne pas attirer l'attention. Vous devez donc le trouver. Il se trouve sur l'un des deux niveaux du hangar. Nous n'avons malheureusement pas plus de détails.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Couper le radar d'interception\n", + /* 10*/ "Installer Déroute-Comms sur antenne\n", + /* 11*/ "Désactiver robots Interceptors\n", + /* 12*/ "Accéder à l'ascenseur du hangar\n", + /* 13*/ "Contacter l'espion de l'IC\n", + /* 14*/ "Obtenir grenades.\n", + /* 15*/ "Dr. Caroll: \n", + /* 16*/ "Grenade\n", + /* 17*/ "Une grenade\n", + /* 18*/ "Grenade obtenue.\n", + /* 19*/ "Robot Interceptor désactivé.\n", + /* 20*/ "Tous robots Interceptors désactivés.\n", + /* 21*/ "Obtenir Déroute-Comms.\n", + /* 22*/ "Dr. Caroll: \n", + /* 23*/ "Déroute-Comms\n", + /* 24*/ "Déroute-Comms\n", + /* 25*/ "Déroute-Comms obtenu.\n", + /* 26*/ "Mouchard de communication placé correctement.\n", + /* 27*/ "Mouchard de communication mal placé.\n", + /* 28*/ "Antenne détruite.\n", + /* 29*/ "Antenne levée.\n", + /* 30*/ "Antenne baissée.\n", + /* 31*/ "Obtenir carte d'ascenseur.\n", + /* 32*/ "Dr. Caroll: \n", + /* 33*/ "Carte d'ascenseur\n", + /* 34*/ "Carte d'ascenseur\n", + /* 35*/ "Carte d'ascenseur obtenue.\n", + /* 36*/ "Accès ascenseur refusé - carte requise.\n", + /* 37*/ "Carte acceptée - ascenseur opérationnel.\n", + /* 38*/ "Ascenseur opérationnel.\n", + /* 39*/ "Hangar pénétré.\n", + /* 40*/ "Agent de l'IC contacté.\n", + /* 41*/ "Radar d'interception coupé.\n", + /* 42*/ "Objet crucial détruit.\n", + /* 43*/ "Porte principale ouverte.\n", + /* 44*/ "Porte principale fermée.\n", + /* 45*/ "Accès refusé.\n", + /* 46*/ "Explosif placé.\n", + /* 47*/ "Intrus détecté - systèmes sécurité branchés.\n", + /* 48*/ "Obtenir explosif.\n", + /* 49*/ "Dr. Caroll: \n", + /* 50*/ "Explosifs\n", + /* 51*/ "Explosifs\n", + /* 52*/ "Explosifs obtenus.\n", + /* 53*/ "Le radar d'interception est contrôlé depuis \nce bunker.\n", + /* 54*/ "Voilà l'antenne, mais... Je ne peux pas lancer \nun mouchard si haut!\n", + /* 55*/ "L'ascenseur du hangar est derrière \ncette grande porte.\n", + /* 56*/ "Attention à ne pas descendre n'importe qui, Agent Dark - \nvous vous approchez de ma position.\n", + /* 57*/ "Terminaux d'accès ascenseur détruits.\n", + /* 58*/ "Regardez Joanna: notre agent infiltré \ndans le Secteur 51 a pu nous faire \nparvenir ceci.\n", + /* 59*/ "C'est votre point d'entrée: un héliport \nabandonné en bordure de la base.\n", + /* 60*/ "L'ascenseur vers les hangars et le \npoint de rendez-vous est derrière ce \nmur. Attention aux gardes.\n", + /* 61*/ "Voici l'antenne de communication. Fixez \nun Déroute-Comms et nous pourrons vous \nparler dans la base. Encore une fois, \nfaites attention à la sécurité.\n", + /* 62*/ "Oh, mon Dieu!\n", + /* 63*/ "Voici notre ami. Il ne semble pas blessé \nbien qu'il n'ait pas encore repris ses \nesprits. De toute évidence, les chirurgiens \nont presque achevé leurs préparations \net vont bientôt entamer la dissection.\n", + /* 64*/ "Mais qui est...?\n", + /* 65*/ "Des questions? Non? Bon. En route \nvers le hangar.\n", + /* 66*/ "Agent Dark, Journal de mission, H: 10:28. \nJe suis sur le point d'accéder au \nSecteur 51.\n", + /* 67*/ "Agent Dark! Par ici!\n", + /* 68*/ "Vous voilà, vous! Je pensais \nque...\n", + /* 69*/ "Que quoi?\n", + /* 70*/ "Que vous étiez mort. Vous devez \navoir une bonne étoile pour être \nencore en vie.\n", + /* 71*/ "Je m'occupais de votre boulot mal fait.\n", + /* 72*/ "Mal quoi?\n", + /* 73*/ "Vous vouliez peut-être que ce garde vous \ndescende? Très bien. Je peux en appeler un \nautre si vous voulez...\n", + /* 74*/ "Bon, bon. Laissez tomber. Je préviens \nl'Institut de notre rencontre.\n", + /* 75*/ "Objet étranger détecté - sécurité alertée.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_g.c b/src/files/lang/pal-final/lue_str_g.c new file mode 100644 index 000000000..9bf3c166c --- /dev/null +++ b/src/files/lang/pal-final/lue_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Setzen Sie die Abfang-Roboter außer Kraft!\n\nAuch wenn das Radar deaktiviert ist, stellen die Abfang-Roboter eine ernsthafte Gefahr dar. Beschädigen Sie so viele Einheiten, wie möglich. Unser letztes Satellitenphoto zeigt zwei Maschinen, aber es können sich noch weitere Roboter am Gelände befinden.\n\n|4. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|5. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 1*/ "AREA 51 - UMGEBUNG\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Installieren Sie einen Zugang zur Antenne!\n\nDie unterirdischen Bereiche der Area 51 sind durch Abhörmechanismen geschützt. Das bedeutet, dass wir keine Verbindung mehr mit Ihnen haben werden, sobald Sie die Basis betreten. Um wieder mit uns in Verbindung zu treten, müssen Sie einen Antennenzugang an der Satellitenschüssel installieren.\n\n|3. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|4. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!.\n\n|Carrington - \n\nDieser Vorfall ist eine Katastrophe für uns. Wir müssen unsere Verbündeten von dort rausschaffen, bevor es zu spät ist. Außerdem befand sich an Bord der Maschine spezielle Ausrüstung, die nicht in die Hände von Trent Easton fallen darf. Sie erhalten Unterstützung durch unseren Spion, der sich als Wache verkleidet hat.\n\n|1. Ziel: - Schalten Sie die Radar-Funktion ab!\n\nDiese Vorrichtung war in der Lage, die Tarnschilde des Flugzeugs zu durchdringen. So gelang es den Abfang-Robotern das Ziel zu erfassen und das Flugzeug abzuschießen. Um flüchten zu können, müssen Sie das Radar sprengen. Allerdings wird es wahrscheinlich unterirdisch versteckt und ist gut gesichert.\n\n|2. Ziel: - Erlangen Sie Zutritt zum Hangar-Aufzug!\n\nDurch den Haupteingang zu gehen, wäre blanker Selbstmord. Richten Sie daher Ihre Aufmerksamkeit auf den Hangar-Aufzug. Unser Spion hat berichtet, dass Sie eine Schlüsselkarte brauchen, um den Aufzug betreten zu können. Einer der Wartungstechniker trägt garantiert eine Karte bei sich.\n\n|3. Ziel: - Kontaktieren Sie unseren Agenten!\n\nUnser Mann hat sich als Wache verkleidet. Das heißt, dass sein Aktions- radius ziemlich eingeschränkt ist. Entfernt er sich zu weit von seinem Posten, erregt er Aufmerksamkeit. Daher müssen Sie ihn finden. Er ist in einem der beiden Haupthangars stationiert. Genauere Informationen stehen uns derzeit leider nicht zur Verfügung.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Schalten Sie die Radar-Funktion ab!\n", + /* 10*/ "Installieren Sie den Antennen-Zugang!\n", + /* 11*/ "Setzen Sie die Roboter außer Kraft!\n", + /* 12*/ "Betreten Sie den Hangar-Aufzug!\n", + /* 13*/ "Kontaktieren Sie unseren Agenten!\n", + /* 14*/ "Erlangen Sie die Granaten!\n", + /* 15*/ "Dr. Carolls\n", + /* 16*/ "Granate\n", + /* 17*/ "Eine Granate\n", + /* 18*/ "Granate aufgenommen\n", + /* 19*/ "Abfang-Roboter außer Kraft gesetzt\n", + /* 20*/ "Alle Abfang-Roboter wurden außer Kraft gesetzt.\n", + /* 21*/ "Erlangen Sie den Antennenzugang.\n", + /* 22*/ "Dr. Carolls\n", + /* 23*/ "Antennenzugang\n", + /* 24*/ "Antennenzugang\n", + /* 25*/ "Antennenzugang aufgenommen\n", + /* 26*/ "Antennenzugang wurde korrekt platziert.\n", + /* 27*/ "Antennenzugang wurde nicht korrekt platziert.\n", + /* 28*/ "Antenne wurde zerstört.\n", + /* 29*/ "Antenne wurde hochgefahren.\n", + /* 30*/ "Antenne wurde heruntergefahren.\n", + /* 31*/ "Finden Sie die Schlüsselkarte für den Aufzug!\n", + /* 32*/ "Dr. Carolls\n", + /* 33*/ "Schlüsselkarte\n", + /* 34*/ "Schlüsselkarte\n", + /* 35*/ "Schlüsselkarte aufgenommen\n", + /* 36*/ "Zutritt zum Aufzug verweigert - Schlüsselkarte wird benötigt.\n", + /* 37*/ "Schlüsselkarte akzeptiert - Aufzug ist einsatzbereit.\n", + /* 38*/ "Der Aufzug ist einsatzbereit.\n", + /* 39*/ "Hangar wurde betreten.\n", + /* 40*/ "Agent wurde kontaktiert.\n", + /* 41*/ "Radar-Funktion wurde abgeschaltet.\n", + /* 42*/ "Wichtiges Objekt wurde zerstört.\n", + /* 43*/ "Haupttor wurde geöffnet.\n", + /* 44*/ "Haupttor wurde geschlossen.\n", + /* 45*/ "Zugriff verweigert\n", + /* 46*/ "Sprengkörper wurde platziert.\n", + /* 47*/ "Eindringling - Überwachungssystem online\n", + /* 48*/ "Erlangen Sie die Sprengsätze!\n", + /* 49*/ "Dr. Carolls\n", + /* 50*/ "Sprengsätze\n", + /* 51*/ "Sprengsätze\n", + /* 52*/ "Sprengsätze aufgenommen\n", + /* 53*/ "Die Radar-Funktion wird von diesem Bunker aus \ngesteuert.\n", + /* 54*/ "Da ist die Antenne, aber... Ich kann den Überbrücker \nnicht so hoch hinaufwerfen.\n", + /* 55*/ "Der Aufzug ist auf der anderen Seite \ndieses Tores.\n", + /* 56*/ "Hoffe, du hast keinen nervösen Zeigefinger, Agent Dark - \nDu näherst dich meiner Position.\n", + /* 57*/ "Zugang zu den Terminals wurde zerstört.\n", + /* 58*/ "Okay, Joanna, sehen Sie sich das an. Unser \nMann in der Basis konnte uns diese Information \nzuspielen.\n", + /* 59*/ "Hier gelangen Sie ins Innere; ein verlassenes Helipad \nam Rande der Basis.\n", + /* 60*/ "Der Aufzug zu den Hangars und der \nTreffpunkt befinden sich hinter dieser Mauer. \nAchten Sie auf die Wachen!\n", + /* 61*/ "Da ist die Kommunikationsantenne. \nInstallieren Sie den Antennenzugang, damit wir \nmit Ihnen kommunizieren können. Nochmals: \nAchten Sie auf Feindbewegungen!\n", + /* 62*/ "Oh nein!\n", + /* 63*/ "Da ist unser Freund. Es scheint, als wäre er \nunversehrt, obwohl er bis jetzt noch nicht \nwieder bei Bewusstsein ist. Sieht so aus, als \nhätten die Chirurgen die ersten Tests bereits \nabgeschlossen. Wahrscheinlich beginnen sie gleich \nmit der Sektion.\n", + /* 64*/ "Aber wer war...?\n", + /* 65*/ "Noch Fragen? Nein? Gut. Machen Sie sich auf \nden Weg zum Hangar.\n", + /* 66*/ "Agent Dark Missions-Logbuch, 10.28 Uhr. Entgegen \nmeiner inneren Stimme betrete ich nun die \nArea 51.\n", + /* 67*/ "Agent Dark! Hier drüben!\n", + /* 68*/ "Da bist du ja! Ich habe mich schon gefragt, \nob...\n", + /* 69*/ "Ob was?\n", + /* 70*/ "Ob du entdeckt worden bist. Ehrlich gesagt: \nWenn das deine Art ist zu arbeiten, dann wundert \nes mich, dass du bis jetzt überlebt hast.\n", + /* 71*/ "Ich musste ja die Löcher in deiner Abwehr stopfen.\n", + /* 72*/ "Die Löcher in meiner Abwehr?\n", + /* 73*/ "Verzeihung, ich wusste nicht, dass du es bevorzugen \nwürdest, wenn er auf dich geschossen hätte. Aber wenn \ndu möchtest, kann ich ein paar Wachen rufen.\n", + /* 74*/ "Okay, okay, vergiss es. Ich lasse das Institut wissen, \ndass wir uns gefunden haben.\n", + /* 75*/ "Fremdkörper erfasst - Security wurde alarmiert.\n", +}; diff --git a/src/files/lang/pal-final/lue_str_i.c b/src/files/lang/pal-final/lue_str_i.c new file mode 100644 index 000000000..f54152979 --- /dev/null +++ b/src/files/lang/pal-final/lue_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Disattiva gli intercettatori di terra\n\nSebbene il radar d'intercettazione aerea sia disattivato, gli intercettatori di terra continueranno ad essere un problema. Eliminane quanti più possibile: la nostra ultima foto satellitare ne mostrava due a terra, ma potrebbero essercene anche altri.\n\n|Obiettivo 4: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 5: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 1*/ "AREA 51 - ESTERNO\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Piazza cimice sull'antenna satellitare\n\nLe sezioni sotterranee dell'Area 51 sono protette da microspie che ci impediranno di rimanere in contatto mentre sei all'interno della base. Per ovviare a questo inconveniente piazza una cimice sull'antenna parabolica vicino all'ingresso pedonale.\n\n|Obiettivo 3: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 4: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nQuesto è un vero disastro per noi, Joanna! Dobbiamo salvare il nostro alleato prima che sia troppo tardi. E c'era anche un'apparecchiatura speciale nel velivolo, che non deve assolutamente cadere nelle grinfie di Trent Easton. Per questa missione avrai un supporto: si tratta di un nostro agente infiltratosi nell'Area 51 travestito da guardia.\n\n|Obiettivo 1: - Disattiva radar d'intercettazione aerea\n\nQuesto dispositivo è riuscito a penetrare lo scudo mimetico del velivolo dei nostri alleati in modo che gli intercettatori lo potessero localizzare e abbattere. Se vuoi riuscire a fuggire, dovrai distruggere l'unità di comando del radar con l'esplosivo che con tutta probabilità è nascosta sottoterra e circondata da speciali elaboratori.\n\n|Obiettivo 2: - Penetra nell'ascensore dell'hangar\n\nEntrare dall'ingresso pedonale sarebbe un suicidio, quindi dirigiti verso l'ascensore dell'hangar. Il nostro agente dice che per attivare l'ascensore ti servirà una tessera magnetica e che i tecnici della manutenzione potrebbero averne una.\n\n|Obiettivo 3: - Mettiti in contatto con l'agente segreto\n\nIl nostro agente sarà travestito da guardia, il che significa che non ha molta libertà di movimento all'interno della base, se non vuole destare sospetti, quindi lo dovrai trovare tu! È posizionato in uno dei due piani principali dell'hangar. Sfortunatamente non disponiamo di informazioni più specifiche a questo riguardo.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Disattiva radar d'intercettazione aerea\n", + /* 10*/ "Piazza una cimice sull'antenna\n", + /* 11*/ "Disattiva gli intercettatori di terra\n", + /* 12*/ "Penetra nell'ascensore dell'hangar\n", + /* 13*/ "Mettiti in contatto con l'agente segreto\n", + /* 14*/ "Procurati granate.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granata\n", + /* 17*/ "Granata\n", + /* 18*/ "Presa una granata.\n", + /* 19*/ "Disattivato l'intercettatore\n", + /* 20*/ "Disattivati tutti gli intercettatori\n", + /* 21*/ "Procurati cimice\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Cimice\n", + /* 24*/ "Cimice\n", + /* 25*/ "Presa cimice\n", + /* 26*/ "Cimice piazzata correttamente\n", + /* 27*/ "Cimice in posizione errata\n", + /* 28*/ "L'antenna è stata distrutta.\n", + /* 29*/ "Alzata l'antenna\n", + /* 30*/ "Abbassata l'antenna\n", + /* 31*/ "Procurati tessera ascensore\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Tessera ascensore\n", + /* 34*/ "Tessera ascensore\n", + /* 35*/ "Presa tessera ascensore\n", + /* 36*/ "Negato accesso ascensore - Serve tessera\n", + /* 37*/ "Tessera valida - Ascensore in funzione\n", + /* 38*/ "L'ascensore è in funzione.\n", + /* 39*/ "Raggiunto l'hangar\n", + /* 40*/ "Incontrato l'agente segreto\n", + /* 41*/ "Disattivato radar d'intercettazione aerea\n", + /* 42*/ "Distrutto strumento essenziale alla missione\n", + /* 43*/ "Aperto cancello principale\n", + /* 44*/ "Chiuso cancello principale\n", + /* 45*/ "Accesso negato\n", + /* 46*/ "Piazzato esplosivo\n", + /* 47*/ "Allarme intrusione - Sistema di sicurezza operativo\n", + /* 48*/ "Procurati esplosivo\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Esplosivo\n", + /* 51*/ "Esplosivo\n", + /* 52*/ "Preso esplosivo\n", + /* 53*/ "Il radar d'intercettazione aerea è \ncomandato da quel bunker!\n", + /* 54*/ "Ecco l'antenna, ma... non posso mica lanciare \nuna cimice fin lassù!\n", + /* 55*/ "L'ascensore dell'hangar è oltre \nquel portone.\n", + /* 56*/ "Vacci piano con quel grilletto, Agente Dark: \nti stai avvicinando alla mia postazione.\n", + /* 57*/ "Distrutti i terminali di accesso all'ascensore\n", + /* 58*/ "Bene, Joanna, guarda qua! Il nostro \nagente nell'Area 51 è riuscito a \nprocurarci questo!\n", + /* 59*/ "Questo è il tuo punto d'ingresso: un \neliporto deserto ai margini della base.\n", + /* 60*/ "L'ascensore per gli hangar e il punto \nd'incontro sono oltre quel muro: \nattenzione a queste guardie!\n", + /* 61*/ "Qui c'è un'antenna di comunicazione: \nattaccaci una cimice in modo che possiamo \nrimanere in contatto mentre sei dentro la \nbase. Ripeto, attenta alle guardie!\n", + /* 62*/ "Oh, maledizione!\n", + /* 63*/ "Ecco il nostro amico: sembra illeso \nfisicamente, sebbene non abbia ancora \nripreso conoscenza. A prima vista \nsembra che i chirurghi abbiano finito \ni loro esami preliminari e che stiano \nper iniziare il sezionamento.\n", + /* 64*/ "Ma chi era...\n", + /* 65*/ "Qualche domanda? No! Benissimo. Forza! \nVa nell'hangar!\n", + /* 66*/ "Missione dell'Agente Dark, ore 10.28. \nAnche se stento a crederci sto per \nentrare nell'Area 51.\n", + /* 67*/ "Agente Dark! Da questa parte!\n", + /* 68*/ "Eccoti, finalmente! Stavo iniziando \na chiedermi se...\n", + /* 69*/ "Se cosa?!\n", + /* 70*/ "Se magari non t'eri già fatto scoprire! \nE francamente se questo è il modo in cui \nlavori, sono sorpresa che tu abbia \nresistito per più di cinque minuti!\n", + /* 71*/ "Stavo solo cercando di coprirti le spalle!\n", + /* 72*/ "Le MIE spalle?\n", + /* 73*/ "Scusa, non m'ero accorto che volevi \nche ti sparasse. Posso chiamare \nqualche altra guardia se vuoi!\n", + /* 74*/ "Va bene, va bene. Lascia perdere! \nComunicherò all'istituto che ci \nsiamo incontrati.\n", + /* 75*/ "Rilevato oggetto strano - Sicurezza allertata\n", +}; diff --git a/src/files/lang/pal-final/lue_str_s.c b/src/files/lang/pal-final/lue_str_s.c new file mode 100644 index 000000000..a9fe8e183 --- /dev/null +++ b/src/files/lang/pal-final/lue_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Desactivar Robots Interceptores en tierra\n\nIncluso con el radar interceptor aéreo apagado, los propios robots interceptores serán un problema. Destruye tantas unidades en tierra como sea posible; nuestra última foto de satélite muestra dos en tierra, pero quizá haya más.\n\n|Objetivo Cuatro: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cinco: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 1*/ "ÁREA 51 - EXTERIOR\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Colocar Controlador de Comunicaciones en la Antena\n\nLas secciones subterráneas del Área 51 están protegidas de dispositivos de escucha, lo que significa que nuestra conexión se romperá tan pronto como entres en la base. Para remediarlo, debes colocar un dispositivo Controlador de Comunicaciones en la antena parabólica cercana a la entrada.\n\n|Objetivo Tres: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Cuatro: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha conseguido llevar información al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nEsto es un desastre para nosotros, Joanna. Necesitamos sacar a nuestro aliado de allí antes de que sea demasiado tarde. Y también había cierto equipo especial dentro de la nave, que no debe permanecer en las garras de Trent Easton. Tendrás algo de ayuda en esta misión gracias a nuestro espía en el Área 51 que está disfrazado de guarda.\n\n|Objetivo Uno: - Apagar el Radar Interceptor Aéreo\n\nEste dispositivo fue capaz de penetrar la protección de la nave de nuestros aliados, así que los interceptores robot pudieron localizarla y derribarla. Para que tu escape tenga éxito, debes destruir la unidad de control de radar con los explosivos, y seguramente estará escondida bajo tierra rodeada de ordenadores.\n\n|Objetivo Dos: - Acceder al Ascensor del Hangar\n\nAtravesar la entrada principal puede ser suicida, así que en lugar de eso, dirige tu atención al ascensor del hangar. Nuestro espía informó que necesitarás una llave magnética para hacer funcionar el ascensor y el técnico de mantenimiento será tu mejor apuesta para encontrar una.\n\n|Objetivo Tres: - Contactar con el Agente\n\nNuestro agente estará vestido como un guarda. Ello significa que no podrá apartarse demasiado de su puesto dentro de la base sin atraer la atención, así que depende de ti encontrarle. Está apostado en uno de los dos hangares principales, lo cual, desafortunadamente, no es muy específico.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Apagar el radar interceptor aéreo\n", + /* 10*/ "Colocar disp. de com. en antena\n", + /* 11*/ "Desac. todos los robots interceptores\n", + /* 12*/ "Acceder al ascensor del hangar\n", + /* 13*/ "Contactar con el espía del IC\n", + /* 14*/ "Obtén granadas.\n", + /* 15*/ "Dr. Caroll:\n", + /* 16*/ "Granada\n", + /* 17*/ "Una granada\n", + /* 18*/ "Granada obtenida.\n", + /* 19*/ "Robot interceptor desactivado.\n", + /* 20*/ "Todos los robots interceptores están desactivados.\n", + /* 21*/ "Obtén controlador de comunicaciones.\n", + /* 22*/ "Dr. Caroll:\n", + /* 23*/ "Control com.\n", + /* 24*/ "Controlador de comunicaciones\n", + /* 25*/ "Controlador de comunicaciones obtenido.\n", + /* 26*/ "'Bicho' de comunicaciones colocado correctamente.\n", + /* 27*/ "'Bicho' de comunicaciones colocado incorrectamente.\n", + /* 28*/ "La antena ha sido destruida.\n", + /* 29*/ "Antena elevada.\n", + /* 30*/ "Antena bajada.\n", + /* 31*/ "Obtén llave magnética del ascensor.\n", + /* 32*/ "Dr. Caroll:\n", + /* 33*/ "Llave del ascensor\n", + /* 34*/ "Llave magnética del ascensor\n", + /* 35*/ "Llave magnética del ascensor obtenida\n", + /* 36*/ "Acceso al ascensor denegado - llave magnética requerida.\n", + /* 37*/ "Llave magnética aceptada - ascensor operativo.\n", + /* 38*/ "El ascensor está completamente operativo.\n", + /* 39*/ "Has accedido al hangar.\n", + /* 40*/ "Has encontrado al agente del IC.\n", + /* 41*/ "Radar interceptor aéreo apagado.\n", + /* 42*/ "Objeto crítico de la misión destruido.\n", + /* 43*/ "La puerta principal ha sido abierta.\n", + /* 44*/ "La puerta principal ha sido cerrada.\n", + /* 45*/ "Acceso denegado.\n", + /* 46*/ "El explosivo ha sido colocado.\n", + /* 47*/ "Intruso detectado - sistema de seguridad activo.\n", + /* 48*/ "Obtén explosivos.\n", + /* 49*/ "Dr. Caroll:\n", + /* 50*/ "Explosivos\n", + /* 51*/ "Explosivos\n", + /* 52*/ "Explosivos obtenidos.\n", + /* 53*/ "El radar interceptor aéreo es controlado desde \nese búnker.\n", + /* 54*/ "Ahí está la antena, pero... ¡no puedo lanzar un \n'bicho' a esa altura!\n", + /* 55*/ "El ascensor del hangar está al otro lado \nde esa gran puerta.\n", + /* 56*/ "Cuidado con el dedo en el gatillo, Agente Dark. Te estás acercando a mi posición.\n", + /* 57*/ "Terminales de acceso del ascensor destruidos.\n", + /* 58*/ "Vale, Joanna, echa un vistazo a esto. \nNuestro agente en el Área 51 fue capaz \nde sacar esto para nosotros.\n", + /* 59*/ "Éste es tu punto de entrada. Un helipuerto \ndesierto en el borde de la base.\n", + /* 60*/ "El ascensor que baja a los hangares y el \npunto de encuentro están detrás de ese \nmuro... Cuidado con esos guardas.\n", + /* 61*/ "Aquí está la antena de comunicaciones. \nColoca un 'bicho' para que podamos contactar \ncuando estés dentro de la base. De nuevo, \ncuidado con el personal hostil.\n", + /* 62*/ "¡Oh, Dios mío!\n", + /* 63*/ "Aquí está nuestro amigo. Parece que no \nestá físicamente dañado, aunque no ha \nrecuperado la consciencia todavía. Por lo \nque parece, los cirujanos casi han hecho \nsus pruebas preliminares y comenzarán \npronto con la disección.\n", + /* 64*/ "¿Pero qué es...?\n", + /* 65*/ "¿Alguna pregunta? No. Bien. Después \nirás al hangar.\n", + /* 66*/ "Informe de Misión del Agente Dark, 10:28 horas. \nContra mi mejor juicio, estoy a punto de \nentrar en el Área 51.\n", + /* 67*/ "¡Agente Dark! ¡Aquí!\n", + /* 68*/ "¡Aquí estás! Estaba empezando a \npreguntarme si...\n", + /* 69*/ "¿Si qué?\n", + /* 70*/ "Si habías sido descubierto ya. Y francamente, \nsi así es como trabajas, estoy asombrada de \nque hayas sobrevivido más de cinco minutos.\n", + /* 71*/ "Estaba atando uno de tus cabos sueltos.\n", + /* 72*/ "¿Mis cabos sueltos?\n", + /* 73*/ "Lo siento, no pensaba que quisieras que él \nte disparara. Puedo llamar a más guardas \nsi tú quieres...\n", + /* 74*/ "Vale, vale, olvídalo. Voy a hacer saber al \nInstituto que hemos contactado.\n", + /* 75*/ "Objeto extraño detectado - seguridad alertada.\n", +}; diff --git a/src/files/lang/pal-final/miscE.c b/src/files/lang/pal-final/miscE.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscE.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/miscJ.c b/src/files/lang/pal-final/miscJ.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscJ.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/miscP.c b/src/files/lang/pal-final/miscP.c new file mode 100644 index 000000000..ad49dfeb5 --- /dev/null +++ b/src/files/lang/pal-final/miscP.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No briefing for this mission\n", + /* 2*/ "\n", + /* 3*/ "Objective", + /* 4*/ "Completed\n", + /* 5*/ "Incomplete\n", + /* 6*/ "Failed\n", + /* 7*/ "One minute left.\n", + /* 8*/ "OBJECTIVES FAILED - abort mission.\n", + /* 9*/ "Guard Greeting\n", + /* 10*/ "What's that gun?\n", + /* 11*/ "Don't point that gun at me.\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Meat", + /* 22*/ "Easy", + /* 23*/ "Normal", + /* 24*/ "Hard", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "MeatSim", + /* 28*/ "EasySim", + /* 29*/ "NormalSim", + /* 30*/ "HardSim", + /* 31*/ "PerfectSim", + /* 32*/ "DarkSim", + /* 33*/ "PeaceSim", + /* 34*/ "ShieldSim", + /* 35*/ "RocketSim", + /* 36*/ "KazeSim", + /* 37*/ "FistSim", + /* 38*/ "PreySim", + /* 39*/ "CowardSim", + /* 40*/ "JudgeSim", + /* 41*/ "FeudSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "VengeSim", + /* 45*/ "MeatSim: This is the easiest of all the simulants to defeat and is, therefore, the best choice for the beginner. It is not very intelligent, and its shooting skills are very poor.\n", + /* 46*/ "EasySim: This simulant has basic skills and intelligence, but it can still be dangerous.\n", + /* 47*/ "NormalSim: This simulant is as skilled as the average human player.\n", + /* 48*/ "HardSim: This simulant is as skilled as a good human player.\n", + /* 49*/ "PerfectSim: The ultimate adversary, the most intelligent and skilled simulant. Most players will eventually want to use PerfectSim all the time as their skills improve.\n", + /* 50*/ "DarkSim: Prototype cyborg developed by dataDyne to counteract Carrington operatives. Remember that this simulant, unlike all the others, is not human. This means that it may be able to do things which a human cannot.\n", + /* 51*/ "PeaceSim: These simulants are scientists who protest the use of weapons. They will go around the level hunting for guns that are lying around and hoard them so that players cannot use them. Of course, if you were to shoot them, they might just drop a few!\n", + /* 52*/ "ShieldSim: Always goes for maximum shield protection. If this simulant loses any shield energy, it will go and search for a new shield. Not much use if there are no shields on the level!\n", + /* 53*/ "RocketSim: This simulant loves to see things blow up. It prefers weapons which make big explosions over conventional handguns or automatics. This also extends to weapons which have explosive secondary functions!\n", + /* 54*/ "KazeSim: This simulant will stop at nothing to destroy its target. It is very aggressive and never keeps its distance - even if it's holding a grenade! Be very careful of an adversary who is not afraid to die.\n", + /* 55*/ "FistSim: This simulant protests the use of weapons in a similar way to the PeaceSims. However, it has no such reservations when it comes to unarmed combat. It will always try to use its fists to attack or disarm its opponent.\n", + /* 56*/ "PreySim: This simulant prefers to prey on the weak in order to get easier kills. It will look for players who have just respawned, have an inferior weapon, or are low on health.\n", + /* 57*/ "CowardSim: This simulant does not really want to fight and will try to survive by running away. It may sometimes attack, but only if the opponent has an inferior weapon. Draw out a better gun or shoot it, and it will run away!\n", + /* 58*/ "JudgeSim: This simulant has a strong sense of justice and despises the tactics of the PreySim. It will always try to kill the winning player in order to even up the score.\n", + /* 59*/ "FeudSim: Once this simulant picks a target, that player had better watch out! A FeudSim will pursue the player until the game is over! Even if it is killed, it will bear its grudge.\n", + /* 60*/ "SpeedSim: These simulants have been trained for speed. They can easily outrun a human player, so it's no use running away from a SpeedSim unless you know some good shortcuts!\n", + /* 61*/ "TurtleSim: This simulant wears a prototype shield generator developed by dataDyne scientists. The generator projects a protective shield around its host which has twice the strength of a normal shield. Unfortunately, this restricts the host's movement, so it can only move at a slow pace. TurtleSims carry this shield as standard even if there are no shields on the level.\n", + /* 62*/ "VengeSim: Be careful if you shoot or kill a VengeSim because it always attacks the player who last killed it.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar Mystery", + /* 65*/ "CI Operative", + /* 66*/ "dataDyne Action", + /* 67*/ "Maian Tears", + /* 68*/ "Alien Conflict", + /* 69*/ "Carrington Institute", + /* 70*/ "dD Central", + /* 71*/ "dD Central X", + /* 72*/ "dD Research", + /* 73*/ "dD Research X", + /* 74*/ "dD Extraction", + /* 75*/ "dD Extraction X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5 Building", + /* 81*/ "G5 Building X", + /* 82*/ "A51 Infiltration", + /* 83*/ "A51 Infiltration X", + /* 84*/ "A51 Rescue", + /* 85*/ "A51 Rescue X", + /* 86*/ "A51 Escape", + /* 87*/ "A51 Escape X", + /* 88*/ "Air Base", + /* 89*/ "Air Base X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Crash Site", + /* 93*/ "Crash Site X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Deep Sea", + /* 97*/ "Deep Sea X", + /* 98*/ "Institute Defense", + /* 99*/ "Institute Defense X", + /*100*/ "Attack Ship", + /*101*/ "Attack Ship X", + /*102*/ "Skedar Ruins", + /*103*/ "Skedar Ruins X", + /*104*/ "End Credits", + /*105*/ "Random\n", + /*106*/ "Select All\n", + /*107*/ "Select None\n", + /*108*/ "Randomize\n", + /*109*/ "Weapon\n", + /*110*/ "Function\n", + /*111*/ "Orders\n", + /*112*/ "No Weapon\n", + /*113*/ "Pick Target\n", + /*114*/ "Follow\n", + /*115*/ "Attack\n", + /*116*/ "Defend\n", + /*117*/ "Hold\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Get Case\n", + /*121*/ "Tag Box\n", + /*122*/ "Killed by", + /*123*/ "Killed", + /*124*/ "Beginner:21\n", + /*125*/ "Trainee:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Rookie:18\n", + /*128*/ "Novice:17\n", + /*129*/ "Trooper:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star Agent:14\n", + /*132*/ "Special Agent:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Professional:10\n", + /*136*/ "Dangerous:9\n", + /*137*/ "Deadly:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Lethal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "Near Perfect:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "DARTAMMO", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Save Case\n", + /*149*/ "Def Hill\n", + /*150*/ "Hold Hill\n", + /*151*/ "Get Case\n", + /*152*/ "Pop Cap\n", + /*153*/ "Protect\n", + /*154*/ "All Simulants\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Not enough room to launch ", + /*158*/ "GOAL TARGETS:", + /*159*/ "GOAL SCORE:", + /*160*/ "MIN ACCURACY:", + /*161*/ "FIRE TO START\n", + /*162*/ "GET READY!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODED\n", + /*169*/ "Elvis is dead.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Player", + /*179*/ "", + /*180*/ "Identify\n", + /*181*/ "unused", + /*182*/ "Challenges\n", + /*183*/ "Load/Preset Games\n", + /*184*/ "Quick Start\n", + /*185*/ "Advanced Setup\n", + /*186*/ "Combat Simulator\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Team Score\n", + /*189*/ "Finished Setup\n", + /*190*/ "Player 1 Team\n", + /*191*/ "Player 2 Team\n", + /*192*/ "Player 3 Team\n", + /*193*/ "Player 4 Team\n", + /*194*/ "Number Of Simulants\n", + /*195*/ "Simulants Per Team\n", + /*196*/ "Simulant Difficulty\n", + /*197*/ "Start Game\n", + /*198*/ "Drop Out\n", + /*199*/ "Player Settings\n", + /*200*/ "Game Settings\n", + /*201*/ "Quick Go\n", + /*202*/ "Ready!\n", + /*203*/ "Quick Team\n", + /*204*/ "Players Only\n", + /*205*/ "Players and Simulants\n", + /*206*/ "Player Teams\n", + /*207*/ "Players vs. Simulants\n", + /*208*/ "Player-Simulant Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Replay Previous Mission\n", + /*212*/ "Holograph\n", + /*213*/ "Aggressive\n", + /*214*/ "Passive\n", + /*215*/ "Perfect Buddies\n", + /*216*/ "Stealth\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_f.c b/src/files/lang/pal-final/misc_str_f.c new file mode 100644 index 000000000..b56f65a20 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_f.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R E U R\n", + /* 1*/ "Pas de briefing pour cette mission\n", + /* 2*/ "\n", + /* 3*/ "Objectif", + /* 4*/ "Succès\n", + /* 5*/ "Incomplet\n", + /* 6*/ "Echec\n", + /* 7*/ "Plus qu'une minute.\n", + /* 8*/ "OBJECTIFS NON ATTEINTS - abandonner mission.\n", + /* 9*/ "Salutations Garde\n", + /* 10*/ "C'est quoi ce flingue?\n", + /* 11*/ "Ne pointe pas ça sur moi.\n", + /* 12*/ "Vit/MPS", + /* 13*/ "Hau/M", + /* 14*/ "Dev/D", + /* 15*/ "Ang/D", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELE 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Cool", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Difficile", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "Cool-Sim", + /* 28*/ "Facile-Sim", + /* 29*/ "Normal-Sim", + /* 30*/ "Difficile-Sim", + /* 31*/ "Perfect-Sim", + /* 32*/ "Dark-Sim", + /* 33*/ "Peace-Sim", + /* 34*/ "Armu-Sim", + /* 35*/ "Roket-Sim", + /* 36*/ "Kaze-Sim", + /* 37*/ "Poing-Sim", + /* 38*/ "Proie-Sim", + /* 39*/ "Lâche-Sim", + /* 40*/ "Juge-Sim", + /* 41*/ "Fixe-Sim", + /* 42*/ "Speed-Sim", + /* 43*/ "Tortue-Sim", + /* 44*/ "Venge-Sim", + /* 45*/ "Cool-Sim: c'est le plus facile des simulants. Un excellent choix pour un débutant. Il n'est pas très malin et vise très mal.\n", + /* 46*/ "Facile-Sim: Ce simulant a des capacités de base mais il peut être dangereux.\n", + /* 47*/ "Normal-Sim: Ce simulant a les mêmes capacités que le joueur humain moyen.\n", + /* 48*/ "Difficile-Sim: Ce simulant a les mêmes capacités qu'un bon joueur humain.\n", + /* 49*/ "Perfect-Sim: L'adversaire ultime, le plus intelligent et habile des simulants. Les joueurs choisissent souvent le Perfect-Sim pour améliorer leurs capacités.\n", + /* 50*/ "Dark-Sim: Prototype de cyborg développé par la dataDyne pour affronter les agents Carrington. Attention: ce simulant n'est pas humain. Il peut donc faire ce qui est humainement impossible.\n", + /* 51*/ "Peace-Sim: Un scientifique refusant d'utiliser une arme. Il recherche et récupère les armes dans le niveau pour que les joueurs ne les utilisent pas. Vous pouvez bien sûr lui tirer dessus et il en fera peut-être tomber!\n", + /* 52*/ "Armu-Sim: Il cherche toujours la meilleure protection. Si ce simulant perd de l'énergie, Il ira chercher un nouveau bouclier. Cela n'a aucun intérêt s'il n'y a pas de bouclier dans le niveau!\n", + /* 53*/ "Roket-Sim: Ce simulant adore tout faire sauter. Il préfère l'armement explosif plutôt que des pistolets ou des automatiques. C'est aussi vrai pour les armes au tir secondaire explosif!\n", + /* 54*/ "Kaze-Sim: Ce simulant ne recule devant rien pour détruire sa cible. Il est très aggressif et ne garde jamais ses distances - même s'il tient une grenade! Faites attention à quelqu'un qui n'a pas peur de mourir.\n", + /* 55*/ "Poing-Sim: Tout comme le Peace-Sim, ce simulant déteste les armes mais il est en revanche un adversaire teigneux. Il tentera sans arrêt d'assommer ou de désarmer ses adversaires à mains nues.\n", + /* 56*/ "Proie-Sim: Ce simulant préfère attaquer les faibles pour tuer plus de monde. Il recherche les joueurs neufs et désarmés ou encore ceux affaiblis par un combat.\n", + /* 57*/ "Lâche-Sim: Ce simulant ne veut pas combattre et préfère fuir pour survivre. Il peut attaquer de temps en temps mais seulement si l'adversaire a un armement inférieur au sien. Utilisez une arme puissante ou tirez-lui dessus et il s'enfuira!\n", + /* 58*/ "Juge-Sim: Ce simulant est loyal et il déteste les méthodes du Proie-Sim. Il essaiera de tuer le joueur en tête pour arrondir les scores.\n", + /* 59*/ "Fixe-Sim: Si ce simulant choisit une cible, celle-ci doit faire attention! Un Fixe-Sim poursuit un joueur jusqu'à la fin de la partie! Même tué, il reviendra à la charge.\n", + /* 60*/ "Speed-Sim: Ce simulant est un as de la vitesse. Il est plus rapide qu'un joueur humain, il est alors inutile, à moins de connaître un raccourci, d'essayer de le semer!\n", + /* 61*/ "Tortue-Sim: Ce simulant porte un générateur de bouclier développé par les scientifiques de la dataDyne. Le générateur projète un bouclier deux fois plus résistant qu'un bouclier normal. Malheureusement, il réduit les mouvements de l'utilisateur. Le Tortue-Sim porte cet appareil même s'il n'y a aucun bouclier dans le niveau.\n", + /* 62*/ "Venge-Sim: Ce simulant attaquera toujours le dernier joueur à l'avoir attaqué ou tué. Réfléchissez avant de tirer.", + /* 63*/ "Combat Dark", + /* 64*/ "Mystère skedar", + /* 65*/ "Agent IC", + /* 66*/ "Action dataDyne", + /* 67*/ "Pleurs maians", + /* 68*/ "Conflit extrater.", + /* 69*/ "Institut Carrington", + /* 70*/ "Centre dD", + /* 71*/ "Centre dD X", + /* 72*/ "Recherche dD", + /* 73*/ "Recherche dD X", + /* 74*/ "Extraction dD", + /* 75*/ "Extraction dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Immeuble G5", + /* 81*/ "Immeuble G5 X", + /* 82*/ "Infiltration S-51", + /* 83*/ "Infiltration S-51 X", + /* 84*/ "Sauvetage S-51", + /* 85*/ "Sauvetage S-51 X", + /* 86*/ "Fuite S-51", + /* 87*/ "Fuite S-51 X", + /* 88*/ "Base aérienne", + /* 89*/ "Base aérienne X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Site du crash", + /* 93*/ "Site du crash X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Sous-marin", + /* 97*/ "Sous-marin X", + /* 98*/ "Défense Institut", + /* 99*/ "Défense Institut X", + /*100*/ "Croiseur", + /*101*/ "Croiseur X", + /*102*/ "Ruines Skedars", + /*103*/ "Ruines Skedars X", + /*104*/ "Générique de fin", + /*105*/ "Hasard\n", + /*106*/ "Choisir: tout\n", + /*107*/ "Choisir: rien\n", + /*108*/ "Au hasard\n", + /*109*/ "Armes\n", + /*110*/ "Fonctions\n", + /*111*/ "Ordres\n", + /*112*/ "Pas d'arme\n", + /*113*/ "Choix cible\n", + /*114*/ "Suivre\n", + /*115*/ "Attaquer\n", + /*116*/ "Défendre\n", + /*117*/ "Tenir\n", + /*118*/ "Normal\n", + /*119*/ "Télécharger\n", + /*120*/ "Obtenir mallette\n", + /*121*/ "Marquer PC\n", + /*122*/ "Tué(e) par", + /*123*/ "Tué", + /*124*/ "Débutant:21\n", + /*125*/ "Stagiaire:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Bleu:18\n", + /*128*/ "Novice:17\n", + /*129*/ "2e classe:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Agent chef:14\n", + /*132*/ "Agent spé.:13\n", + /*133*/ "Expert:12\n", + /*134*/ "Vétéran:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Dangereux:9\n", + /*137*/ "Mortel:8\n", + /*138*/ "Tueur:7\n", + /*139*/ "Assassin:6\n", + /*140*/ "Fatal:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invincible:3\n", + /*143*/ "QuasiPerf.:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "MUNI.FLECHETTE", + /*146*/ "MODELE 1.4", + /*147*/ "JM: 201172", + /*148*/ "Sauv. mallette\n", + /*149*/ "Déf. zone\n", + /*150*/ "Tenir zone\n", + /*151*/ "Prendre mallette\n", + /*152*/ "Décapsuleur\n", + /*153*/ "Protéger\n", + /*154*/ "Tous simulants\n", + /*155*/ "MODELE 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Espace insuffisant pour lancer ", + /*158*/ "OBJECTIF:", + /*159*/ "SCORE LIMITE:", + /*160*/ "PRECISION MIN:", + /*161*/ "TIREZ POUR COMMENCER\n", + /*162*/ "PRET!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "CENTRE\n", + /*168*/ "EXPLOSé\n", + /*169*/ "Elvis est mort.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonds", + /*175*/ "Noirs", + /*176*/ "Auburn", + /*177*/ "Rinçage bleu", + /*178*/ "Joueur", + /*179*/ "", + /*180*/ "Identifier\n", + /*181*/ "Inutilisé", + /*182*/ "Challenges\n", + /*183*/ "Charger jeu prédéfini\n", + /*184*/ "Démarrage rapide\n", + /*185*/ "Réglages avancés\n", + /*186*/ "Simulateur de combat\n", + /*187*/ "Institut Carrington\n", + /*188*/ "S. équipe\n", + /*189*/ "Réglages terminés\n", + /*190*/ "Equipe Joueur 1\n", + /*191*/ "Equipe Joueur 2\n", + /*192*/ "Equipe Joueur 3\n", + /*193*/ "Equipe Joueur 4\n", + /*194*/ "Nombre de Simulants\n", + /*195*/ "Simulants par équipe\n", + /*196*/ "Difficulté des Simulants\n", + /*197*/ "Commencer partie\n", + /*198*/ "Quitter\n", + /*199*/ "Réglages joueur\n", + /*200*/ "Réglages jeu\n", + /*201*/ "Lancer\n", + /*202*/ "Prêt!\n", + /*203*/ "Equipe rapide\n", + /*204*/ "Joueurs seulement\n", + /*205*/ "Joueurs et simulants\n", + /*206*/ "Equipes de joueurs\n", + /*207*/ "Joueurs contre simulants\n", + /*208*/ "Equipes joueurs-simulants\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Rejouer mission précédente\n", + /*212*/ "Holographe\n", + /*213*/ "Agressif\n", + /*214*/ "Passif\n", + /*215*/ "Perfect Pote\n", + /*216*/ "Furtif\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_g.c b/src/files/lang/pal-final/misc_str_g.c new file mode 100644 index 000000000..d94c82307 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_g.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "Für diese Mission gibt es kein Briefing.\n", + /* 2*/ "\n", + /* 3*/ "Ziel", + /* 4*/ "erreicht\n", + /* 5*/ "nicht erreicht\n", + /* 6*/ "versagt\n", + /* 7*/ "Noch eine Minute.\n", + /* 8*/ "ZIELERREICHUNG UNGENÜGEND - Mission abbrechen.\n", + /* 9*/ "Wachgruß.\n", + /* 10*/ "Was soll die Waffe?\n", + /* 11*/ "Zielen Sie nicht auf mich!\n", + /* 12*/ "S/MPS", + /* 13*/ "H/M", + /* 14*/ "Y/D", + /* 15*/ "P/D", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODEL 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Opfer", + /* 22*/ "Leicht", + /* 23*/ "Normal", + /* 24*/ "Schwer", + /* 25*/ "Perfekt", + /* 26*/ "Dark", + /* 27*/ "OpferSim", + /* 28*/ "LeichtSim", + /* 29*/ "NormalSim", + /* 30*/ "SchwerSim", + /* 31*/ "PerfektSim", + /* 32*/ "DarkSim", + /* 33*/ "PazifistSim", + /* 34*/ "SchildSim", + /* 35*/ "RaketenSim", + /* 36*/ "SuizidSim", + /* 37*/ "FaustSim", + /* 38*/ "JägerSim", + /* 39*/ "FeiglingSim", + /* 40*/ "JustizSim", + /* 41*/ "VendetSim", + /* 42*/ "SpeedSim", + /* 43*/ "TurtleSim", + /* 44*/ "RacheSim", + /* 45*/ "OpferSim: Der am leichtesten zu besiegende Simulant. Eignet sich daher hervorragend für Einsteiger. Der Simulant ist nicht sonderlich intelligent und ist zudem ein mäßiger Schütze.\n", + /* 46*/ "LeichtSim: Der Simulant verfügt zwar nur über Basis-Intelligenz und -Fähigkeiten, ist aber trotzdem nicht ungefährlich.\n", + /* 47*/ "NormalSim: Der Simulant verfügt über das Geschick eines menschlichen Spielers.\n", + /* 48*/ "SchwerSim: Der Simulant verfügt über das Geschick eines guten menschlichen Spielers.\n", + /* 49*/ "PerfektSim: Der ultimative Gegner. Äußerst intelligent und unberechenbar. Viele Spieler werden bevorzugt gegen ihn antreten, da sich ihre eigenen Fähigkeiten dadurch ständig verbessern.\n", + /* 50*/ "DarkSim: Ein Cyborg-Prototyp, der von dataDyne entwickelt wurde, um gegen das Institut vorzugehen. Beachten Sie, dass dieser Simulant, im Gegensatz zu den anderen, nicht menschlich ist. Daher kann er Dinge tun, die Menschen nicht tun können.\n", + /* 51*/ "PazifistSim: Diese Simulanten sind Wissenschaftler, die keine Waffen einsetzen. Sie gehen durch die Level, um herumliegende Waffen einzusammeln, sodass der Spieler sie nicht finden kann. Wenn Sie aber auf sie schießen, lassen sie vielleicht die Waffen fallen.\n", + /* 52*/ "SchildSim: Achtet immer auf maximalen Schild-Schutz. Verliert dieser Simulant seinen Schild, zieht er los, um einen neuen zu suchen. Das hat natürlich wenig Sinn, wenn keine Schilde vorhanden sind!\n", + /* 53*/ "RaketenSim: Dieser Simulant liebt es, Dinge in die Luft zu jagen. Er zieht Explosions-Waffen gegenüber Pistolen und Automatik-Gewehren vor. Zu ersteren gehören auch Waffen, die eine 'explosive' Sekundär-Funktion haben.\n", + /* 54*/ "SuizidSim: Dieser Simulant lässt sich durch nichts aufhalten. Er ist sehr aggressiv und hält keine Distanz zum Gegner. Auch nicht, wenn er eine Granate hält! Seien Sie äußerst vorsichtig, denn dieser Gegner kennt keine Angst.\n", + /* 55*/ "FaustSim: Dieser Simulant verwendet, ähnlich wie der PazifistSim, keine Waffen. Kommt es aber zum Kampf, wird er seine Fäuste einsetzen. Er wird ständig versuchen, seinen Gegner zu entwaffnen.\n", + /* 56*/ "JägerSim: Dieser Simulant jagt bevorzugt schwächere Gegner. Er sucht nach Spielern, die die gerade erst erschienen sind, über schwache Bewaffnung verfügen oder wenig Energie haben.\n", + /* 57*/ "FeiglingSim: Dieser Simulant wird eher sein Heil in der Flucht suchen, als zu kämpfen. Er kann zwar hin und wieder attackieren, aber nur, wenn sein Gegner über eine schwache Waffe verfügt. Ziehen Sie eine stärkere Waffe, und er wird flüchten!\n", + /* 58*/ "JustizSim: Dieser Simulant hat einen starken Gerechtigkeitssinn. Daher verurteilt er die Taktiken des JägerSim. Er wird immer den stärksten Spieler verfolgen, um für einen gleichmäßigen Score zu sorgen.\n", + /* 59*/ "VendetSim: Hat sich dieser Simulant ein Opfer ausgesucht, sollte der Spieler sehr vorsichtig sein! Ein VendetSim verfolgt diesen Spieler, bis das Spiel vorüber ist! Er schreckt eventuell auch nicht vor einem Kamikaze-Angriff zurück.\n", + /* 60*/ "SpeedSim: Diese Simulanten sind unglaublich schnell. In Punkto Geschwindigkeit sind sie jedem Menschen überlegen, daher hat es keinen Sinn, vor ihnen zu flüchten. (Es sei denn, Sie kennen eine Abkürzung.)\n", + /* 61*/ "TurtleSim: Dieser Simulant verfügt über eine von dataDyne entwickelte Schildtechnologie. Der Generator projiziert ein Schutzschild um seinen Träger, der doppelt so stark ist, wie ein normaler Schild. Leider wird dadurch auch die Bewegungsfreiheit eingeschränkt, und er kann sich nur langsam bewegen. TurtleSims tragen diesen Schild als Standard-Ausrüstung, sogar, wenn es im aktuellen Level keine Schilde gibt.\n", + /* 62*/ "RacheSim: Seien Sie vorsichtig, wenn Sie auf einen RacheSim schießen, da er danach nur seinen Bezwinger angreift.", + /* 63*/ "Dark Combat", + /* 64*/ "Skedar-Mysterium", + /* 65*/ "CI-Operator", + /* 66*/ "dataDyne Action", + /* 67*/ "Maianische Tränen", + /* 68*/ "Alien-Konflikt", + /* 69*/ "Carrington Institut", + /* 70*/ "dD Zentrale", + /* 71*/ "dD Zentrale X", + /* 72*/ "dD Forschung", + /* 73*/ "dD Forschung X", + /* 74*/ "dD Extraktion", + /* 75*/ "dD Extraktion X", + /* 76*/ "Carrington Villa", + /* 77*/ "Carrington Villa X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "G5-Building", + /* 81*/ "G5-Building X", + /* 82*/ "A-51 Infiltration", + /* 83*/ "A-51 Infiltration X", + /* 84*/ "A-51 Rettung", + /* 85*/ "A-51 Rettung X", + /* 86*/ "A-51 Flucht", + /* 87*/ "A-51 Flucht X", + /* 88*/ "Stützpunkt", + /* 89*/ "Stützpunkt X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Absturzstelle", + /* 93*/ "Absturzstelle X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Tiefsee", + /* 97*/ "Tiefsee X", + /* 98*/ "Verteidigung", + /* 99*/ "Verteidigung X", + /*100*/ "Feindliches Schiff", + /*101*/ "Feindliches Schiff X", + /*102*/ "Skedar Ruinen", + /*103*/ "Skedar Ruinen X", + /*104*/ "End Credits", + /*105*/ "Zufällig\n", + /*106*/ "Alle\n", + /*107*/ "Keine\n", + /*108*/ "Zufallsgenerator\n", + /*109*/ "Waffe\n", + /*110*/ "Funktion\n", + /*111*/ "Befehle\n", + /*112*/ "Keine Waffe\n", + /*113*/ "Zielauswahl\n", + /*114*/ "Folgen\n", + /*115*/ "Attackieren\n", + /*116*/ "Verteidigen\n", + /*117*/ "Halten\n", + /*118*/ "Normal\n", + /*119*/ "Download\n", + /*120*/ "Schnapp den Koffer\n", + /*121*/ "Tag Box\n", + /*122*/ "Besiegt von:", + /*123*/ "Besiegt wurde:", + /*124*/ "Anfänger:21\n", + /*125*/ "Azubi:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Normal:18\n", + /*128*/ "Neuling:17\n", + /*129*/ "Soldat:16\n", + /*130*/ "Agent:15\n", + /*131*/ "Star-Agent:14\n", + /*132*/ "Spec-Agent:13\n", + /*133*/ "Experte:12\n", + /*134*/ "Veteran:11\n", + /*135*/ "Profi:10\n", + /*136*/ "Gefährlich:9\n", + /*137*/ "Letal:8\n", + /*138*/ "Tödlich:7\n", + /*139*/ "Verheerend:6\n", + /*140*/ "Zerstörer:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Berserker:3\n", + /*143*/ "Fast Perfekt:2\n", + /*144*/ "Perfekt:1\n", + /*145*/ "DARTMUNI", + /*146*/ "MODEL 1.4", + /*147*/ "JM: 201172", + /*148*/ "Vert. Koffer\n", + /*149*/ "Vert. Hügel\n", + /*150*/ "Halte Hügel\n", + /*151*/ "Erl. Koffer\n", + /*152*/ "Pop Cap\n", + /*153*/ "Beschütze\n", + /*154*/ "Alle Simulanten\n", + /*155*/ "MODEL 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Nicht genügend Platz für den ", + /*158*/ "ZIELE:", + /*159*/ "SCORE:", + /*160*/ "MIN GENAUIGKEIT:", + /*161*/ "FEUER, UM LOSZULEGEN\n", + /*162*/ "FERTIG!\n", + /*163*/ "LIMIT:", + /*164*/ "ZONE 3\n", + /*165*/ "ZONE 2\n", + /*166*/ "ZONE 1\n", + /*167*/ "BULL'S-EYE\n", + /*168*/ "EXPLODIERT\n", + /*169*/ "Elvis wurde eliminiert.\n", + /*170*/ "Style 1", + /*171*/ "Style 2", + /*172*/ "Style 3", + /*173*/ "Style 4", + /*174*/ "Blonde", + /*175*/ "Black", + /*176*/ "Auburn", + /*177*/ "Blue Rinse", + /*178*/ "Spieler", + /*179*/ "", + /*180*/ "Identifizieren\n", + /*181*/ "nicht verwendet", + /*182*/ "Challenges\n", + /*183*/ "Laden/Voreinstellung\n", + /*184*/ "Schnellstart\n", + /*185*/ "Erweitertes Setup\n", + /*186*/ "Kampf-Simulator\n", + /*187*/ "Carrington Institut\n", + /*188*/ "Team-Score\n", + /*189*/ "Setup abgeschlossen\n", + /*190*/ "Spieler 1 Team\n", + /*191*/ "Spieler 2 Team\n", + /*192*/ "Spieler 3 Team\n", + /*193*/ "Spieler 4 Team\n", + /*194*/ "Anzahl der Simulanten\n", + /*195*/ "Simulanten pro Team\n", + /*196*/ "Sim-Schwierigkeit\n", + /*197*/ "Start\n", + /*198*/ "Abbrechen\n", + /*199*/ "Spieler-Einstellungen\n", + /*200*/ "Spiel-Einstellungen\n", + /*201*/ "Quick Go\n", + /*202*/ "Fertig!\n", + /*203*/ "Quick-Team\n", + /*204*/ "Nur Spieler\n", + /*205*/ "Spieler und Simulanten\n", + /*206*/ "Spieler-Teams\n", + /*207*/ "Spieler vs. Simulanten\n", + /*208*/ "Spieler-Simulanten-Teams\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Mission wiederholen\n", + /*212*/ "Holografie\n", + /*213*/ "Aggressiv\n", + /*214*/ "Passiv\n", + /*215*/ "Perfekte Kumpels\n", + /*216*/ "Tarnung\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_i.c b/src/files/lang/pal-final/misc_str_i.c new file mode 100644 index 000000000..1de2364e6 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_i.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R E\n", + /* 1*/ "Nessuna informazione per questa missione\n", + /* 2*/ "\n", + /* 3*/ "Obiettivo", + /* 4*/ "Completato\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallito\n", + /* 7*/ "Ancora un minuto.\n", + /* 8*/ "OBIETTIVI FALLITI: interrompi missione!\n", + /* 9*/ "Saluto guardia\n", + /* 10*/ "Cos'è quella pistola?\n", + /* 11*/ "Non puntarla a me.\n", + /* 12*/ "v/ms", + /* 13*/ "h/m", + /* 14*/ "i/g", + /* 15*/ "t/g", + /* 16*/ "CI 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "TELESPIA", + /* 19*/ "MODELLO 1.2", + /* 20*/ "GYROSTAT", + /* 21*/ "Pappa", + /* 22*/ "Facile", + /* 23*/ "Normal", + /* 24*/ "Tosto", + /* 25*/ "Perfect", + /* 26*/ "Dark", + /* 27*/ "RepPappa", + /* 28*/ "RepFacile", + /* 29*/ "RepNormal", + /* 30*/ "RepTosto", + /* 31*/ "RepPerfect", + /* 32*/ "RepDark", + /* 33*/ "RepPace", + /* 34*/ "RepScudo", + /* 35*/ "RepMissile", + /* 36*/ "RepKaze", + /* 37*/ "RepPugno", + /* 38*/ "RepPreda", + /* 39*/ "RepCodar", + /* 40*/ "RegGiusto", + /* 41*/ "RepLite", + /* 42*/ "RepAgile", + /* 43*/ "RepTarta", + /* 44*/ "RepVendi", + /* 45*/ "RepPappa: È il replicante più facile da battere, un vero pappamolle e quindi il migliore per i principianti. Non è molto intelligente e quasi incapace di sparare.\n", + /* 46*/ "RepFacile: È dotato di abilità e intelligenza elementari, ma può rivelarsi pericoloso.\n", + /* 47*/ "RepNormal: Le sue abilità sono come quelle di un giocatore umano medio.\n", + /* 48*/ "RepTosto: Le sue abilità sono come quelle di un giocatore umano bravo.\n", + /* 49*/ "RepPerfect: L'avversario ultimo: il più intelligente e abile. Da usarsi per un miglioramento continuo delle proprie capacità.\n", + /* 50*/ "RepDark: Prototipo cibernetico sviluppato dalla dataDyne per contrastare gli agenti di Carrington. Ricorda che questo replicante al contrario degli altri non è umano, quindi potrebbe avere abilità sovrumane!\n", + /* 51*/ "RepPace: È un replicante-scienziato che protesta contro l'uso delle armi. Va in giro per i piani allaricerca di armi per nasconderle in modo che il giocatore non possa usarle. Sparandogli è probabile che glienecadano alcune!\n", + /* 52*/ "RepScudo: È sempre alla ricerca del massimo scudo protettivo. Se perde energia, andrà alla ricerca di unnuovo scudo. Peggio per lui se su quel piano non ci sono scudi!\n", + /* 53*/ "RepMissile: Adora le esplosioni: preferisce le armi che provocano violente deflagrazioni alle pistole convenzionali e alle mitragliatrici. Questo vale anche per le armi con funzioni esplosive secondarie!\n", + /* 54*/ "RepKaze: Il suo scopo è distruggere l'avversario ad ogni costo. È molto aggressivo e non prende maile distanze... neanche da una granata! Non ha paura di morire e perciò è molto pericoloso.\n", + /* 55*/ "RepPugno: Come il RepPace anche questo replicante è contro l'uso delle armi. Tuttavia non è contro la lotta a mani nude:usa i pugni per cercare di stendere o disarmare l'avversario.\n", + /* 56*/ "RepPreda: Preferisce scagliarsi su avversari deboli per vincere facilmente. Cerca avversariprincipianti, muniti di arma meno potente o in cattiva salute.\n", + /* 57*/ "RepCodar: Piuttosto che combattere preferisce cercare scampo nella fuga. Attacca raramente e solo se l'avversario ha un'arma meno potente. Sfoderando un'arma migliore o sparando, scapperà!\n", + /* 58*/ "RepGiusto: Ha un forte senso della giustizia e disprezza la strategia del RepPreda. Cerca sempre di colpireil giocatore in vantaggio per pareggiare il risultato.\n", + /* 59*/ "RepLite: Una volta che ha identificato un bersaglio, meglio tenere gli occhi aperti! Un RepLiteinseguirà quel giocatore fino alla fine! Serba rancore anche dopo la morte.\n", + /* 60*/ "RepAgile: È agilissimo e velocissimo: corre molto più veloce del giocatore umano, quindi è inutile cercare di sfuggirgli a meno che si conosca una scorciatoia!\n", + /* 61*/ "RepTarta: Indossa il prototipo del generatore scudo creato dagli scienziati dataDyne. Il generatore proietta attorno al suo corpo uno scudo protettivo due volte più potente di uno scudo normale. Questo però lo impedisce nei movimenti, per cui è molto lento. Il RepTarta è dotato di questo scudo anche se non ci sono scudi su quel piano.\n", + /* 62*/ "RepVendi: Sparando o uccidendo un RepVendi, gli altri attaccheranno l'ultimo giocatore che l'ha attaccato o ucciso.", + /* 63*/ "Lotta Dark", + /* 64*/ "Mistero Skedar", + /* 65*/ "Funzionario CI", + /* 66*/ "Azione dataDyne", + /* 67*/ "Lacrime Maian", + /* 68*/ "Conflitto Alieno", + /* 69*/ "Carrington Institute", + /* 70*/ "QG dataDyne", + /* 71*/ "QG dataDyne X", + /* 72*/ "Ricerca dD", + /* 73*/ "Ricerca dD X", + /* 74*/ "Estrazione dD", + /* 75*/ "Estrazione dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltrazione A51", + /* 83*/ "Infiltrazione A51 X", + /* 84*/ "Salvataggio A51", + /* 85*/ "Salvataggio A51 X", + /* 86*/ "Fuga A51", + /* 87*/ "Fuga A51 X", + /* 88*/ "Base aerea", + /* 89*/ "Base aerea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Luogo del disastro", + /* 93*/ "Luogo del disastro X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Abissi oceanici", + /* 97*/ "Abissi oceanici X", + /* 98*/ "Difesa dell'istituto", + /* 99*/ "Difesa dell'istituto X", + /*100*/ "Astronave Skedar", + /*101*/ "Astronave Skedar X", + /*102*/ "Rovine Skedar", + /*103*/ "Rovine Skedar X", + /*104*/ "Titoli di coda", + /*105*/ "A caso\n", + /*106*/ "Seleziona tutto\n", + /*107*/ "Nessuna selezione\n", + /*108*/ "Non in sequenza\n", + /*109*/ "Inventario\n", + /*110*/ "Funzione\n", + /*111*/ "Ordini\n", + /*112*/ "No armi\n", + /*113*/ "Scegli obiettivo\n", + /*114*/ "Segui\n", + /*115*/ "Attacca\n", + /*116*/ "Difendi\n", + /*117*/ "Fisso\n", + /*118*/ "Normale\n", + /*119*/ "Scarica\n", + /*120*/ "Prendi cassa\n", + /*121*/ "Box\n", + /*122*/ "Eliminato da", + /*123*/ "Eliminato", + /*124*/ "Princip.:21\n", + /*125*/ "Addestr.:20\n", + /*126*/ "Amatore:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novello:17\n", + /*129*/ "Truppa:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Ag.Grado:14\n", + /*132*/ "Ag.Spec:13\n", + /*133*/ "Esperto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Profess.:10\n", + /*136*/ "Pericoloso:9\n", + /*137*/ "Micidiale:8\n", + /*138*/ "Killer:7\n", + /*139*/ "Assassino:6\n", + /*140*/ "Letale:5\n", + /*141*/ "Elite:4\n", + /*142*/ "Invulner.:3\n", + /*143*/ "SemiPerf:2\n", + /*144*/ "Perfect:1\n", + /*145*/ "FRECCE", + /*146*/ "MODELLO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salva cassa\n", + /*149*/ "Difendi colle\n", + /*150*/ "Tieni colle\n", + /*151*/ "Prendi cassa\n", + /*152*/ "Tutti contro 1\n", + /*153*/ "Proteggi\n", + /*154*/ "Tutti replic.\n", + /*155*/ "MODELLO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Spazio insufficiente per il lancio", + /*158*/ "OBIETTIVI:", + /*159*/ "PUNTEGGIO:", + /*160*/ "PRECISIONE IN MIN:", + /*161*/ "SPARA PER INIZIARE\n", + /*162*/ "PRONTI!\n", + /*163*/ "LIMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "CENTRO\n", + /*168*/ "ESPLOSO\n", + /*169*/ "Elvis è morto.\n", + /*170*/ "Modalità 1", + /*171*/ "Modalità 2", + /*172*/ "Modalità 3", + /*173*/ "Modalità 4", + /*174*/ "Biondo", + /*175*/ "Nero", + /*176*/ "Castano", + /*177*/ "Cachet blu", + /*178*/ "Giocat.", + /*179*/ "", + /*180*/ "Identifica\n", + /*181*/ "non in uso", + /*182*/ "Sfide\n", + /*183*/ "Carica/Imposta giochi\n", + /*184*/ "Avvio rapido\n", + /*185*/ "Impostaz. avanzate\n", + /*186*/ "Simulatore lotta\n", + /*187*/ "Carrington Institute\n", + /*188*/ "Punti squadra\n", + /*189*/ "Fine impostazioni\n", + /*190*/ "Squadra 1 giocatore\n", + /*191*/ "Squadra 2 giocatori\n", + /*192*/ "Squadra 3 giocatori\n", + /*193*/ "Squadra 4 giocatori\n", + /*194*/ "Numero di replicanti\n", + /*195*/ "Replicanti per squadra\n", + /*196*/ "Difficoltà replicanti\n", + /*197*/ "Avvia gioco\n", + /*198*/ "Esci\n", + /*199*/ "Impostaz. giocatori\n", + /*200*/ "Impostazioni gioco\n", + /*201*/ "Scelta rapida\n", + /*202*/ "Pronti!\n", + /*203*/ "Avvio rapido\n", + /*204*/ "Solo giocatori\n", + /*205*/ "Giocatori e replicanti\n", + /*206*/ "Squadre di giocatori\n", + /*207*/ "Giocatori contro replicanti\n", + /*208*/ "Squadre giocatori-replicanti\n", + /*209*/ "CAPSUSPIA", + /*210*/ "BOMBASPIA", + /*211*/ "Ripeti missione precedente\n", + /*212*/ "Olografia\n", + /*213*/ "Aggressivo\n", + /*214*/ "Passivo\n", + /*215*/ "Amici Perfect\n", + /*216*/ "In incognito\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/misc_str_s.c b/src/files/lang/pal-final/misc_str_s.c new file mode 100644 index 000000000..8d7328bc3 --- /dev/null +++ b/src/files/lang/pal-final/misc_str_s.c @@ -0,0 +1,224 @@ +#include + +char *lang[] = { + /* 0*/ "E R R O R\n", + /* 1*/ "No hay información para esta misión\n", + /* 2*/ "\n", + /* 3*/ "Objetivo", + /* 4*/ "Completado\n", + /* 5*/ "Incompleto\n", + /* 6*/ "Fallado\n", + /* 7*/ "Queda un minuto.\n", + /* 8*/ "OBJETIVOS FALLADOS - abortar misión.\n", + /* 9*/ "Saludos del Guarda\n", + /* 10*/ "¿Qué arma es ésa?\n", + /* 11*/ "No me apuntes con ese arma.\n", + /* 12*/ "v/mps", + /* 13*/ "a/m", + /* 14*/ "x/°", + /* 15*/ "y/°", + /* 16*/ "IC 2023", + /* 17*/ "YKK: 95935", + /* 18*/ "CAMSPY", + /* 19*/ "MODELO 1.2", + /* 20*/ "GIROSTATO", + /* 21*/ "Muy Fácil", + /* 22*/ "Fácil", + /* 23*/ "Normal", + /* 24*/ "Difícil", + /* 25*/ "Perfecto", + /* 26*/ "Oscuro", + /* 27*/ "SimMFácil", + /* 28*/ "SimFácil", + /* 29*/ "SimNormal", + /* 30*/ "SimDifíci", + /* 31*/ "SimPerfec", + /* 32*/ "SimOscuro", + /* 33*/ "SimPaz", + /* 34*/ "SimEscudo", + /* 35*/ "SimCohete", + /* 36*/ "SimKamika", + /* 37*/ "SimLucha", + /* 38*/ "SimPresa", + /* 39*/ "SimCobard", + /* 40*/ "SimJuez", + /* 41*/ "SimPelea", + /* 42*/ "SimVeloz", + /* 43*/ "SimTortug", + /* 44*/ "SimVengan", + /* 45*/ "SimMFácil: Éste es el simulante más fácil de derrotar, y por lo tanto, la mejor elección para los principiantes. No es muy inteligente, y su tiro es bastante pobre.\n", + /* 46*/ "SimFácil: Este simulante tiene inteligencia y habilidades básicas; aún así puede ser peligroso.\n", + /* 47*/ "SimNormal: Este simulante es tan habilidoso como un jugador humano normal y corriente.\n", + /* 48*/ "SimDifíci: Este simulante es tan habilidoso como un buen jugador humano.\n", + /* 49*/ "SimPerfec: El adversario definitivo. El simulante más inteligente y habilidoso. La mayoría de jugadores querrán usar a SimPerfecto todo el tiempo para mejorar sus habilidades.\n", + /* 50*/ "SimOscuro: Prototipo cibernético desarrollado por dataDyne para contrarrestar las acciones de Carrington. Recuerda que este simulante no es humano. Esto significa que es capaz de hacer cosas que un humano no puede.\n", + /* 51*/ "SimPaz: Estos simulantes son científicos que protestan contra el uso de armas. Recorren el nivel buscando armas y las recogen para que el jugador no pueda usarlas. Por supuesto, si les disparas un poco... ¡no les importará soltarlas!\n", + /* 52*/ "SimEscudo: Siempre busca la máxima protección de escudo. Si este simulante pierde algo de energía de su escudo, irá en busca de uno nuevo. ¡No tiene mucha utilidad si no hay escudos en el nivel!\n", + /* 53*/ "SimCohete: A este simulante le encanta ver cosas explotar. Prefiere armas explosivas antes que las convencionales pistolas o automáticas. ¡Esto también se extiende a las armas que tienen funciones secundarias explosivas!\n", + /* 54*/ "SimKamika: Este simulante no se detendrá ante nada para destruir a su blanco. Es muy agresivo y nunca cuida las distancias: ¡Incluso cuando lleva una granada! Sé muy cuidadoso de este adversario que no tiene miedo a morir.\n", + /* 55*/ "SimLucha: Este simulante protesta por el uso de armas al igual que hacen los SimPaz. Aún así, no tiene reservas a la hora de combatir desarmado. Siempre intentará usar sus puños para atacar o desarmar a su oponente.\n", + /* 56*/ "SimPresa: Este simulante prefiere cebarse en los débiles para conseguir muertes fáciles. Buscará jugadores que acaben de salir, tengan un arma inferior, o tengan poca salud.\n", + /* 57*/ "SimCobard: Este simulante no quiere luchar, así que huirá para intentar sobrevivir. A veces atacará, pero sólo si el oponente tiene un arma inferior. ¡Saca un arma mayor o dispárale, y saldrá corriendo!\n", + /* 58*/ "SimJuez: Este simulante tiene un gran sentido de la justicia y desprecia las tácticas del SimPresa. Siempre intentará matar al jugador que vaya ganando para así igualar los marcadores.\n", + /* 59*/ "SimPelea: ¡Cuando este simulante escoge objetivo, el jugador debe tener mucho cuidado! ¡Un SimPelea perseguirá al jugador hasta que se acabe el juego! Aunque muera, seguirá guardándote rencor.\n", + /* 60*/ "SimVeloz: Estos simulantes han sido entrenados para ser muy veloces. ¡Pueden atrapar fácilmente a un humano, así que no huyas de un SimVeloz a menos que conozcas algún buen atajo!\n", + /* 61*/ "SimTortug: Este simulante lleva un prototipo de generador de escudo creado por científicos de dataDyne. El generador crea un escudo protector que posee el doble de fuerza que un escudo normal. Desgraciadamente, restringe el movimiento del portador, así que se moverá muy despacio. Los SimTortug llevan este escudo siempre, incluso si no hay escudos en el nivel.\n", + /* 62*/ "SimVengan: Ten cuidado de no disparar o matar a un SimVengan, ya que siempre atacará al último jugador que le haya matado.", + /* 63*/ "Combate Oscuro", + /* 64*/ "Misterio Skedar", + /* 65*/ "Operativo IC", + /* 66*/ "Acción dataDyne", + /* 67*/ "Lágrimas Maian", + /* 68*/ "Conflicto Alien", + /* 69*/ "Instituto Carrington", + /* 70*/ "Central dD", + /* 71*/ "Central dD X", + /* 72*/ "Investigación dD", + /* 73*/ "Investigación dD X", + /* 74*/ "Extracción dD", + /* 75*/ "Extracción dD X", + /* 76*/ "Villa Carrington", + /* 77*/ "Villa Carrington X", + /* 78*/ "Chicago", + /* 79*/ "Chicago X", + /* 80*/ "Edificio G5", + /* 81*/ "Edificio G5 X", + /* 82*/ "Infiltración A51", + /* 83*/ "Infiltración A51 X", + /* 84*/ "Rescate A51", + /* 85*/ "Rescate A51 X", + /* 86*/ "Escape A51", + /* 87*/ "Escape A51 X", + /* 88*/ "Base Aérea", + /* 89*/ "Base Aérea X", + /* 90*/ "Air Force One", + /* 91*/ "Air Force One X", + /* 92*/ "Impacto", + /* 93*/ "Impacto X", + /* 94*/ "Pelagic II", + /* 95*/ "Pelagic II X", + /* 96*/ "Mar Profundo", + /* 97*/ "Mar Profundo X", + /* 98*/ "Defensa Instituto", + /* 99*/ "Defensa Instituto X", + /*100*/ "Acorazado", + /*101*/ "Acorazado X", + /*102*/ "Ruinas Skedar", + /*103*/ "Ruinas Skedar X", + /*104*/ "Créditos ", + /*105*/ "Aleatorio\n", + /*106*/ "Seleccionar Todo\n", + /*107*/ "Deseleccionar Todo\n", + /*108*/ "Al azar\n", + /*109*/ "Inventario\n", + /*110*/ "Función\n", + /*111*/ "Órdenes\n", + /*112*/ "Sin Arma\n", + /*113*/ "Elige Objetivo\n", + /*114*/ "Seguir\n", + /*115*/ "Atacar\n", + /*116*/ "Defender\n", + /*117*/ "Mantener\n", + /*118*/ "Normal\n", + /*119*/ "Bajar\n", + /*120*/ "Obtener\n", + /*121*/ "Marcar\n", + /*122*/ "Te mató", + /*123*/ "Mataste a", + /*124*/ "Iniciado:21\n", + /*125*/ "Aprendiz:20\n", + /*126*/ "Amateur:19\n", + /*127*/ "Recluta:18\n", + /*128*/ "Novato:17\n", + /*129*/ "Soldado:16\n", + /*130*/ "Agente:15\n", + /*131*/ "Estrella:14\n", + /*132*/ "Especial:13\n", + /*133*/ "Experto:12\n", + /*134*/ "Veterano:11\n", + /*135*/ "Pro:10\n", + /*136*/ "Peligroso:9\n", + /*137*/ "Mortal:8\n", + /*138*/ "Ejecutor:7\n", + /*139*/ "Asesino:6\n", + /*140*/ "Letal:5\n", + /*141*/ "Élite:4\n", + /*142*/ "Invencible:3\n", + /*143*/ "Completo:2\n", + /*144*/ "Perfecto:1\n", + /*145*/ "DARDOS", + /*146*/ "MODELO 1.4", + /*147*/ "JM: 201172", + /*148*/ "Salvar Caja\n", + /*149*/ "Defender Colina\n", + /*150*/ "Mantener Colina\n", + /*151*/ "Coger Maletín\n", + /*152*/ "Llevarla\n", + /*153*/ "Proteger\n", + /*154*/ "Todo Simulante\n", + /*155*/ "MODELO 1.3", + /*156*/ "BNC: 15877", + /*157*/ "Sin suficiente espacio para activar ", + /*158*/ "ACIERTOS NEC.:", + /*159*/ "PUNTUACIÓN NEC.:", + /*160*/ "PRECISIÓN MIN.:", + /*161*/ "DISPARA PARA EMPEZAR\n", + /*162*/ "¡PREPARADO!\n", + /*163*/ "LÍMITE:", + /*164*/ "ZONA 3\n", + /*165*/ "ZONA 2\n", + /*166*/ "ZONA 1\n", + /*167*/ "DIANA\n", + /*168*/ "EXPLOTADOS\n", + /*169*/ "Elvis ha muerto.\n", + /*170*/ "Estilo 1", + /*171*/ "Estilo 2", + /*172*/ "Estilo 3", + /*173*/ "Estilo 4", + /*174*/ "Rubio", + /*175*/ "Moreno", + /*176*/ "Castaño", + /*177*/ "Azulado", + /*178*/ "Jugador", + /*179*/ "", + /*180*/ "Identificado\n", + /*181*/ "unused", + /*182*/ "Desafíos\n", + /*183*/ "Cargar Juegos\n", + /*184*/ "Comienzo Rápido\n", + /*185*/ "Conf. Avanzada\n", + /*186*/ "Simulador de Combate\n", + /*187*/ "Instituto Carrington\n", + /*188*/ "P. Equipo\n", + /*189*/ "Conf. Finalizada\n", + /*190*/ "Equipo Jugador 1\n", + /*191*/ "Equipo Jugador 2\n", + /*192*/ "Equipo Jugador 3\n", + /*193*/ "Equipo Jugador 4\n", + /*194*/ "Número de Simulantes\n", + /*195*/ "Simulantes por Equipo\n", + /*196*/ "Nivel de Simulantes\n", + /*197*/ "Empezar Juego\n", + /*198*/ "Abandonar\n", + /*199*/ "Opciones de Jugador\n", + /*200*/ "Opciones de Juego\n", + /*201*/ "Salida Rápida\n", + /*202*/ "¡Preparado!\n", + /*203*/ "Equipo Rápido\n", + /*204*/ "Sólo Jugadores\n", + /*205*/ "Jugadores y Simulantes\n", + /*206*/ "Equipos de Jugadores\n", + /*207*/ "Jugadores contra Simulantes\n", + /*208*/ "Equipos de Jugador-Simulante\n", + /*209*/ "DRUGSPY", + /*210*/ "BOMBSPY", + /*211*/ "Repetir Misión Previa\n", + /*212*/ "Holografía\n", + /*213*/ "Agresivos\n", + /*214*/ "Pasivos\n", + /*215*/ "Camaradas\n", + /*216*/ "Sigilosos\n", + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, +}; diff --git a/src/files/lang/pal-final/mp10E.c b/src/files/lang/pal-final/mp10E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10J.c b/src/files/lang/pal-final/mp10J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10P.c b/src/files/lang/pal-final/mp10P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_f.c b/src/files/lang/pal-final/mp10_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_g.c b/src/files/lang/pal-final/mp10_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_i.c b/src/files/lang/pal-final/mp10_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp10_str_s.c b/src/files/lang/pal-final/mp10_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp10_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11E.c b/src/files/lang/pal-final/mp11E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11J.c b/src/files/lang/pal-final/mp11J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11P.c b/src/files/lang/pal-final/mp11P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_f.c b/src/files/lang/pal-final/mp11_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_g.c b/src/files/lang/pal-final/mp11_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_i.c b/src/files/lang/pal-final/mp11_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp11_str_s.c b/src/files/lang/pal-final/mp11_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp11_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12E.c b/src/files/lang/pal-final/mp12E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12J.c b/src/files/lang/pal-final/mp12J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12P.c b/src/files/lang/pal-final/mp12P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_f.c b/src/files/lang/pal-final/mp12_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_g.c b/src/files/lang/pal-final/mp12_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_i.c b/src/files/lang/pal-final/mp12_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp12_str_s.c b/src/files/lang/pal-final/mp12_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp12_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13E.c b/src/files/lang/pal-final/mp13E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13J.c b/src/files/lang/pal-final/mp13J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13P.c b/src/files/lang/pal-final/mp13P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_f.c b/src/files/lang/pal-final/mp13_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_g.c b/src/files/lang/pal-final/mp13_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_i.c b/src/files/lang/pal-final/mp13_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp13_str_s.c b/src/files/lang/pal-final/mp13_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp13_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14E.c b/src/files/lang/pal-final/mp14E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14J.c b/src/files/lang/pal-final/mp14J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14P.c b/src/files/lang/pal-final/mp14P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_f.c b/src/files/lang/pal-final/mp14_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_g.c b/src/files/lang/pal-final/mp14_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_i.c b/src/files/lang/pal-final/mp14_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp14_str_s.c b/src/files/lang/pal-final/mp14_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp14_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15E.c b/src/files/lang/pal-final/mp15E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15J.c b/src/files/lang/pal-final/mp15J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15P.c b/src/files/lang/pal-final/mp15P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_f.c b/src/files/lang/pal-final/mp15_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_g.c b/src/files/lang/pal-final/mp15_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_i.c b/src/files/lang/pal-final/mp15_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp15_str_s.c b/src/files/lang/pal-final/mp15_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp15_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16E.c b/src/files/lang/pal-final/mp16E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16J.c b/src/files/lang/pal-final/mp16J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16P.c b/src/files/lang/pal-final/mp16P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_f.c b/src/files/lang/pal-final/mp16_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_g.c b/src/files/lang/pal-final/mp16_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_i.c b/src/files/lang/pal-final/mp16_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp16_str_s.c b/src/files/lang/pal-final/mp16_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp16_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17E.c b/src/files/lang/pal-final/mp17E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17J.c b/src/files/lang/pal-final/mp17J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17P.c b/src/files/lang/pal-final/mp17P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_f.c b/src/files/lang/pal-final/mp17_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_g.c b/src/files/lang/pal-final/mp17_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_i.c b/src/files/lang/pal-final/mp17_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp17_str_s.c b/src/files/lang/pal-final/mp17_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp17_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18E.c b/src/files/lang/pal-final/mp18E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18J.c b/src/files/lang/pal-final/mp18J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18P.c b/src/files/lang/pal-final/mp18P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_f.c b/src/files/lang/pal-final/mp18_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_g.c b/src/files/lang/pal-final/mp18_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_i.c b/src/files/lang/pal-final/mp18_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp18_str_s.c b/src/files/lang/pal-final/mp18_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp18_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19E.c b/src/files/lang/pal-final/mp19E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19J.c b/src/files/lang/pal-final/mp19J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19P.c b/src/files/lang/pal-final/mp19P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_f.c b/src/files/lang/pal-final/mp19_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_g.c b/src/files/lang/pal-final/mp19_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_i.c b/src/files/lang/pal-final/mp19_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp19_str_s.c b/src/files/lang/pal-final/mp19_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp19_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1E.c b/src/files/lang/pal-final/mp1E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1J.c b/src/files/lang/pal-final/mp1J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1P.c b/src/files/lang/pal-final/mp1P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_f.c b/src/files/lang/pal-final/mp1_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_g.c b/src/files/lang/pal-final/mp1_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_i.c b/src/files/lang/pal-final/mp1_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp1_str_s.c b/src/files/lang/pal-final/mp1_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp1_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20E.c b/src/files/lang/pal-final/mp20E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20J.c b/src/files/lang/pal-final/mp20J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20P.c b/src/files/lang/pal-final/mp20P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_f.c b/src/files/lang/pal-final/mp20_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_g.c b/src/files/lang/pal-final/mp20_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_i.c b/src/files/lang/pal-final/mp20_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp20_str_s.c b/src/files/lang/pal-final/mp20_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp20_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2E.c b/src/files/lang/pal-final/mp2E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2J.c b/src/files/lang/pal-final/mp2J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2P.c b/src/files/lang/pal-final/mp2P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_f.c b/src/files/lang/pal-final/mp2_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_g.c b/src/files/lang/pal-final/mp2_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_i.c b/src/files/lang/pal-final/mp2_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp2_str_s.c b/src/files/lang/pal-final/mp2_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp2_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3E.c b/src/files/lang/pal-final/mp3E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3J.c b/src/files/lang/pal-final/mp3J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3P.c b/src/files/lang/pal-final/mp3P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_f.c b/src/files/lang/pal-final/mp3_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_g.c b/src/files/lang/pal-final/mp3_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_i.c b/src/files/lang/pal-final/mp3_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp3_str_s.c b/src/files/lang/pal-final/mp3_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp3_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4E.c b/src/files/lang/pal-final/mp4E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4J.c b/src/files/lang/pal-final/mp4J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4P.c b/src/files/lang/pal-final/mp4P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_f.c b/src/files/lang/pal-final/mp4_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_g.c b/src/files/lang/pal-final/mp4_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_i.c b/src/files/lang/pal-final/mp4_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp4_str_s.c b/src/files/lang/pal-final/mp4_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp4_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5E.c b/src/files/lang/pal-final/mp5E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5J.c b/src/files/lang/pal-final/mp5J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5P.c b/src/files/lang/pal-final/mp5P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_f.c b/src/files/lang/pal-final/mp5_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_g.c b/src/files/lang/pal-final/mp5_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_i.c b/src/files/lang/pal-final/mp5_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp5_str_s.c b/src/files/lang/pal-final/mp5_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp5_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6E.c b/src/files/lang/pal-final/mp6E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6J.c b/src/files/lang/pal-final/mp6J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6P.c b/src/files/lang/pal-final/mp6P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_f.c b/src/files/lang/pal-final/mp6_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_g.c b/src/files/lang/pal-final/mp6_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_i.c b/src/files/lang/pal-final/mp6_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp6_str_s.c b/src/files/lang/pal-final/mp6_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp6_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7E.c b/src/files/lang/pal-final/mp7E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7J.c b/src/files/lang/pal-final/mp7J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7P.c b/src/files/lang/pal-final/mp7P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_f.c b/src/files/lang/pal-final/mp7_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_g.c b/src/files/lang/pal-final/mp7_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_i.c b/src/files/lang/pal-final/mp7_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp7_str_s.c b/src/files/lang/pal-final/mp7_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp7_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8E.c b/src/files/lang/pal-final/mp8E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8J.c b/src/files/lang/pal-final/mp8J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8P.c b/src/files/lang/pal-final/mp8P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_f.c b/src/files/lang/pal-final/mp8_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_g.c b/src/files/lang/pal-final/mp8_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_i.c b/src/files/lang/pal-final/mp8_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp8_str_s.c b/src/files/lang/pal-final/mp8_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp8_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9E.c b/src/files/lang/pal-final/mp9E.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9E.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9J.c b/src/files/lang/pal-final/mp9J.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9J.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9P.c b/src/files/lang/pal-final/mp9P.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9P.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_f.c b/src/files/lang/pal-final/mp9_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_g.c b/src/files/lang/pal-final/mp9_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_i.c b/src/files/lang/pal-final/mp9_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mp9_str_s.c b/src/files/lang/pal-final/mp9_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/mp9_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/mpmenuE.c b/src/files/lang/pal-final/mpmenuE.c new file mode 100644 index 000000000..438885556 --- /dev/null +++ b/src/files/lang/pal-final/mpmenuE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-final/mpmenuJ.c b/src/files/lang/pal-final/mpmenuJ.c new file mode 100644 index 000000000..0329540db --- /dev/null +++ b/src/files/lang/pal-final/mpmenuJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Who Needs Armor?\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy Of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s Overview\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Golden\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Matrix", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Parking Lot", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ " to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Statistics\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time Spent:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save over\nyour original game file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight On Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo On Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacking Options\n", + /*218*/ "Pop A Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Flags Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Mac\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Flags on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Capture The Briefcase", + /*248*/ "Hack That Mac", + /*249*/ "Pop A Cap", + /*250*/ "King Of The Hill", + /*251*/ "Capture The Flag", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hack", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Flags", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Deaths\n", + /*282*/ "Kills\n", + /*283*/ "Inventory\n", + /*284*/ "Control\n", + /*285*/ "Game Time:\n", + /*286*/ "End Game\n", + /*287*/ "Pause\n", + /*288*/ "Unpause\n", + /*289*/ "End Game\n", + /*290*/ "Are you sure?\n", + /*291*/ "Cancel\n", + /*292*/ "End Game\n", + /*293*/ "PerfectHead\n", + /*294*/ "Load A Saved Head\n", + /*295*/ "Make A New Head\n", + /*296*/ "Edit A Loaded Head\n", + /*297*/ "Edit A PerfectHead\n", + /*298*/ "Choose slot to edit:\n", + /*299*/ "Cancel\n", + /*300*/ "Make A New Head\n", + /*301*/ "Load A Saved Head\n", + /*302*/ "Where do you want to be able\n", + /*303*/ "to use this head?\n", + /*304*/ "Combat Simulator\n", + /*305*/ "All Missions\n", + /*306*/ "Both\n", + /*307*/ "Cancel\n", + /*308*/ "Camera Set-Up\n", + /*309*/ "Insert your camera into your\n", + /*310*/ "Game Boy Pak.\n", + /*311*/ "Then, Insert your Game Boy Pak\n", + /*312*/ "into any controller.\n", + /*313*/ "OK\n", + /*314*/ "Cancel\n", + /*315*/ "Error\n", + /*316*/ "Game Boy Camera Not Detected!\n", + /*317*/ "Please check all connections\n", + /*318*/ "and try again.\n", + /*319*/ "Cancel\n", + /*320*/ "Choose Camera\n", + /*321*/ "More than one camera detected.\n", + /*322*/ "Please select which camera you\nwant to use\n", + /*323*/ "OK\n", + /*324*/ "Cancel\n", + /*325*/ "PerfectHead\n", + /*326*/ "Take A Picture Now\n", + /*327*/ "Load Picture From Camera\n", + /*328*/ "Cancel\n", + /*329*/ "Load From Camera\n", + /*330*/ "Choose picture to read from camera:\n", + /*331*/ "Cancel\n", + /*332*/ "Take Picture\n", + /*333*/ "Shoot!\n", + /*334*/ "Cancel\n", + /*335*/ "Keep Picture\n", + /*336*/ "Try Again\n", + /*337*/ "Load PerfectHead\n", + /*338*/ "Insert the Controller Pak\n", + /*339*/ "containing the head you\n", + /*340*/ "wish to load into any\n", + /*341*/ "controller.\n", + /*342*/ "Controller Pak:\n", + /*343*/ "Cancel\n", + /*344*/ "Source:\n", + /*345*/ "Pak 1", + /*346*/ "Pak 2", + /*347*/ "Pak 3", + /*348*/ "Pak 4", + /*349*/ "", + /*350*/ "PerfectHead Editor\n", + /*351*/ "Take Another Picture\n", + /*352*/ "Change Head\n", + /*353*/ "Position Picture\n", + /*354*/ "Color Face & Hair\n", + /*355*/ "Shape Head\n", + /*356*/ "Remove Head\n", + /*357*/ "Cancel Changes\n", + /*358*/ "Keep Changes\n", + /*359*/ "Shape Head\n", + /*360*/ "Depth\n", + /*361*/ "OK\n", + /*362*/ "Cancel\n", + /*363*/ "Position Image\n", + /*364*/ "Brightness\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Choose Head\n", + /*368*/ "OK\n", + /*369*/ "Cancel\n", + /*370*/ "Remove PerfectHead\n", + /*371*/ "Are you sure you want to\n", + /*372*/ "remove this head from memory?\n", + /*373*/ "Delete\n", + /*374*/ "Cancel\n", + /*375*/ "Cancel Changes\n", + /*376*/ "Are you sure you want to\n", + /*377*/ "throw away your changes?\n", + /*378*/ "Throw Away\n", + /*379*/ "Go Back To Editor\n", + /*380*/ "Save PerfectHead\n", + /*381*/ "You have edited this head.\n", + /*382*/ "Do you want to keep your changes?\n", + /*383*/ "Keep\n", + /*384*/ "Revert\n", + /*385*/ "Save PerfectHead\n", + /*386*/ "Your changes will be kept in memory.\n", + /*387*/ "Would you like to save your changes\n", + /*388*/ "to the controller pak?\n", + /*389*/ "Save\n", + /*390*/ "Don't Save\n", + /*391*/ "Save PerfectHead\n", + /*392*/ "You can now save your head on to\n", + /*393*/ "a controller pak if you wish.\n", + /*394*/ "If you want to do this, please\n", + /*395*/ "ensure a controller pak is inserted\n", + /*396*/ "and choose \"Save\".\n", + /*397*/ "Save\n", + /*398*/ "Don't Save\n", + /*399*/ "Head Complete!\n", + /*400*/ "To use your head in the combat simulator,\n", + /*401*/ "select the head from the character menu\n", + /*402*/ "of the player/simulant settings menu.\n", + /*403*/ "Your Mission heads will now appear\n", + /*404*/ "in any of the missions you play.\n", + /*405*/ "You can now edit your head further if you wish.\n", + /*406*/ "Finish\n", + /*407*/ "Edit Head\n", + /*408*/ "Head Color\n", + /*409*/ "Face:\n", + /*410*/ "Hairstyle:\n", + /*411*/ "OK\n", + /*412*/ "Cancel\n", + /*413*/ "Press B to Go Back\n", + /*414*/ "Hangar Information\n", + /*415*/ "Hologram Training Programs\n", + /*416*/ "Device List\n", + /*417*/ "Information\n", + /*418*/ "Locations\n", + /*419*/ "Vehicles\n", + /*420*/ "Character Profiles\n", + /*421*/ "Other Information\n", + /*422*/ "Training Stats\n", + /*423*/ "Time Taken:\n", + /*424*/ "Completed!\n", + /*425*/ "Failed!\n", + /*426*/ "Ok\n", + /*427*/ "Resume\n", + /*428*/ "Cancel\n", + /*429*/ "Abort\n", + /*430*/ "Character Profile\n", + /*431*/ "Name:\n", + /*432*/ "Age:\n", + /*433*/ "Race:\n", + /*434*/ "Press B to Go Back\n", + /*435*/ "Cheats\n", + /*436*/ "It is now safe to turn off your computer\n", + /*437*/ "Cancel\n", + /*438*/ "Bronze\n", + /*439*/ "Silver\n", + /*440*/ "Gold\n", + /*441*/ "Difficulty\n", + /*442*/ "Difficulty:\n", + /*443*/ "Select Difficulty:\n", + /*444*/ " \n", + /*445*/ "Weapon\n", + /*446*/ "Training Info\n", + /*447*/ "Training Stats\n", + /*448*/ "Completed!\n", + /*449*/ "Score:\n", + /*450*/ "Targets Destroyed:\n", + /*451*/ "Difficulty:\n", + /*452*/ "Time Taken:\n", + /*453*/ "Weapon:\n", + /*454*/ "Accuracy:\n", + /*455*/ "Not Failed\n", + /*456*/ "Out of Ammo\n", + /*457*/ "Time Over\n", + /*458*/ "Score Unattainable\n", + /*459*/ "Too Inaccurate\n", + /*460*/ "Bullseye\n", + /*461*/ "Zone 1\n", + /*462*/ "Zone 2\n", + /*463*/ "Zone 3\n", + /*464*/ "Hit total\n", + /*465*/ "Scoring\n", + /*466*/ "10\n", + /*467*/ "5\n", + /*468*/ "2\n", + /*469*/ "1\n", + /*470*/ "Ammo Limit:\n", + /*471*/ "Time Limit:\n", + /*472*/ "Min Accuracy:\n", + /*473*/ "Goal Targets:\n", + /*474*/ "Goal Score:\n", + /*475*/ "Cheats\n", + /*476*/ "Done\n", + /*477*/ "Warning\n", + /*478*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*479*/ "OK\n", + /*480*/ "Cancel\n", + /*481*/ "Player %d: ", + /*482*/ "Press Start!\n", + /*483*/ "Searching for Camera!\n", + /*484*/ "Calibrating Camera\n", + /*485*/ "Downloading Image\n", + /*486*/ "Loading Image\n", + /*487*/ "Saving Image\n", + /*488*/ "Transfering Image\n", + /*489*/ "Uploading Segment\n", + /*490*/ "Initialising Pak\n", + /*491*/ "Getting PerfectHead\n", + /*492*/ "Saving PerfectHead\n", + /*493*/ "Auto Camera Adjustment\n", + /*494*/ "Please Wait...\n", + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpmenuP.c b/src/files/lang/pal-final/mpmenuP.c new file mode 100644 index 000000000..9cffad023 --- /dev/null +++ b/src/files/lang/pal-final/mpmenuP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Most Suicidal\n", + /* 1*/ "Who Needs Ammo?\n", + /* 2*/ "Least Shielded\n", + /* 3*/ "Best Protected\n", + /* 4*/ "Marksmanship\n", + /* 5*/ "Most Professional\n", + /* 6*/ "Most Deadly\n", + /* 7*/ "Most Harmless\n", + /* 8*/ "Most Cowardly\n", + /* 9*/ "Most Frantic\n", + /* 10*/ "Most Honorable\n", + /* 11*/ "Most Dishonorable\n", + /* 12*/ "Shortest Life\n", + /* 13*/ "Longest Life\n", + /* 14*/ "Double Kill\n", + /* 15*/ "Triple Kill\n", + /* 16*/ "Quad Kill\n", + /* 17*/ "Game Setup\n", + /* 18*/ "Load Settings\n", + /* 19*/ "Scenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Options\n", + /* 22*/ "Teams\n", + /* 23*/ "Weapons\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulants\n", + /* 26*/ "Save Settings\n", + /* 27*/ "Abort Game\n", + /* 28*/ "Player Setup\n", + /* 29*/ "Load Player\n", + /* 30*/ "Name\n", + /* 31*/ "Character\n", + /* 32*/ "Handicap\n", + /* 33*/ "Control\n", + /* 34*/ "Player Options\n", + /* 35*/ "Statistics\n", + /* 36*/ "Start Game\n", + /* 37*/ "Drop Out\n", + /* 38*/ "Save Player\n", + /* 39*/ "Save Copy of Player\n", + /* 40*/ "Stuff\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team Names\n", + /* 43*/ "Ratio\n", + /* 44*/ "Lock\n", + /* 45*/ "None\n", + /* 46*/ "Last Winner\n", + /* 47*/ "Last Loser\n", + /* 48*/ "Random\n", + /* 49*/ "Challenge\n", + /* 50*/ "Combat Challenges\n", + /* 51*/ "Abort Challenge\n", + /* 52*/ "Abort\n", + /* 53*/ "Are you sure you want\nto abort the game?\n", + /* 54*/ "Abort\n", + /* 55*/ "Cancel\n", + /* 56*/ "%s\n", + /* 57*/ "Accept\n", + /* 58*/ "Cancel\n", + /* 59*/ "Team Names\n", + /* 60*/ "Back\n", + /* 61*/ "Change Team Name\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Current:\n", + /* 64*/ "Multiple Tunes\n", + /* 65*/ "Back\n", + /* 66*/ "Multiple Tunes\n", + /* 67*/ "Random\n", + /* 68*/ "Select Tunes\n", + /* 69*/ "Select Tune\n", + /* 70*/ "Team Control\n", + /* 71*/ "Teams Enabled\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto Team...\n", + /* 74*/ "Back\n", + /* 75*/ "Auto Team\n", + /* 76*/ "Two Teams\n", + /* 77*/ "Three Teams\n", + /* 78*/ "Four Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Humans vs. Simulants\n", + /* 81*/ "Human-Simulant Pairs\n", + /* 82*/ "Cancel\n", + /* 83*/ "Simulants\n", + /* 84*/ "Add Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Clear All\n", + /* 94*/ "Back\n", + /* 95*/ "Difficulty:\n", + /* 96*/ "Change Type...\n", + /* 97*/ "Character...\n", + /* 98*/ "Delete Simulant\n", + /* 99*/ "Back\n", + /*100*/ "Simulant Character\n", + /*101*/ "Add Simulant\n", + /*102*/ "Change Simulant\n", + /*103*/ "Normal Simulants\n", + /*104*/ "Special Simulants\n", + /*105*/ "Ready!\n", + /*106*/ "...and waiting\n", + /*107*/ "Limits\n", + /*108*/ "Time\n", + /*109*/ "Score\n", + /*110*/ "Restore Defaults\n", + /*111*/ "Back\n", + /*112*/ "No Limit\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "Random\n", + /*119*/ "Skedar", + /*120*/ "Pipes", + /*121*/ "Ravine", + /*122*/ "G5 Building", + /*123*/ "Sewers", + /*124*/ "Warehouse", + /*125*/ "Grid", + /*126*/ "Ruins", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Rooftop", + /*130*/ "Fortress", + /*131*/ "Villa", + /*132*/ "Car Park", + /*133*/ "Temple", + /*134*/ "Complex", + /*135*/ "Felicity", + /*136*/ "Random", + /*137*/ "Load Player\n", + /*138*/ "B Button to cancel\n", + /*139*/ "Load Game Settings\n", + /*140*/ "%s: Scenario: %s Arena: %s Simulants: %d", + /*141*/ "Presets\n", + /*142*/ "Player Name\n", + /*143*/ "Character\n", + /*144*/ "Load Head...\n", + /*145*/ "Stats for %s\n", + /*146*/ "Kills:\n", + /*147*/ "Deaths:\n", + /*148*/ "Accuracy:\n", + /*149*/ "Head Shots:\n", + /*150*/ "Ammo Used:\n", + /*151*/ "Damage Dealt:\n", + /*152*/ "Pain Received:\n", + /*153*/ "Games Played:\n", + /*154*/ "Games Won:\n", + /*155*/ "Games Lost:\n", + /*156*/ "Time:\n", + /*157*/ "Distance:\n", + /*158*/ "Medals Won:\n", + /*159*/ " Accuracy:\n", + /*160*/ " Head Shot:\n", + /*161*/ " KillMaster:\n", + /*162*/ " Survivor:\n", + /*163*/ "Your Title:\n", + /*164*/ "Back\n", + /*165*/ "Completed Challenges\n", + /*166*/ "Back\n", + /*167*/ "Options\n", + /*168*/ "Highlight Pickups\n", + /*169*/ "Highlight Players\n", + /*170*/ "Highlight Teams\n", + /*171*/ "Radar\n", + /*172*/ "Back\n", + /*173*/ "Weapons\n", + /*174*/ "Set:\n", + /*175*/ "Current Weapon Setup:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Back\n", + /*183*/ "Save Game Setup\n", + /*184*/ "Do you want to save\nover your original\ngame file?\n", + /*185*/ "Save Over Original\n", + /*186*/ "Save Copy\n", + /*187*/ "Do Not Save\n", + /*188*/ "Game File Name\n", + /*189*/ "Enter a name for your\ngame setup file:\n", + /*190*/ "Confirm\n", + /*191*/ "Your player file is\nalways saved\nautomatically.\n", + /*192*/ "Save a copy now?\n", + /*193*/ "No\n", + /*194*/ "Yes\n", + /*195*/ "Drop Out\n", + /*196*/ "Are you sure you\nwant to drop out?\n", + /*197*/ "Drop Out\n", + /*198*/ "Cancel\n", + /*199*/ "Control\n", + /*200*/ "Control Style\n", + /*201*/ "Reverse Pitch\n", + /*202*/ "Look Ahead\n", + /*203*/ "Head Roll\n", + /*204*/ "Auto-Aim\n", + /*205*/ "Aim Control\n", + /*206*/ "Sight on Screen\n", + /*207*/ "Show Target\n", + /*208*/ "Zoom Range\n", + /*209*/ "Ammo on Screen\n", + /*210*/ "Gun Function\n", + /*211*/ "Paintball\n", + /*212*/ "Back\n", + /*213*/ "Hold\n", + /*214*/ "Toggle\n", + /*215*/ "Combat Options\n", + /*216*/ "Briefcase Options\n", + /*217*/ "Hacker Options\n", + /*218*/ "Pop a Cap Options\n", + /*219*/ "Hill Options\n", + /*220*/ "Capture Options\n", + /*221*/ "Boxes Options\n", + /*222*/ "One-Hit Kills\n", + /*223*/ "Slow Motion\n", + /*224*/ "Fast Movement\n", + /*225*/ "Display Team\n", + /*226*/ "No Radar\n", + /*227*/ "No Auto-Aim\n", + /*228*/ "No Player Highlight\n", + /*229*/ "No Pickup Highlight\n", + /*230*/ "Highlight Target\n", + /*231*/ "Highlight Terminal\n", + /*232*/ "Boxes on Radar\n", + /*233*/ "Hill on Radar\n", + /*234*/ "Mobile Hill\n", + /*235*/ "Time\n", + /*236*/ "Show on Radar\n", + /*237*/ "Highlight Briefcase\n", + /*238*/ "Show on Radar\n", + /*239*/ "Back\n", + /*240*/ "Off\n", + /*241*/ "On\n", + /*242*/ "Smart\n", + /*243*/ "Scenario\n", + /*244*/ "Free for All!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Combat", + /*247*/ "Hold the Briefcase", + /*248*/ "Hacker Central", + /*249*/ "Pop a Cap", + /*250*/ "King of the Hill", + /*251*/ "Capture the Case", + /*252*/ "Touch That Box", + /*253*/ "Combat", + /*254*/ "Briefcase", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hill", + /*258*/ "Capture", + /*259*/ "Boxes", + /*260*/ "Game Over\n", + /*261*/ "Title:\n", + /*262*/ "Weapon of Choice:\n", + /*263*/ "Awards:\n", + /*264*/ "1st\n", + /*265*/ "2nd\n", + /*266*/ "3rd\n", + /*267*/ "4th\n", + /*268*/ "5th\n", + /*269*/ "6th\n", + /*270*/ "7th\n", + /*271*/ "8th\n", + /*272*/ "9th\n", + /*273*/ "10th\n", + /*274*/ "11th\n", + /*275*/ "12th\n", + /*276*/ "Player Ranking\n", + /*277*/ "Deaths\n", + /*278*/ "Score\n", + /*279*/ "Team Ranking\n", + /*280*/ "Stats for %s", + /*281*/ "Suicides\n", + /*282*/ "Deaths\n", + /*283*/ "Kills\n", + /*284*/ "Inventory\n", + /*285*/ "Control\n", + /*286*/ "Game Time:\n", + /*287*/ "End Game\n", + /*288*/ "Pause\n", + /*289*/ "Unpause\n", + /*290*/ "End Game\n", + /*291*/ "Are you sure?\n", + /*292*/ "Cancel\n", + /*293*/ "End Game\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the Controller Pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a Controller Pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a Controller Pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Colour\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Press the B Button to go back.\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Device List\n", + /*418*/ "Information\n", + /*419*/ "Locations\n", + /*420*/ "Vehicles\n", + /*421*/ "Character Profiles\n", + /*422*/ "Other Information\n", + /*423*/ "Training Stats\n", + /*424*/ "Time Taken:\n", + /*425*/ "Completed!\n", + /*426*/ "Failed!\n", + /*427*/ "Ok\n", + /*428*/ "Resume\n", + /*429*/ "Cancel\n", + /*430*/ "Abort\n", + /*431*/ "Character Profile\n", + /*432*/ "Name:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Press the B Button to go back.\n", + /*436*/ "Cheats\n", + /*437*/ "It is now safe to turn off your computer.\n", + /*438*/ "Cancel\n", + /*439*/ "Bronze\n", + /*440*/ "Silver\n", + /*441*/ "Gold\n", + /*442*/ "Difficulty\n", + /*443*/ "Difficulty:\n", + /*444*/ "Select Difficulty:\n", + /*445*/ " \n", + /*446*/ "Weapon\n", + /*447*/ "Training Info\n", + /*448*/ "Training Stats\n", + /*449*/ "Completed!\n", + /*450*/ "Score:\n", + /*451*/ "Targets Destroyed:\n", + /*452*/ "Difficulty:\n", + /*453*/ "Time Taken:\n", + /*454*/ "Weapon:\n", + /*455*/ "Accuracy:\n", + /*456*/ "Not Failed\n", + /*457*/ "Out of Ammo\n", + /*458*/ "Time Over\n", + /*459*/ "Score Unattainable\n", + /*460*/ "Too Inaccurate\n", + /*461*/ "Bull's-eye\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Hit total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Ammo Limit:\n", + /*472*/ "Time Limit:\n", + /*473*/ "Min Accuracy:\n", + /*474*/ "Goal Targets:\n", + /*475*/ "Goal Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Done\n", + /*478*/ "Warning\n", + /*479*/ "If you activate any cheats, then you\nwill be unable to progress further in the game\nwhile those cheats are active.\n", + /*480*/ "OK\n", + /*481*/ "Cancel\n", + /*482*/ "Player %d: ", + /*483*/ "Press START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Checking Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Please Wait...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_f.c b/src/files/lang/pal-final/mpmenu_str_f.c new file mode 100644 index 000000000..a654639cf --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Super suicidaire\n", + /* 1*/ "Munitions? Où?\n", + /* 2*/ "Le moins protégé\n", + /* 3*/ "Le mieux protégé\n", + /* 4*/ "Tireur d'élite\n", + /* 5*/ "Le plus pro\n", + /* 6*/ "Le plus meurtrier\n", + /* 7*/ "Le plus inoffensif\n", + /* 8*/ "Le plus pétochard\n", + /* 9*/ "Le plus dingue\n", + /* 10*/ "Le plus loyal\n", + /* 11*/ "Le plus fourbe\n", + /* 12*/ "Durée de vie Mini\n", + /* 13*/ "Duréede vie Maxi\n", + /* 14*/ "Double frag\n", + /* 15*/ "Triple frag\n", + /* 16*/ "Quadruple frag\n", + /* 17*/ "Paramètres jeu\n", + /* 18*/ "Charger param.\n", + /* 19*/ "Scénario\n", + /* 20*/ "Arènes\n", + /* 21*/ "Options\n", + /* 22*/ "Equipes\n", + /* 23*/ "Armes\n", + /* 24*/ "Limites\n", + /* 25*/ "Simulants\n", + /* 26*/ "Sauver param.\n", + /* 27*/ "Abandonner\n", + /* 28*/ "Param. joueur\n", + /* 29*/ "Charger joueur\n", + /* 30*/ "Nom\n", + /* 31*/ "Personnages\n", + /* 32*/ "Handicap\n", + /* 33*/ "Manipulations\n", + /* 34*/ "Options joueur\n", + /* 35*/ "Statistiques\n", + /* 36*/ "Commencer jeu\n", + /* 37*/ "Arrêter\n", + /* 38*/ "Sauver joueur\n", + /* 39*/ "Sauv. copie joueur\n", + /* 40*/ "Trucs\n", + /* 41*/ "Musique\n", + /* 42*/ "Noms équipes\n", + /* 43*/ "Ratio\n", + /* 44*/ "Verrou\n", + /* 45*/ "Aucun\n", + /* 46*/ "Vainq.\n", + /* 47*/ "Perd.\n", + /* 48*/ "Hasard\n", + /* 49*/ "Challenge\n", + /* 50*/ "Challenges combat\n", + /* 51*/ "Abandonner Challenge\n", + /* 52*/ "Abandonner\n", + /* 53*/ "Voulez-vous vraiment\nabandonner la partie?\n", + /* 54*/ "Abandonner\n", + /* 55*/ "Retour\n", + /* 56*/ "%s\n", + /* 57*/ "Accepter\n", + /* 58*/ "Retour\n", + /* 59*/ "Noms équipes\n", + /* 60*/ "Retour\n", + /* 61*/ "Changer nom équipe\n", + /* 62*/ "Musique\n", + /* 63*/ "Actuelle:\n", + /* 64*/ "Musiques multiples\n", + /* 65*/ "Retour\n", + /* 66*/ "Musiques multiples\n", + /* 67*/ "Hasard\n", + /* 68*/ "Choix musiques\n", + /* 69*/ "Choix musique\n", + /* 70*/ "Manip. équipe\n", + /* 71*/ "Equipes activées\n", + /* 72*/ "Equipes:\n", + /* 73*/ "Equipe auto...\n", + /* 74*/ "Retour\n", + /* 75*/ "Equipe auto\n", + /* 76*/ "Deux équipes\n", + /* 77*/ "Trois équipes\n", + /* 78*/ "Quatre équipes\n", + /* 79*/ "Maximum équipes\n", + /* 80*/ "Humains vs Simulants\n", + /* 81*/ "Duos Humain-Simulant\n", + /* 82*/ "Retour\n", + /* 83*/ "Simulants\n", + /* 84*/ "Ajouter Simulant...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Effacer tout\n", + /* 94*/ "Retour\n", + /* 95*/ "Difficulté:\n", + /* 96*/ "Changer type...\n", + /* 97*/ "Personnage...\n", + /* 98*/ "Effacer Simulant\n", + /* 99*/ "Retour\n", + /*100*/ "Personnage Simulant\n", + /*101*/ "Ajouter Simulant\n", + /*102*/ "Changer Simulant\n", + /*103*/ "Simulants normaux\n", + /*104*/ "Simulants spéciaux\n", + /*105*/ "Prêt!\n", + /*106*/ "...en attente\n", + /*107*/ "Limites\n", + /*108*/ "Temps\n", + /*109*/ "Score\n", + /*110*/ "Rétablir par défaut\n", + /*111*/ "Retour\n", + /*112*/ "Pas de limite\n", + /*113*/ "%d\n", + /*114*/ "%d Min.\n", + /*115*/ "Arènes\n", + /*116*/ "Dark\n", + /*117*/ "Classique\n", + /*118*/ "Hasard\n", + /*119*/ "Skedar", + /*120*/ "Conduits", + /*121*/ "Ravin", + /*122*/ "Immeuble G5", + /*123*/ "Egouts", + /*124*/ "Entrepôt", + /*125*/ "Grid", + /*126*/ "Ruines", + /*127*/ "Secteur 52", + /*128*/ "Base", + /*129*/ "Toit", + /*130*/ "Forteresse", + /*131*/ "Villa", + /*132*/ "Parking", + /*133*/ "Temple", + /*134*/ "Complexe", + /*135*/ "Félicité", + /*136*/ "Hasard", + /*137*/ "Charger joueur\n", + /*138*/ "Bouton B pour annuler\n", + /*139*/ "Charger param.\n", + /*140*/ "%s: Scénario: %s Arène: %s Simulants: %d", + /*141*/ "Présélections\n", + /*142*/ "Nom joueur\n", + /*143*/ "Personnage\n", + /*144*/ "Charger tête...\n", + /*145*/ "Stats pour %s\n", + /*146*/ "Tués:\n", + /*147*/ "Morts:\n", + /*148*/ "Précision:\n", + /*149*/ "Tirs tête:\n", + /*150*/ "Mun. util.:\n", + /*151*/ "Dég. infligés:\n", + /*152*/ "Dég. reçus:\n", + /*153*/ "Parties:\n", + /*154*/ "Gagnées:\n", + /*155*/ "Perdues:\n", + /*156*/ "Temps:\n", + /*157*/ "Distance:\n", + /*158*/ "Médailles gagnées:\n", + /*159*/ " Précision:\n", + /*160*/ " Tirs tête:\n", + /*161*/ " Tueur:\n", + /*162*/ " Survivant:\n", + /*163*/ "Votre titre:\n", + /*164*/ "Retour\n", + /*165*/ "Challenges complétés\n", + /*166*/ "Retour\n", + /*167*/ "Options\n", + /*168*/ "Voir récup.\n", + /*169*/ "Voir joueurs\n", + /*170*/ "Voir équipes\n", + /*171*/ "Radar\n", + /*172*/ "Retour\n", + /*173*/ "Armes\n", + /*174*/ "Choix:\n", + /*175*/ "Param. armes actuels:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Retour\n", + /*183*/ "Sauver param. jeu\n", + /*184*/ "Ecraser votre\nfichier original?\n", + /*185*/ "Ecraser fichier\n", + /*186*/ "Sauver copie\n", + /*187*/ "Ne pas sauver\n", + /*188*/ "Nom fichier\n", + /*189*/ "Entrer nom pour\nfichier de paramètres:\n", + /*190*/ "Confirmer\n", + /*191*/ "Fichier joueur\nest sauvé\nen auto.\n", + /*192*/ "Sauver une copie?\n", + /*193*/ "Non\n", + /*194*/ "Oui\n", + /*195*/ "Arrêter\n", + /*196*/ "Voulez-vous vraiment\narrêter?\n", + /*197*/ "Arrêter\n", + /*198*/ "Retour\n", + /*199*/ "Manipulations\n", + /*200*/ "Style manip.\n", + /*201*/ "Inverser axe\n", + /*202*/ "Voir devant\n", + /*203*/ "Mouv. tête\n", + /*204*/ "Visée auto\n", + /*205*/ "Contrôle visée\n", + /*206*/ "Cible à l'écran\n", + /*207*/ "Voir cible\n", + /*208*/ "Portée zoom\n", + /*209*/ "Munit. à l'écran\n", + /*210*/ "Fonction arme\n", + /*211*/ "Paintball\n", + /*212*/ "Retour\n", + /*213*/ "Fixe\n", + /*214*/ "Alt.\n", + /*215*/ "Options combat\n", + /*216*/ "Options mallette\n", + /*217*/ "Options hacker\n", + /*218*/ "Options décapsuleur\n", + /*219*/ "Options zone\n", + /*220*/ "Options capture\n", + /*221*/ "Options PC\n", + /*222*/ "Pan! T'es mort!\n", + /*223*/ "Ralenti\n", + /*224*/ "Mouvement rapide\n", + /*225*/ "Afficher équipe\n", + /*226*/ "Sans radar\n", + /*227*/ "Sans visée auto\n", + /*228*/ "Sans voir joueur\n", + /*229*/ "Sans voir récup.\n", + /*230*/ "Voir cible\n", + /*231*/ "Voir Terminal\n", + /*232*/ "PC sur radar\n", + /*233*/ "Zone sur radar\n", + /*234*/ "Zone mobile\n", + /*235*/ "Temps\n", + /*236*/ "Visible sur radar\n", + /*237*/ "Voir mallette\n", + /*238*/ "Voir sur radar\n", + /*239*/ "Retour\n", + /*240*/ "Non\n", + /*241*/ "Oui\n", + /*242*/ "Custom\n", + /*243*/ "Scénario\n", + /*244*/ "Chacun pour soi!\n", + /*245*/ "-Equipes-\n", + /*246*/ "Combat", + /*247*/ "Tenir la mallette", + /*248*/ "Centre hacker", + /*249*/ "Décapsuleur", + /*250*/ "Roi de la zone", + /*251*/ "Capturer la mallette", + /*252*/ "Contrôle de PC", + /*253*/ "Combat", + /*254*/ "Mallette", + /*255*/ "Hacker", + /*256*/ "Décaps.", + /*257*/ "Zone", + /*258*/ "Capture", + /*259*/ "PC", + /*260*/ "Game Over\n", + /*261*/ "Titre:\n", + /*262*/ "Arme de prédilection:\n", + /*263*/ "Prix:\n", + /*264*/ "1er\n", + /*265*/ "2ème\n", + /*266*/ "3ème\n", + /*267*/ "4ème\n", + /*268*/ "5ème\n", + /*269*/ "6ème\n", + /*270*/ "7ème\n", + /*271*/ "8ème\n", + /*272*/ "9ème\n", + /*273*/ "10ème\n", + /*274*/ "11ème\n", + /*275*/ "12ème\n", + /*276*/ "Classement joueur\n", + /*277*/ "Morts\n", + /*278*/ "Score\n", + /*279*/ "Classement équipe\n", + /*280*/ "Stats de %s", + /*281*/ "Suicides\n", + /*282*/ "Morts\n", + /*283*/ "Tués\n", + /*284*/ "Inventaire\n", + /*285*/ "Manipulation\n", + /*286*/ "Temps de jeu:\n", + /*287*/ "Fin de jeu\n", + /*288*/ "Pause\n", + /*289*/ "Reprendre\n", + /*290*/ "Fin jeu\n", + /*291*/ "Etes-vous sûr?\n", + /*292*/ "Annuler\n", + /*293*/ "Fin jeu\n", + /*294*/ "PerfectHead\n", + /*295*/ "Load A Saved Head\n", + /*296*/ "Make A New Head\n", + /*297*/ "Edit A Loaded Head\n", + /*298*/ "Edit A PerfectHead\n", + /*299*/ "Choose slot to edit:\n", + /*300*/ "Cancel\n", + /*301*/ "Make A New Head\n", + /*302*/ "Load A Saved Head\n", + /*303*/ "Where do you want to be able\n", + /*304*/ "to use this head?\n", + /*305*/ "Combat Simulator\n", + /*306*/ "All Missions\n", + /*307*/ "Both\n", + /*308*/ "Cancel\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "Load PerfectHead\n", + /*339*/ "Insert the Controller Pak\n", + /*340*/ "containing the head you\n", + /*341*/ "wish to load into any\n", + /*342*/ "controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancel\n", + /*345*/ "Source:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "Save PerfectHead\n", + /*393*/ "You can now save your head on to\n", + /*394*/ "a controller pak if you wish.\n", + /*395*/ "If you want to do this, please\n", + /*396*/ "ensure a controller pak is inserted\n", + /*397*/ "and choose \"Save\".\n", + /*398*/ "Save\n", + /*399*/ "Don't Save\n", + /*400*/ "Head Complete!\n", + /*401*/ "To use your head in the combat simulator,\n", + /*402*/ "select the head from the character menu\n", + /*403*/ "of the player/simulant settings menu.\n", + /*404*/ "Your Mission heads will now appear\n", + /*405*/ "in any of the missions you play.\n", + /*406*/ "You can now edit your head further if you wish.\n", + /*407*/ "Finish\n", + /*408*/ "Edit Head\n", + /*409*/ "Head Color\n", + /*410*/ "Face:\n", + /*411*/ "Hairstyle:\n", + /*412*/ "OK\n", + /*413*/ "Cancel\n", + /*414*/ "Bouton B pour Retour.\n", + /*415*/ "Hangar d'information\n", + /*416*/ "Holo-entraînement\n", + /*417*/ "Liste appareils\n", + /*418*/ "Informations\n", + /*419*/ "Emplacements\n", + /*420*/ "Véhicules\n", + /*421*/ "Profils personnages\n", + /*422*/ "Autres informations\n", + /*423*/ "Stats entraînement\n", + /*424*/ "Temps écoulé:\n", + /*425*/ "Succès!\n", + /*426*/ "Echec!\n", + /*427*/ "Ok\n", + /*428*/ "Reprendre\n", + /*429*/ "Annuler\n", + /*430*/ "Abandonner\n", + /*431*/ "Profil personnage\n", + /*432*/ "Nom:\n", + /*433*/ "Age:\n", + /*434*/ "Race:\n", + /*435*/ "Bouton B pour Retour.\n", + /*436*/ "Triche\n", + /*437*/ "Vous pouvez éteindre votre ordinateur en toute sécurité.\n", + /*438*/ "Annuler\n", + /*439*/ "Bronze\n", + /*440*/ "Argent\n", + /*441*/ "Or\n", + /*442*/ "Difficulté\n", + /*443*/ "Difficulté:\n", + /*444*/ "Choix difficulté:\n", + /*445*/ " \n", + /*446*/ "Arme\n", + /*447*/ "Info entraînement\n", + /*448*/ "Stats entraînement\n", + /*449*/ "Succès!\n", + /*450*/ "Score:\n", + /*451*/ "Cibles détruites:\n", + /*452*/ "Difficulté:\n", + /*453*/ "Temps écoulé:\n", + /*454*/ "Arme:\n", + /*455*/ "Précision:\n", + /*456*/ "Pas échoué\n", + /*457*/ "Plus de munit.\n", + /*458*/ "Fin chrono\n", + /*459*/ "Score non atteint\n", + /*460*/ "Trop imprécis\n", + /*461*/ "Centre\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Score\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munit.:\n", + /*472*/ "Limite temps:\n", + /*473*/ "Précision Mini:\n", + /*474*/ "Cibles à détruire:\n", + /*475*/ "Score à atteindre:\n", + /*476*/ "Triche\n", + /*477*/ "Terminé\n", + /*478*/ "Attention\n", + /*479*/ "En utilsant les codes de triche\nvous ne pourrez pas progresser dans le jeu \ntant que ceux-ci seront activés.\n", + /*480*/ "OK\n", + /*481*/ "Annuler\n", + /*482*/ "Joueur %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Vérif. Controller Pak\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Attendre...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_g.c b/src/files/lang/pal-final/mpmenu_str_g.c new file mode 100644 index 000000000..d0f7ba5b1 --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Suizidal\n", + /* 1*/ "Muni?\n", + /* 2*/ "Schilde?\n", + /* 3*/ "Bestgeschützt\n", + /* 4*/ "Treffsicher\n", + /* 5*/ "Professionell\n", + /* 6*/ "Gefährlich\n", + /* 7*/ "Harmlos\n", + /* 8*/ "Feig\n", + /* 9*/ "Verzweifelt\n", + /* 10*/ "Ehrenhaft\n", + /* 11*/ "Unehrenhaft\n", + /* 12*/ "Eintagsfliege\n", + /* 13*/ "Methusalem\n", + /* 14*/ "Doppel-Treffer\n", + /* 15*/ "Trippel-Treffer\n", + /* 16*/ "Quadro-Treffer\n", + /* 17*/ "Spiel-Einstellungen\n", + /* 18*/ "Laden\n", + /* 19*/ "Szenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Optionen\n", + /* 22*/ "Teams\n", + /* 23*/ "Waffen\n", + /* 24*/ "Limits\n", + /* 25*/ "Simulanten\n", + /* 26*/ "Speichern\n", + /* 27*/ "Spiel abbrechen\n", + /* 28*/ "Spieler-Einstellungen\n", + /* 29*/ "Spieler laden\n", + /* 30*/ "Name\n", + /* 31*/ "Charakter\n", + /* 32*/ "Handicap\n", + /* 33*/ "Steuerung\n", + /* 34*/ "Spieler-Optionen\n", + /* 35*/ "Statistik\n", + /* 36*/ "Spielstart\n", + /* 37*/ "Abbruch\n", + /* 38*/ "Spieler speichern\n", + /* 39*/ "Kopie speichern\n", + /* 40*/ "Zeugs\n", + /* 41*/ "Soundtrack\n", + /* 42*/ "Team-Namen\n", + /* 43*/ "Rate\n", + /* 44*/ "Sperre\n", + /* 45*/ "keine\n", + /* 46*/ "Letzt. Gewinner\n", + /* 47*/ "Letzt. Verlierer\n", + /* 48*/ "zufällig\n", + /* 49*/ "Challenge\n", + /* 50*/ "Kampf-Challenge\n", + /* 51*/ "Challenge abbrechen\n", + /* 52*/ "Abbruch\n", + /* 53*/ "Möchten Sie wirklich\nabbrechen?\n", + /* 54*/ "Abbruch\n", + /* 55*/ "Zurück\n", + /* 56*/ "%s\n", + /* 57*/ "Annehmen\n", + /* 58*/ "Zurück\n", + /* 59*/ "Team-Namen\n", + /* 60*/ "Zurück\n", + /* 61*/ "Team-Name ändern\n", + /* 62*/ "Soundtrack\n", + /* 63*/ "Derzeit:\n", + /* 64*/ "Multiple Sound\n", + /* 65*/ "Zurück\n", + /* 66*/ "Multiple Sounds\n", + /* 67*/ "zufällig\n", + /* 68*/ "Wähle Sounds\n", + /* 69*/ "Wähle Sound\n", + /* 70*/ "Team-Steuerung\n", + /* 71*/ "Teams ermächtigt\n", + /* 72*/ "Teams:\n", + /* 73*/ "Auto-Team...\n", + /* 74*/ "Zurück\n", + /* 75*/ "Auto-Team\n", + /* 76*/ "Zwei Teams\n", + /* 77*/ "Drei Teams\n", + /* 78*/ "Vier Teams\n", + /* 79*/ "Maximum Teams\n", + /* 80*/ "Menschen vs. Sim.\n", + /* 81*/ "Menschen-Sim.-Paare\n", + /* 82*/ "Zurück\n", + /* 83*/ "Simulanten\n", + /* 84*/ "Simulant hinzufügen...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Alle löschen\n", + /* 94*/ "Zurück\n", + /* 95*/ "Schwierigkeit:\n", + /* 96*/ "Typ wechseln...\n", + /* 97*/ "Charakter...\n", + /* 98*/ "Simulant löschen\n", + /* 99*/ "Zurück\n", + /*100*/ "Simulanten-Charakter\n", + /*101*/ "Simulant hinzufügen\n", + /*102*/ "Simulant wechseln\n", + /*103*/ "Normale Simulanten\n", + /*104*/ "Spezielle Simulanten\n", + /*105*/ "Fertig!\n", + /*106*/ "...und bereit\n", + /*107*/ "Limits\n", + /*108*/ "Zeit\n", + /*109*/ "Score\n", + /*110*/ "Grundeinstellung\n", + /*111*/ "Zurück\n", + /*112*/ "Unbegr.\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Classic\n", + /*118*/ "zufällig\n", + /*119*/ "Skedar", + /*120*/ "Rohre", + /*121*/ "Graben", + /*122*/ "G5-Building", + /*123*/ "Kanäle", + /*124*/ "Lagerhaus", + /*125*/ "Netz", + /*126*/ "Ruinen", + /*127*/ "Area 52", + /*128*/ "Basis", + /*129*/ "Dächer", + /*130*/ "Festung", + /*131*/ "Villa", + /*132*/ "Parkdeck", + /*133*/ "Tempel", + /*134*/ "Komplex", + /*135*/ "Glückseligkeit", + /*136*/ "Zufällig", + /*137*/ "Spieler laden\n", + /*138*/ "Abbruch\n", + /*139*/ "Laden\n", + /*140*/ "%s: Szenario: %s Arena: %s Simulanten: %d", + /*141*/ "Voreinstellungen\n", + /*142*/ "Spieler-Name\n", + /*143*/ "Charakter\n", + /*144*/ "Kopf laden...\n", + /*145*/ "Statistik für %s\n", + /*146*/ "Treff.:\n", + /*147*/ "Versuche:\n", + /*148*/ "Genauigkeit:\n", + /*149*/ "Kopftreffer:\n", + /*150*/ "Munition:\n", + /*151*/ "Schaden:\n", + /*152*/ "Schmerzen:\n", + /*153*/ "Spiele gesamt:\n", + /*154*/ "Gewinne:\n", + /*155*/ "Verluste:\n", + /*156*/ "Zeit:\n", + /*157*/ "Distanz:\n", + /*158*/ "Medaillen:\n", + /*159*/ " Genauigkeit:\n", + /*160*/ " Kopftreffer:\n", + /*161*/ " Meisterschütze:\n", + /*162*/ " Überlebender:\n", + /*163*/ "Ihr Titel:\n", + /*164*/ "Zurück\n", + /*165*/ "Challenges OK\n", + /*166*/ "Zurück\n", + /*167*/ "Optionen\n", + /*168*/ "Items anzeigen\n", + /*169*/ "Spieler anzeigen\n", + /*170*/ "Teams anzeigen\n", + /*171*/ "Radar\n", + /*172*/ "Zurück\n", + /*173*/ "Bewaffnung\n", + /*174*/ "Einstellung:\n", + /*175*/ "Aktuelle Einstellung:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Zurück\n", + /*183*/ "Speichern\n", + /*184*/ "Möchten Sie das \nbestehende File\nüberschreiben?\n", + /*185*/ "Überschreiben\n", + /*186*/ "Kopieren\n", + /*187*/ "Nicht speichern\n", + /*188*/ "File-Name\n", + /*189*/ "Bitte benennen Sie\nIhr File:\n", + /*190*/ "Bestätigen\n", + /*191*/ "Ihr Spieler-File wird\nimmer automatisch\ngespeichert.\n", + /*192*/ "Kopie speichern?\n", + /*193*/ "Nein\n", + /*194*/ "Ja\n", + /*195*/ "Abbruch\n", + /*196*/ "Möchten Sie wirklich\nabbrechen?\n", + /*197*/ "Abbrechen\n", + /*198*/ "Zurück\n", + /*199*/ "Steuerung\n", + /*200*/ "Steuerungsart\n", + /*201*/ "Blick vertauschen\n", + /*202*/ "Vorausschauen\n", + /*203*/ "Kopfneigung\n", + /*204*/ "Auto-Ziel\n", + /*205*/ "Ziel-Steuerung\n", + /*206*/ "Screen-Anzeigen\n", + /*207*/ "Ziel zeigen\n", + /*208*/ "Zoom-Bereich\n", + /*209*/ "Munition anzeigen\n", + /*210*/ "Funktion anzeigen\n", + /*211*/ "Paintball\n", + /*212*/ "Zurück\n", + /*213*/ "Halten\n", + /*214*/ "Umschalten\n", + /*215*/ "Kampf-Optionen\n", + /*216*/ "Aktenkoffer-Optionen\n", + /*217*/ "Hacker-Optionen\n", + /*218*/ "Pop a Cap-Optionen\n", + /*219*/ "Hügel-Optionen\n", + /*220*/ "Fang-Optionen\n", + /*221*/ "Boxen-Optionen\n", + /*222*/ "Ein Treffer\n", + /*223*/ "Zeitlupe\n", + /*224*/ "Zeitraffer\n", + /*225*/ "Team anzeigen\n", + /*226*/ "Kein Radar\n", + /*227*/ "Kein Auto-Ziel\n", + /*228*/ "Spieler nicht zeigen\n", + /*229*/ "Items nicht zeigen\n", + /*230*/ "Ziel anzeigen\n", + /*231*/ "Terminal anzeigen\n", + /*232*/ "Boxen am Radar zeigen\n", + /*233*/ "Hügel zeigen\n", + /*234*/ "Mobiler Hügel\n", + /*235*/ "Zeit\n", + /*236*/ "Am Radar zeigen\n", + /*237*/ "Koffer zeigen\n", + /*238*/ "Am Radar zeigen\n", + /*239*/ "Zurück\n", + /*240*/ "Aus\n", + /*241*/ "Ein\n", + /*242*/ "Smart\n", + /*243*/ "Szenario\n", + /*244*/ "Frei für alle!\n", + /*245*/ "-Teamwork-\n", + /*246*/ "Kampf", + /*247*/ "Der Koffer 1", + /*248*/ "Hacker-Zentrale", + /*249*/ "Pop a Cap", + /*250*/ "Herr des Hügels", + /*251*/ "Der Koffer 2", + /*252*/ "Berühr die Box", + /*253*/ "Kampf", + /*254*/ "Aktenkoffer", + /*255*/ "Hacker", + /*256*/ "Pop", + /*257*/ "Hügel", + /*258*/ "Fang", + /*259*/ "Boxen", + /*260*/ "Game Over\n", + /*261*/ "Titel:\n", + /*262*/ "Bevorzugte Waffe:\n", + /*263*/ "Preise:\n", + /*264*/ "1.\n", + /*265*/ "2.\n", + /*266*/ "3.\n", + /*267*/ "4.\n", + /*268*/ "5.\n", + /*269*/ "6.\n", + /*270*/ "7.\n", + /*271*/ "8.\n", + /*272*/ "9.\n", + /*273*/ "10.\n", + /*274*/ "11.\n", + /*275*/ "12.\n", + /*276*/ "Spieler-Bewertung\n", + /*277*/ "Versuche\n", + /*278*/ "Score\n", + /*279*/ "Team-Bewertung\n", + /*280*/ "Statistik für %s", + /*281*/ "Suizide\n", + /*282*/ "Versuche\n", + /*283*/ "Hits\n", + /*284*/ "Inventar\n", + /*285*/ "Steuerung\n", + /*286*/ "Spielzeit:\n", + /*287*/ "Spiel beenden\n", + /*288*/ "Pause\n", + /*289*/ "Pause beenden\n", + /*290*/ "Spiel beenden\n", + /*291*/ "Sind Sie sicher?\n", + /*292*/ "Zurück\n", + /*293*/ "Spiel beenden\n", + /*294*/ "PerfectHead\n", + /*295*/ "Gespeicherten Kopf laden\n", + /*296*/ "Neuen Kopf erstellen\n", + /*297*/ "Kopf editieren\n", + /*298*/ "PerfectHead editieren\n", + /*299*/ "Wähle den Kopf:\n", + /*300*/ "Abbruch\n", + /*301*/ "Neuen Kopf erstellen\n", + /*302*/ "Gespeicherten Kopf laden\n", + /*303*/ "Wo möchtest du diesen\n", + /*304*/ "Kopf einsetzen?\n", + /*305*/ "Kampfsimulator\n", + /*306*/ "Alle Missionen\n", + /*307*/ "Beide\n", + /*308*/ "Abbruch\n", + /*309*/ "Camera Setup\n", + /*310*/ "Insert your camera into your\n", + /*311*/ "Game Boy Pak.\n", + /*312*/ "Then, insert your Game Boy Pak\n", + /*313*/ "into any controller.\n", + /*314*/ "OK\n", + /*315*/ "Cancel\n", + /*316*/ "Error\n", + /*317*/ "Game Boy Camera Not Detected!\n", + /*318*/ "Please check all connections\n", + /*319*/ "and try again.\n", + /*320*/ "Cancel\n", + /*321*/ "Choose Camera\n", + /*322*/ "More than one camera detected.\n", + /*323*/ "Please select which camera you\nwant to use\n", + /*324*/ "OK\n", + /*325*/ "Cancel\n", + /*326*/ "PerfectHead\n", + /*327*/ "Take A Picture Now\n", + /*328*/ "Load Picture From Camera\n", + /*329*/ "Cancel\n", + /*330*/ "Load From Camera\n", + /*331*/ "Choose picture to read from camera:\n", + /*332*/ "Cancel\n", + /*333*/ "Take Picture\n", + /*334*/ "Shoot!\n", + /*335*/ "Cancel\n", + /*336*/ "Keep Picture\n", + /*337*/ "Try Again\n", + /*338*/ "PerfectHead laden\n", + /*339*/ "Legen Sie das Controller Pak\n", + /*340*/ "mit dem Kopf, den Sie laden\n", + /*341*/ "möchten in einen beliebigen\n", + /*342*/ "Controller ein.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Abbruch\n", + /*345*/ "Quelle:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "PerfectHead Editor\n", + /*352*/ "Take Another Picture\n", + /*353*/ "Change Head\n", + /*354*/ "Position Picture\n", + /*355*/ "Color Face & Hair\n", + /*356*/ "Shape Head\n", + /*357*/ "Remove Head\n", + /*358*/ "Cancel Changes\n", + /*359*/ "Keep Changes\n", + /*360*/ "Shape Head\n", + /*361*/ "Depth\n", + /*362*/ "OK\n", + /*363*/ "Cancel\n", + /*364*/ "Position Image\n", + /*365*/ "Brightness\n", + /*366*/ "OK\n", + /*367*/ "Cancel\n", + /*368*/ "Choose Head\n", + /*369*/ "OK\n", + /*370*/ "Cancel\n", + /*371*/ "Remove PerfectHead\n", + /*372*/ "Are you sure you want to\n", + /*373*/ "remove this head from memory?\n", + /*374*/ "Delete\n", + /*375*/ "Cancel\n", + /*376*/ "Cancel Changes\n", + /*377*/ "Are you sure you want to\n", + /*378*/ "throw away your changes?\n", + /*379*/ "Throw Away\n", + /*380*/ "Go Back To Editor\n", + /*381*/ "Save PerfectHead\n", + /*382*/ "You have edited this head.\n", + /*383*/ "Do you want to keep your changes?\n", + /*384*/ "Keep\n", + /*385*/ "Revert\n", + /*386*/ "Save PerfectHead\n", + /*387*/ "Your changes will be kept in memory.\n", + /*388*/ "Would you like to save your changes\n", + /*389*/ "to the controller pak?\n", + /*390*/ "Save\n", + /*391*/ "Don't Save\n", + /*392*/ "PerfectHead speichern\n", + /*393*/ "Sie können jetzt den Kopf auf\n", + /*394*/ "ein Controller Pak speichern.\n", + /*395*/ "In diesem Fall stellen Sie bitte\n", + /*396*/ "sicher, dass ein Controller Pak\n", + /*397*/ "eingelegt ist. Wählen Sie \"Speichern\".\n", + /*398*/ "Speichern\n", + /*399*/ "Nicht speichern\n", + /*400*/ "Kopf wurde erstellt!\n", + /*401*/ "Um diesen Kopf im Kampsimulator einzusetzen,\n", + /*402*/ "wählen Sie ihn aus dem Charakter-Menü vom\n", + /*403*/ "Spieler/Simulanten-Einstellungs-Menü.\n", + /*404*/ "Die gewünschten Köpfe erscheinen nun\n", + /*405*/ "in allen Missionen, die Sie spielen.\n", + /*406*/ "Sie können den Kopf nun noch weiter editieren.\n", + /*407*/ "Beenden\n", + /*408*/ "Kopf editieren\n", + /*409*/ "Farbe des Kopfes:\n", + /*410*/ "Gesicht:\n", + /*411*/ "Frisur:\n", + /*412*/ "OK\n", + /*413*/ "Abbruch\n", + /*414*/ "Abbruch\n", + /*415*/ "Hangar Information\n", + /*416*/ "Holotraining\n", + /*417*/ "Geräte-Liste\n", + /*418*/ "Information\n", + /*419*/ "Örtlichkeiten\n", + /*420*/ "Fahrzeuge\n", + /*421*/ "Character-Profile\n", + /*422*/ "Weitere Informationen\n", + /*423*/ "Trainings-Statistik\n", + /*424*/ "benötigte Zeit:\n", + /*425*/ "Abgeschlossen!\n", + /*426*/ "Durchgefallen!\n", + /*427*/ "OK\n", + /*428*/ "Weiter\n", + /*429*/ "Zurück\n", + /*430*/ "Abbruch\n", + /*431*/ "Character-Profile\n", + /*432*/ "Name:\n", + /*433*/ "Alter:\n", + /*434*/ "Rasse:\n", + /*435*/ "Abbruch\n", + /*436*/ "Cheats\n", + /*437*/ "Sie können das Gerät jetzt abschalten.\n", + /*438*/ "Abbruch\n", + /*439*/ "Bronze\n", + /*440*/ "Silber\n", + /*441*/ "Gold\n", + /*442*/ "Schwierigkeit\n", + /*443*/ "Schwierigkeit:\n", + /*444*/ "Wählen Sie die Schwierigkeit:\n", + /*445*/ " \n", + /*446*/ "Waffe\n", + /*447*/ "Trainings-Info\n", + /*448*/ "Trainings-Statistik\n", + /*449*/ "Abgeschlossen!\n", + /*450*/ "Score:\n", + /*451*/ "Zerstörte Ziele:\n", + /*452*/ "Schwierigkeit:\n", + /*453*/ "benötigte Zeit:\n", + /*454*/ "Waffe:\n", + /*455*/ "Genauigkeit:\n", + /*456*/ "Nicht durchgefallen\n", + /*457*/ "Keine Munition\n", + /*458*/ "Zeit abgelaufen\n", + /*459*/ "Score nicht erreicht\n", + /*460*/ "Zu ungenau\n", + /*461*/ "Bingo\n", + /*462*/ "Zone 1\n", + /*463*/ "Zone 2\n", + /*464*/ "Zone 3\n", + /*465*/ "Total\n", + /*466*/ "Scoring\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Munitions-Limit:\n", + /*472*/ "Zeit-Limit:\n", + /*473*/ "Min. Genauigkeit:\n", + /*474*/ "Ziele:\n", + /*475*/ "Score:\n", + /*476*/ "Cheats\n", + /*477*/ "Fertig\n", + /*478*/ "Warnung!\n", + /*479*/ "Sollten Sie Cheats aktivieren, können Sie nicht\nweiter ins Spiel vordringen, solange\ndiese Cheats aktiv sind.\n", + /*480*/ "OK\n", + /*481*/ "Zurück\n", + /*482*/ "Spieler %d: ", + /*483*/ "START!\n", + /*484*/ "Searching for Camera!\n", + /*485*/ "Calibrating Camera\n", + /*486*/ "Downloading Image\n", + /*487*/ "Loading Image\n", + /*488*/ "Saving Image\n", + /*489*/ "Transfering Image\n", + /*490*/ "Uploading Segment\n", + /*491*/ "Controller Pak \nwird geprüft\n", + /*492*/ "Getting PerfectHead\n", + /*493*/ "Saving PerfectHead\n", + /*494*/ "Auto Camera Adjustment\n", + /*495*/ "Bitte warten...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_i.c b/src/files/lang/pal-final/mpmenu_str_i.c new file mode 100644 index 000000000..f3bfe22df --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Che schifo!\n", + /* 1*/ "Servono munizioni?\n", + /* 2*/ "Protezione minima\n", + /* 3*/ "Protezione massima\n", + /* 4*/ "Precisione di tiro\n", + /* 5*/ "Professionale\n", + /* 6*/ "Micidiale\n", + /* 7*/ "Innocuo\n", + /* 8*/ "Codardo\n", + /* 9*/ "Disperato\n", + /* 10*/ "Lodevole\n", + /* 11*/ "Disonorevole\n", + /* 12*/ "Vita più breve\n", + /* 13*/ "Vita più lunga\n", + /* 14*/ "Doppio colpo\n", + /* 15*/ "Triplo colpo\n", + /* 16*/ "Colpo quadruplo\n", + /* 17*/ "Impostazioni gioco\n", + /* 18*/ "Carica impostazioni\n", + /* 19*/ "Ambientaz.\n", + /* 20*/ "Scena\n", + /* 21*/ "Opzioni\n", + /* 22*/ "Squadre\n", + /* 23*/ "Armi\n", + /* 24*/ "Limiti\n", + /* 25*/ "Replicanti\n", + /* 26*/ "Salva impostazioni\n", + /* 27*/ "Interrompi gioco\n", + /* 28*/ "Impostaz. giocatore\n", + /* 29*/ "Carica giocatore\n", + /* 30*/ "Nome\n", + /* 31*/ "Personaggio\n", + /* 32*/ "Svantaggi\n", + /* 33*/ "Comandi\n", + /* 34*/ "Opzioni giocatore\n", + /* 35*/ "Statistiche\n", + /* 36*/ "Avvio gioco\n", + /* 37*/ "Esci\n", + /* 38*/ "Salva Giocatore\n", + /* 39*/ "Salva Copia Giocat.\n", + /* 40*/ "Varie\n", + /* 41*/ "Colonna sonora\n", + /* 42*/ "Nomi squadre\n", + /* 43*/ "Rapporto\n", + /* 44*/ "Blocco\n", + /* 45*/ "Nessuno\n", + /* 46*/ "Ultimo vincit.\n", + /* 47*/ "Ultimo perden.\n", + /* 48*/ "A caso\n", + /* 49*/ "Sfida\n", + /* 50*/ "Sfide di lotta\n", + /* 51*/ "Interrompi la sfida\n", + /* 52*/ "Interrompi\n", + /* 53*/ "Desideri veramente\ninterrompere il gioco?\n", + /* 54*/ "Interrompi\n", + /* 55*/ "Annulla\n", + /* 56*/ "%s\n", + /* 57*/ "Accetta\n", + /* 58*/ "Annulla\n", + /* 59*/ "Nomi squadre\n", + /* 60*/ "Esci\n", + /* 61*/ "Cambia nomi squadre\n", + /* 62*/ "Colonna sonora\n", + /* 63*/ "Attuale:\n", + /* 64*/ "Più brani\n", + /* 65*/ "Esci\n", + /* 66*/ "Brani multipli\n", + /* 67*/ "A caso\n", + /* 68*/ "Seleziona brani\n", + /* 69*/ "Seleziona brano\n", + /* 70*/ "Comandi squadra\n", + /* 71*/ "Squadre attivate\n", + /* 72*/ "Squadre:\n", + /* 73*/ "Squadra automatica...\n", + /* 74*/ "Esci\n", + /* 75*/ "Squadra automatica\n", + /* 76*/ "Due squadre\n", + /* 77*/ "Tre squadre\n", + /* 78*/ "Quattro squadre\n", + /* 79*/ "Squadre al massimo\n", + /* 80*/ "Umani contro replic.\n", + /* 81*/ "Coppie umani-replic.\n", + /* 82*/ "Annulla\n", + /* 83*/ "Replicanti\n", + /* 84*/ "Aggiungi replicanti...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Cancella tutto\n", + /* 94*/ "Esci\n", + /* 95*/ "Difficoltà:\n", + /* 96*/ "Cambia tipo...\n", + /* 97*/ "Personaggio...\n", + /* 98*/ "Cancella replicante\n", + /* 99*/ "Esci\n", + /*100*/ "Personaggio replicante\n", + /*101*/ "Aggiungi replicante\n", + /*102*/ "Cambia replicante\n", + /*103*/ "Replicanti normali\n", + /*104*/ "Replicanti speciali\n", + /*105*/ "Pronti!\n", + /*106*/ "...attendere\n", + /*107*/ "Limiti\n", + /*108*/ "Tempo\n", + /*109*/ "Punteggio\n", + /*110*/ "Ripristina impostaz.\n", + /*111*/ "Esci\n", + /*112*/ "No limite\n", + /*113*/ "%d\n", + /*114*/ "%d min\n", + /*115*/ "Scena\n", + /*116*/ "Dark\n", + /*117*/ "Classica\n", + /*118*/ "A caso\n", + /*119*/ "Skedar", + /*120*/ "Condotte", + /*121*/ "Burrone", + /*122*/ "Edificio G5", + /*123*/ "Fognature", + /*124*/ "Magazzino", + /*125*/ "Griglia", + /*126*/ "Rovine", + /*127*/ "Area 52", + /*128*/ "Base", + /*129*/ "Tetto", + /*130*/ "Fortezza", + /*131*/ "Villa", + /*132*/ "Parcheggio", + /*133*/ "Tempio", + /*134*/ "Complesso", + /*135*/ "Felicità", + /*136*/ "A caso", + /*137*/ "Carica giocatore\n", + /*138*/ "Premi B per annullare\n", + /*139*/ "Carica impostaz. gioco\n", + /*140*/ "%s: Ambientazione: %s Scena: %s Replicanti: %d", + /*141*/ "Impostazioni\n", + /*142*/ "Nome giocatore\n", + /*143*/ "Personaggio\n", + /*144*/ "Carica testa...\n", + /*145*/ "Statistiche %s\n", + /*146*/ "Vittime:\n", + /*147*/ "Decessi:\n", + /*148*/ "Precisione:\n", + /*149*/ "Colpi al capo:\n", + /*150*/ "Munizioni usate:\n", + /*151*/ "Danno arrecato:\n", + /*152*/ "Danno subito:\n", + /*153*/ "Partite giocate:\n", + /*154*/ "Partite vinte:\n", + /*155*/ "Partite perse:\n", + /*156*/ "Tempo:\n", + /*157*/ "Distanza:\n", + /*158*/ "Medaglie vinte:\n", + /*159*/ " Precisione:\n", + /*160*/ " Colpi al capo:\n", + /*161*/ " Campione:\n", + /*162*/ " Superstite:\n", + /*163*/ "Tuo titolo:\n", + /*164*/ "Esci\n", + /*165*/ "Sfide completate\n", + /*166*/ "Esci\n", + /*167*/ "Opzioni\n", + /*168*/ "Mostra strumenti\n", + /*169*/ "Mostra giocatori\n", + /*170*/ "Mostra squadre\n", + /*171*/ "Radar\n", + /*172*/ "Esci\n", + /*173*/ "Armi\n", + /*174*/ "Imposta:\n", + /*175*/ "Impostaz. attuali armi:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Esci\n", + /*183*/ "Salva impostaz. gioco\n", + /*184*/ "Vuoi salvare sul file\ndi gioco originale?\n", + /*185*/ "Salva su originale\n", + /*186*/ "Salva copia\n", + /*187*/ "Non salvare\n", + /*188*/ "Nome del file partita\n", + /*189*/ "Digita nome per il file\nimpostazioni gioco:\n", + /*190*/ "Conferma\n", + /*191*/ "Il file giocatore è\nsempre salvato\nautomaticamente.\n", + /*192*/ "Salvarne una copia?\n", + /*193*/ "No\n", + /*194*/ "Sì\n", + /*195*/ "Esci\n", + /*196*/ "Desideri veramente\nuscire?\n", + /*197*/ "Esci\n", + /*198*/ "Annulla\n", + /*199*/ "Comandi\n", + /*200*/ "Modalità comandi\n", + /*201*/ "Inv. punto vista\n", + /*202*/ "Vista in avanti\n", + /*203*/ "Rotazione testa\n", + /*204*/ "Mira automatica\n", + /*205*/ "Mirino\n", + /*206*/ "Vista su schermo\n", + /*207*/ "Mostra obiettivo\n", + /*208*/ "Area zoom\n", + /*209*/ "Munizioni\n", + /*210*/ "Funzioni arma\n", + /*211*/ "Macchia colorata\n", + /*212*/ "Esci\n", + /*213*/ "Tieni premuto\n", + /*214*/ "Attiva/disattiva\n", + /*215*/ "Opzioni lotta\n", + /*216*/ "Opzioni cartella\n", + /*217*/ "Opzioni hacker\n", + /*218*/ "Opzioni tutti contro 1\n", + /*219*/ "Opzioni colle\n", + /*220*/ "Opzioni cassa\n", + /*221*/ "Opzioni box\n", + /*222*/ "Vittime in un colpo\n", + /*223*/ "Al rallentatore\n", + /*224*/ "Accelerato\n", + /*225*/ "Mostra squadra\n", + /*226*/ "Nessun Radar\n", + /*227*/ "No mira autom.\n", + /*228*/ "Nascondi giocatori\n", + /*229*/ "Nascondi strumenti\n", + /*230*/ "Mostra obiettivo\n", + /*231*/ "Mostra terminale\n", + /*232*/ "Box su radar\n", + /*233*/ "Colle su radar\n", + /*234*/ "Colle mobile\n", + /*235*/ "Tempo\n", + /*236*/ "Mostra su radar\n", + /*237*/ "Mostra cartella\n", + /*238*/ "Mostra su radar\n", + /*239*/ "Esci\n", + /*240*/ "No\n", + /*241*/ "Sì\n", + /*242*/ "Furbo\n", + /*243*/ "Ambientazione\n", + /*244*/ "Per tutti!\n", + /*245*/ "-Collaborazione-\n", + /*246*/ "Lotta", + /*247*/ "Tieni cartella", + /*248*/ "Centrale Hacker", + /*249*/ "Tutti contro 1", + /*250*/ "Re del colle", + /*251*/ "Prendi la cassa", + /*252*/ "Tocca quel box", + /*253*/ "Lotta", + /*254*/ "Cartella", + /*255*/ "Hacker", + /*256*/ "Contro 1", + /*257*/ "Colle", + /*258*/ "Cassa", + /*259*/ "Box", + /*260*/ "Fine partita\n", + /*261*/ "Titolo:\n", + /*262*/ "Arma più usata:\n", + /*263*/ "Premi:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Classifica giocatori\n", + /*277*/ "Decessi\n", + /*278*/ "Punti\n", + /*279*/ "Classifica squadre\n", + /*280*/ "Statistiche %s", + /*281*/ "Suicidi\n", + /*282*/ "Decessi\n", + /*283*/ "Vitt.\n", + /*284*/ "Inventario\n", + /*285*/ "Comandi\n", + /*286*/ "Tempo:\n", + /*287*/ "Fine gioco\n", + /*288*/ "Pausa\n", + /*289*/ "Fine pausa\n", + /*290*/ "Esci dal gioco\n", + /*291*/ "Sicuro?\n", + /*292*/ "Annulla\n", + /*293*/ "Fine gioco\n", + /*294*/ "TestaPerfect\n", + /*295*/ "Carica testa salvata\n", + /*296*/ "Crea nuova testa\n", + /*297*/ "Modifica testa caricata\n", + /*298*/ "Modifica testaPerfect\n", + /*299*/ "Scegli casella per modifica:\n", + /*300*/ "Annulla\n", + /*301*/ "Crea nuova testa\n", + /*302*/ "Carica testa salvata\n", + /*303*/ "Dove desideri usare\n", + /*304*/ "questa testa?\n", + /*305*/ "Simulatore lotta\n", + /*306*/ "Tutte le missioni\n", + /*307*/ "Entrambi\n", + /*308*/ "Annulla\n", + /*309*/ "Impostaz. macch. fotografica\n", + /*310*/ "Inserisci la macch. fotografica\n", + /*311*/ "nella cassetta Game Boy.\n", + /*312*/ "Poi inserisci la cassetta Game Boy\n", + /*313*/ "in un Controller.\n", + /*314*/ "OK\n", + /*315*/ "Annulla\n", + /*316*/ "Errore\n", + /*317*/ "Macch. fotografica Game Boy non rilevata!\n", + /*318*/ "Controlla i collegamenti\n", + /*319*/ "e riprova.\n", + /*320*/ "Annulla\n", + /*321*/ "Scegli la macchina\n", + /*322*/ "Rilevate più macchine\n", + /*323*/ "Seleziona la macchina che\nvuoi usare\n", + /*324*/ "OK\n", + /*325*/ "Annulla\n", + /*326*/ "TestaPerfect\n", + /*327*/ "Scatta foto ora\n", + /*328*/ "Carica foto da macchina\n", + /*329*/ "Annulla\n", + /*330*/ "Carica da macchina\n", + /*331*/ "Scegli foto:\n", + /*332*/ "Annulla\n", + /*333*/ "Scatta foto\n", + /*334*/ "Scatta!\n", + /*335*/ "Annulla\n", + /*336*/ "Tieni foto\n", + /*337*/ "Riprova\n", + /*338*/ "Carica testaPerfect\n", + /*339*/ "Inserisci il Controller Pak\n", + /*340*/ "contenete la testa che\n", + /*341*/ "vuoi caricare in uno\n", + /*342*/ "dei Controller.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Annulla\n", + /*345*/ "Fonte:\n", + /*346*/ "Pak 1", + /*347*/ "Pak 2", + /*348*/ "Pak 3", + /*349*/ "Pak 4", + /*350*/ "", + /*351*/ "TestaPerfect Editor\n", + /*352*/ "Scatta altra foto\n", + /*353*/ "Cambia testa\n", + /*354*/ "Posiziona foto\n", + /*355*/ "Colora viso e capelli\n", + /*356*/ "Dai forma a testa\n", + /*357*/ "Rimuovi testa\n", + /*358*/ "Cancella modifiche\n", + /*359*/ "Tieni modifiche\n", + /*360*/ "Dai forma a testa\n", + /*361*/ "Profondità\n", + /*362*/ "OK\n", + /*363*/ "Annulla\n", + /*364*/ "Posiziona immagine\n", + /*365*/ "Lumninosità\n", + /*366*/ "OK\n", + /*367*/ "Annulla\n", + /*368*/ "Scegli testa\n", + /*369*/ "OK\n", + /*370*/ "Annulla\n", + /*371*/ "Elimina testaPerfect\n", + /*372*/ "Desideri veramente eliminare\n", + /*373*/ "questa testa dalla memoria?\n", + /*374*/ "Elimina\n", + /*375*/ "Annulla\n", + /*376*/ "Annulla modifiche\n", + /*377*/ "Eliminare veramente\n", + /*378*/ "le modifiche?\n", + /*379*/ "Elimina\n", + /*380*/ "Esci\n", + /*381*/ "Salva testaPerfect\n", + /*382*/ "Hai modificato questa testa.\n", + /*383*/ "Vuoi tenere le modifiche?\n", + /*384*/ "Tieni\n", + /*385*/ "Annulla\n", + /*386*/ "Salva testaPerfect\n", + /*387*/ "Le modifiche saranno memorizzate.\n", + /*388*/ "Vuoi salvare le modifiche\n", + /*389*/ "nel Controller Pak?\n", + /*390*/ "Salva\n", + /*391*/ "Non salvare\n", + /*392*/ "Salva testaPerfect\n", + /*393*/ "Ora puoi salvare la testa\n", + /*394*/ "su un Controller Pak se vuoi.\n", + /*395*/ "Prima però accertati che\n", + /*396*/ "sia inserito un Controller Pak\n", + /*397*/ "e scegli \"Salva\".\n", + /*398*/ "Salva\n", + /*399*/ "Non salvare\n", + /*400*/ "Testa completa!\n", + /*401*/ "Per usare la testa nel simulatore lotta,\n", + /*402*/ "selezionala dal menu personaggi delle\n", + /*403*/ "impostazioni giocatore/replicante.\n", + /*404*/ "Appariranno le teste missione\n", + /*405*/ "per ogni missione giocata.\n", + /*406*/ "Puoi ancora modificare la testa.\n", + /*407*/ "Esci\n", + /*408*/ "Modifica testa\n", + /*409*/ "Colore testa\n", + /*410*/ "Viso:\n", + /*411*/ "Capelli:\n", + /*412*/ "OK\n", + /*413*/ "Annulla\n", + /*414*/ "Premi B per uscire.\n", + /*415*/ "Informazioni hangar\n", + /*416*/ "Esercitazione olografica\n", + /*417*/ "Lista strumenti\n", + /*418*/ "Informazioni\n", + /*419*/ "Luoghi\n", + /*420*/ "Veicoli\n", + /*421*/ "Profili personaggi\n", + /*422*/ "Altre informazioni\n", + /*423*/ "Statistiche esercitazione\n", + /*424*/ "Tempo impiegato:\n", + /*425*/ "Compiuto!\n", + /*426*/ "Fallito!\n", + /*427*/ "Ok\n", + /*428*/ "Riprendi\n", + /*429*/ "Annulla\n", + /*430*/ "Interrompi\n", + /*431*/ "Profilo personaggio\n", + /*432*/ "Nome:\n", + /*433*/ "Età:\n", + /*434*/ "Razza:\n", + /*435*/ "Premi B per uscire.\n", + /*436*/ "Trucchi\n", + /*437*/ "Ora puoi spegnere il computer.\n", + /*438*/ "Annulla\n", + /*439*/ "Bronzo\n", + /*440*/ "Argento\n", + /*441*/ "Oro\n", + /*442*/ "Difficoltà\n", + /*443*/ "Difficoltà:\n", + /*444*/ "Seleziona difficoltà:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Informazioni esercitazione\n", + /*448*/ "Statistiche esercitazione\n", + /*449*/ "Compiuto!\n", + /*450*/ "Punti:\n", + /*451*/ "Obiettivi distrutti:\n", + /*452*/ "Difficoltà:\n", + /*453*/ "Tempo impiegato:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisione:\n", + /*456*/ "Non fallito\n", + /*457*/ "Finite munizioni\n", + /*458*/ "Tempo scaduto\n", + /*459*/ "Punteggio impossibile \n", + /*460*/ "Troppo impreciso\n", + /*461*/ "Centro\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Colpi\n", + /*466*/ "Punti\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Limite munizioni:\n", + /*472*/ "Limite tempo:\n", + /*473*/ "Precisione min.:\n", + /*474*/ "Obiettivi:\n", + /*475*/ "Punteggio obiettivi:\n", + /*476*/ "Trucchi\n", + /*477*/ "Fatto\n", + /*478*/ "Avvertenza\n", + /*479*/ "Finché i trucchi sono attivi,\nnon potrai progredire nel gioco\n.", + /*480*/ "OK\n", + /*481*/ "Annulla\n", + /*482*/ "Giocat. %d: ", + /*483*/ "Premi START!\n", + /*484*/ "Ricerca macch. fotografica!\n", + /*485*/ "Regolazione macchina\n", + /*486*/ "Scaricamento immagine\n", + /*487*/ "Caricamento immagine\n", + /*488*/ "Salva immagine\n", + /*489*/ "Tasferimento immagine\n", + /*490*/ "Caricamento segmento\n", + /*491*/ "Esame Controller Pak\n", + /*492*/ "Prelevam. testaPerfect\n", + /*493*/ "Salvatag. testaPerfect\n", + /*494*/ "Regolazione autom. macchina\n", + /*495*/ "Attendere prego...\n", +}; diff --git a/src/files/lang/pal-final/mpmenu_str_s.c b/src/files/lang/pal-final/mpmenu_str_s.c new file mode 100644 index 000000000..1a89f6635 --- /dev/null +++ b/src/files/lang/pal-final/mpmenu_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "El más Suicida\n", + /* 1*/ "¿Y la munición?\n", + /* 2*/ "Menor Escudo\n", + /* 3*/ "Mejor Protegido\n", + /* 4*/ "Mejor Puntería\n", + /* 5*/ "El más Profesional\n", + /* 6*/ "El más Mortífero\n", + /* 7*/ "El más Inofensivo\n", + /* 8*/ "El más Cobarde\n", + /* 9*/ "El más Frenético\n", + /* 10*/ "El más Honorable\n", + /* 11*/ "El menos Honorable\n", + /* 12*/ "La Vida más Corta\n", + /* 13*/ "La Vida más Larga\n", + /* 14*/ "Doble Muerte\n", + /* 15*/ "Triple Muerte\n", + /* 16*/ "Cuádruple Muerte\n", + /* 17*/ "Conf. de Juego\n", + /* 18*/ "Cargar Parám.\n", + /* 19*/ "Escenario\n", + /* 20*/ "Arena\n", + /* 21*/ "Opciones\n", + /* 22*/ "Equipos\n", + /* 23*/ "Armas\n", + /* 24*/ "Límites\n", + /* 25*/ "Simulantes\n", + /* 26*/ "Guardar Parám.\n", + /* 27*/ "Abortar Juego\n", + /* 28*/ "Conf. de Jugador\n", + /* 29*/ "Cargar Jugador\n", + /* 30*/ "Nombre\n", + /* 31*/ "Personaje\n", + /* 32*/ "Hándicap\n", + /* 33*/ "Controles\n", + /* 34*/ "Opciones Jug.\n", + /* 35*/ "Estadísticas\n", + /* 36*/ "Comenzar Juego\n", + /* 37*/ "Abandonar\n", + /* 38*/ "Guardar Jugador\n", + /* 39*/ "Guardar Copia\n", + /* 40*/ "Objetos\n", + /* 41*/ "Banda Sonora\n", + /* 42*/ "Nombres de Equipo\n", + /* 43*/ "Ratio\n", + /* 44*/ "Bloquear\n", + /* 45*/ "Ninguno\n", + /* 46*/ "Úl. Ganador\n", + /* 47*/ "Úl. Perdedor\n", + /* 48*/ "Aleatorio\n", + /* 49*/ "Desafío\n", + /* 50*/ "Desafíos de Combate\n", + /* 51*/ "Abortar Desafío\n", + /* 52*/ "Abortar\n", + /* 53*/ "¿Estás seguro de que\nquieres abortar el juego?\n", + /* 54*/ "Abortar\n", + /* 55*/ "Cancelar\n", + /* 56*/ "%s\n", + /* 57*/ "Aceptar\n", + /* 58*/ "Cancelar\n", + /* 59*/ "Nombres de Equipo\n", + /* 60*/ "Volver\n", + /* 61*/ "Cambiar Nombre Eq.\n", + /* 62*/ "Banda Sonora\n", + /* 63*/ "Actual:\n", + /* 64*/ "Múltiples Melodías\n", + /* 65*/ "Volver\n", + /* 66*/ "Múltiples Melodías\n", + /* 67*/ "Aleatorio\n", + /* 68*/ "Elegir Melodías\n", + /* 69*/ "Elegir Melodía\n", + /* 70*/ "Controles de Equipo\n", + /* 71*/ "Equipos Activados\n", + /* 72*/ "Equipos:\n", + /* 73*/ "Auto Equipo...\n", + /* 74*/ "Volver\n", + /* 75*/ "Auto Equipo\n", + /* 76*/ "Dos Equipos\n", + /* 77*/ "Tres Equipos\n", + /* 78*/ "Cuatro Equipos\n", + /* 79*/ "Máximo de Equipos\n", + /* 80*/ "Humanos contra Sim.\n", + /* 81*/ "Parejas Humano-Sim.\n", + /* 82*/ "Cancelar\n", + /* 83*/ "Simulantes\n", + /* 84*/ "Añadir Simulante...\n", + /* 85*/ "1:\n", + /* 86*/ "2:\n", + /* 87*/ "3:\n", + /* 88*/ "4:\n", + /* 89*/ "5:\n", + /* 90*/ "6:\n", + /* 91*/ "7:\n", + /* 92*/ "8:\n", + /* 93*/ "Despejar Todo\n", + /* 94*/ "Volver\n", + /* 95*/ "Dificultad:\n", + /* 96*/ "Cambiar Tipo...\n", + /* 97*/ "Personaje...\n", + /* 98*/ "Borrar Simulante\n", + /* 99*/ "Volver\n", + /*100*/ "Personaje Simulante\n", + /*101*/ "Añadir Simulante\n", + /*102*/ "Cambiar Simulante\n", + /*103*/ "Simulantes Normales\n", + /*104*/ "Simulantes Especiales\n", + /*105*/ "¡Preparado!\n", + /*106*/ "...y esperando\n", + /*107*/ "Límites\n", + /*108*/ "Tiempo\n", + /*109*/ "Puntos\n", + /*110*/ "Parámetros Iniciales\n", + /*111*/ "Volver\n", + /*112*/ "Sin límite\n", + /*113*/ "%d\n", + /*114*/ "%d Min\n", + /*115*/ "Arena\n", + /*116*/ "Dark\n", + /*117*/ "Clásico\n", + /*118*/ "Aleatorio\n", + /*119*/ "Skedar", + /*120*/ "Tuberías", + /*121*/ "Barranco", + /*122*/ "Edificio G5", + /*123*/ "Cloacas", + /*124*/ "Almacén", + /*125*/ "Rejilla", + /*126*/ "Ruinas", + /*127*/ "Área 52", + /*128*/ "Base", + /*129*/ "Tejado", + /*130*/ "Fortaleza", + /*131*/ "Villa", + /*132*/ "Aparcamiento", + /*133*/ "Templo", + /*134*/ "Complejo", + /*135*/ "Felicity", + /*136*/ "Aleatorio", + /*137*/ "Cargar Jugador\n", + /*138*/ "Botón B para cancelar\n", + /*139*/ "Cargar Parámetros\n", + /*140*/ "%s: Escenario: %s Arena: %s Simulantes: %d", + /*141*/ "Predefinidos\n", + /*142*/ "Nombre del Jugador\n", + /*143*/ "Personaje\n", + /*144*/ "Cargar Cabeza...\n", + /*145*/ "Estad. de %s\n", + /*146*/ "Muertes:\n", + /*147*/ "Bajas:\n", + /*148*/ "Precisión:\n", + /*149*/ "Tiros Cabeza:\n", + /*150*/ "Mun. Util.:\n", + /*151*/ "Daño Caus.:\n", + /*152*/ "Dolor Rec.:\n", + /*153*/ "N° Juegos:\n", + /*154*/ "J. Ganados:\n", + /*155*/ "J. Perdidos:\n", + /*156*/ "Tiempo:\n", + /*157*/ "Distancia:\n", + /*158*/ "Medallas Ganadas:\n", + /*159*/ " Precisión:\n", + /*160*/ " Tiros Cabeza:\n", + /*161*/ " Mr. Muerte:\n", + /*162*/ " Superviviente:\n", + /*163*/ "Tu Título:\n", + /*164*/ "Volver\n", + /*165*/ "Desafíos Completados\n", + /*166*/ "Volver\n", + /*167*/ "Opciones\n", + /*168*/ "Destacar Objetos\n", + /*169*/ "Destacar Jugadores\n", + /*170*/ "Destacar Equipos\n", + /*171*/ "Radar\n", + /*172*/ "Volver\n", + /*173*/ "Armas\n", + /*174*/ "Fijar:\n", + /*175*/ "Conf. Arma Actual:\n", + /*176*/ "1:\n", + /*177*/ "2:\n", + /*178*/ "3:\n", + /*179*/ "4:\n", + /*180*/ "5:\n", + /*181*/ "6:\n", + /*182*/ "Volver\n", + /*183*/ "Guardar Configuración\n", + /*184*/ "¿Quieres guardar sobre\ntu fichero original?\n", + /*185*/ "Guardar Sobre Orig.\n", + /*186*/ "Guardar Copia\n", + /*187*/ "No Guardar\n", + /*188*/ "Nombre de Fichero\n", + /*189*/ "Introduce el nombre\nde fichero de conf.:\n", + /*190*/ "Confirmar\n", + /*191*/ "Tu fichero de jugador\nsiempre se guarda\nautomáticamente.\n", + /*192*/ "¿Guardar una copia?\n", + /*193*/ "No\n", + /*194*/ "Sí\n", + /*195*/ "Abandonar\n", + /*196*/ "¿Seguro que quieres\nabandonar?\n", + /*197*/ "Abandonar\n", + /*198*/ "Cancelar\n", + /*199*/ "Controles\n", + /*200*/ "Estilo de Control\n", + /*201*/ "Cabeceo Cambiado\n", + /*202*/ "Mirar al Frente\n", + /*203*/ "Giro de Cabeza\n", + /*204*/ "Auto-Apuntar\n", + /*205*/ "C. Apuntar\n", + /*206*/ "Mirilla en Pantalla\n", + /*207*/ "Mostrar Objetivo\n", + /*208*/ "Alcance de Zoom\n", + /*209*/ "Munición en Pantalla\n", + /*210*/ "Función del Arma\n", + /*211*/ "Bolas de Pintura\n", + /*212*/ "Volver\n", + /*213*/ "Mantener\n", + /*214*/ "Cambiar\n", + /*215*/ "Opciones de Combate\n", + /*216*/ "Opciones de Maletín\n", + /*217*/ "Opciones de Hacker\n", + /*218*/ "Opciones de Llevar\n", + /*219*/ "Opciones de Colina\n", + /*220*/ "Opciones de Captura\n", + /*221*/ "Opciones de Cajas\n", + /*222*/ "Muertes de 1 Tiro\n", + /*223*/ "Cám. Lenta\n", + /*224*/ "Movimiento Rápido\n", + /*225*/ "Mostrar Equipo\n", + /*226*/ "Sin Radar\n", + /*227*/ "Sin Auto-Apuntar\n", + /*228*/ "Sin Destacar Jug.\n", + /*229*/ "Sin Destacar Obj.\n", + /*230*/ "Destacar Objetivos\n", + /*231*/ "Destacar Terminales\n", + /*232*/ "Cajas en el Radar\n", + /*233*/ "Colina en el Radar\n", + /*234*/ "Colina Móvil\n", + /*235*/ "Tiempo\n", + /*236*/ "Mostrar en el Radar\n", + /*237*/ "Destacar Maletín\n", + /*238*/ "Mostrar en Radar\n", + /*239*/ "Volver\n", + /*240*/ "No\n", + /*241*/ "Sí\n", + /*242*/ "Intelig.\n", + /*243*/ "Escenario\n", + /*244*/ "¡Pelea!\n", + /*245*/ "-Trabajo de Equipo-\n", + /*246*/ "Combate", + /*247*/ "Mantén el Maletín", + /*248*/ "Central Hacker", + /*249*/ "Tú la llevas", + /*250*/ "Rey de la Colina", + /*251*/ "Captura Maletín", + /*252*/ "Toca esa Caja", + /*253*/ "Combate", + /*254*/ "Maletín", + /*255*/ "Hacker", + /*256*/ "Llevar", + /*257*/ "Colina", + /*258*/ "Capturar", + /*259*/ "Cajas", + /*260*/ "Fin del Juego\n", + /*261*/ "Título:\n", + /*262*/ "Arma Preferida:\n", + /*263*/ "Premios:\n", + /*264*/ "1°\n", + /*265*/ "2°\n", + /*266*/ "3°\n", + /*267*/ "4°\n", + /*268*/ "5°\n", + /*269*/ "6°\n", + /*270*/ "7°\n", + /*271*/ "8°\n", + /*272*/ "9°\n", + /*273*/ "10°\n", + /*274*/ "11°\n", + /*275*/ "12°\n", + /*276*/ "Situación Jugador\n", + /*277*/ "Bajas\n", + /*278*/ "Punt.\n", + /*279*/ "Situación Equipo\n", + /*280*/ "Estad. de %s", + /*281*/ "Suicidios\n", + /*282*/ "Bajas\n", + /*283*/ "Aci.\n", + /*284*/ "Inventario\n", + /*285*/ "Controles\n", + /*286*/ "T. Juego:\n", + /*287*/ "Acabar Juego\n", + /*288*/ "Pausar\n", + /*289*/ "Reanudar\n", + /*290*/ "Acabar Juego\n", + /*291*/ "¿Estás seguro?\n", + /*292*/ "Cancelar\n", + /*293*/ "Acabar Juego\n", + /*294*/ "PerfectHead\n", + /*295*/ "Cargar Cabeza Guardada\n", + /*296*/ "Crear Nueva Cabeza\n", + /*297*/ "Editar Cabeza Cargada\n", + /*298*/ "Editar PerfectHead\n", + /*299*/ "Elegir slot a editar:\n", + /*300*/ "Cancelar\n", + /*301*/ "Crear Nueva Cabeza\n", + /*302*/ "Cargar Cabeza Guardada\n", + /*303*/ "¿Dónde querrás usar\n", + /*304*/ "esta cabeza?\n", + /*305*/ "Simulador de Combate\n", + /*306*/ "Todas las Misiones\n", + /*307*/ "Ambos\n", + /*308*/ "Cancelar\n", + /*309*/ "Conf. Cámara\n", + /*310*/ "Inserta tu cámara en tu\n", + /*311*/ "Transfer Pak.\n", + /*312*/ "Entonces, inserta tu Transfer Pak\n", + /*313*/ "en cualquier mando.\n", + /*314*/ "Aceptar\n", + /*315*/ "Cancelar\n", + /*316*/ "Error\n", + /*317*/ "¡Cámara de Game Boy No Detectada!\n", + /*318*/ "Por favor, comprueba todas las\n", + /*319*/ "conexiones y reinténtalo.\n", + /*320*/ "Cancelar\n", + /*321*/ "Elegir Cámara\n", + /*322*/ "Más de una cámara detectada.\n", + /*323*/ "Por favor, elige qué cámara\nquieres usar\n", + /*324*/ "Aceptar\n", + /*325*/ "Cancelar\n", + /*326*/ "PerfectHead\n", + /*327*/ "Tomar una Foto ahora\n", + /*328*/ "Cargar Foto de la Cámara\n", + /*329*/ "Cancelar\n", + /*330*/ "Cargar de la Cámara\n", + /*331*/ "Elige foto a cargar de la cámara:\n", + /*332*/ "Cancelar\n", + /*333*/ "Tomar Foto\n", + /*334*/ "¡Dispara!\n", + /*335*/ "Cancelar\n", + /*336*/ "Guardar Foto\n", + /*337*/ "Reintentar\n", + /*338*/ "Cargar PerfectHead\n", + /*339*/ "Inserta el Controller Pak\n", + /*340*/ "que contiene la cabeza\n", + /*341*/ "que quieres cargar en\n", + /*342*/ "cualquier mando.\n", + /*343*/ "Controller Pak:\n", + /*344*/ "Cancelar\n", + /*345*/ "Origen:\n", + /*346*/ "Cart. 1", + /*347*/ "Cart. 2", + /*348*/ "Cart. 3", + /*349*/ "Cart. 4", + /*350*/ "", + /*351*/ "Editor PerfectHead\n", + /*352*/ "Tomar otra foto\n", + /*353*/ "Cambiar Cabeza\n", + /*354*/ "Posicionar la Foto\n", + /*355*/ "Color de Cara y Pelo\n", + /*356*/ "Forma de la Cabeza\n", + /*357*/ "Quitar Cabeza\n", + /*358*/ "Cancelar Cambios\n", + /*359*/ "Mantener Cambios\n", + /*360*/ "Forma de la Cabeza\n", + /*361*/ "Profundidad\n", + /*362*/ "Aceptar\n", + /*363*/ "Cancelar\n", + /*364*/ "Posicionar la Imagen\n", + /*365*/ "Brillo\n", + /*366*/ "Aceptar\n", + /*367*/ "Cancelar\n", + /*368*/ "Elegir Cabeza\n", + /*369*/ "Aceptar\n", + /*370*/ "Cancelar\n", + /*371*/ "Quitar PerfectHead\n", + /*372*/ "¿Estás seguro de que quieres\n", + /*373*/ "quitar esta cabeza de la memoria?\n", + /*374*/ "Borrar\n", + /*375*/ "Cancelar\n", + /*376*/ "Cancelar Cambios\n", + /*377*/ "¿Estás seguro de que quieres\n", + /*378*/ "descartar tus cambios?\n", + /*379*/ "Descartar\n", + /*380*/ "Volver al Editor\n", + /*381*/ "Guardar PerfectHead\n", + /*382*/ "Has editado esta cabeza.\n", + /*383*/ "¿Quieres guardar tus cambios?\n", + /*384*/ "Mantener\n", + /*385*/ "Volver\n", + /*386*/ "Guardar PerfectHead\n", + /*387*/ "Tus cambios se mantendrán en la memoria.\n", + /*388*/ "¿Quieres guardar tus cambios\n", + /*389*/ "en el Controller Pak?\n", + /*390*/ "Guardar\n", + /*391*/ "No Guardar\n", + /*392*/ "Guardar PerfectHead\n", + /*393*/ "Puedes guardar tu cabeza en el\n", + /*394*/ "Controller Pak que desees.\n", + /*395*/ "Si quieres hacerlo, por favor,\n", + /*396*/ "asegúrate de que el Controller Pak\n", + /*397*/ "está insertado y elige \"Guardar\".\n", + /*398*/ "Guardar\n", + /*399*/ "No Guardar\n", + /*400*/ "¡Cabeza Completada!\n", + /*401*/ "Para usar tu cabeza en el simulador de combate,\n", + /*402*/ "elige la cabeza desde el menú de personajes\n", + /*403*/ "en el menú de parámetros del jugador/simulante.\n", + /*404*/ "Tus cabezas de Misión aparecerán en\n", + /*405*/ "cualquier misión que juegues.\n", + /*406*/ "Puedes editar más tu cabeza si quieres.\n", + /*407*/ "Finalizar\n", + /*408*/ "Editar Cabeza\n", + /*409*/ "Color de Cabeza\n", + /*410*/ "Cara:\n", + /*411*/ "Estilo de Pelo:\n", + /*412*/ "Aceptar\n", + /*413*/ "Cancelar\n", + /*414*/ "Pulsa el Botón B para volver.\n", + /*415*/ "Información del Hangar\n", + /*416*/ "Holoentrenamiento\n", + /*417*/ "Lista de Dispositivos\n", + /*418*/ "Información\n", + /*419*/ "Lugares\n", + /*420*/ "Vehículos\n", + /*421*/ "Perfiles de Personajes\n", + /*422*/ "Información Adicional\n", + /*423*/ "Estadísticas de Entrenamiento\n", + /*424*/ "Tiempo Necesitado:\n", + /*425*/ "¡Completado!\n", + /*426*/ "¡Fallado!\n", + /*427*/ "Aceptar\n", + /*428*/ "Reanudar\n", + /*429*/ "Cancelar\n", + /*430*/ "Abortar\n", + /*431*/ "Perfil del Personaje\n", + /*432*/ "Nombre:\n", + /*433*/ "Edad:\n", + /*434*/ "Raza:\n", + /*435*/ "Pulsa el Botón B para volver.\n", + /*436*/ "Trucos\n", + /*437*/ "Ahora es seguro apagar tu ordenador.\n", + /*438*/ "Cancelar\n", + /*439*/ "Bronce\n", + /*440*/ "Plata\n", + /*441*/ "Oro\n", + /*442*/ "Dificultad\n", + /*443*/ "Dificultad:\n", + /*444*/ "Elegir Dificultad:\n", + /*445*/ " \n", + /*446*/ "Arma\n", + /*447*/ "Información de Entrenamiento\n", + /*448*/ "Estadísticas de Entrenamiento\n", + /*449*/ "¡Completado!\n", + /*450*/ "Puntuación:\n", + /*451*/ "Blancos Destruidos:\n", + /*452*/ "Dificultad:\n", + /*453*/ "Tiempo Necesitado:\n", + /*454*/ "Arma:\n", + /*455*/ "Precisión:\n", + /*456*/ "No Fallado\n", + /*457*/ "Sin Munición\n", + /*458*/ "Tiempo Acabado\n", + /*459*/ "Puntuación Inalcanzable\n", + /*460*/ "Demasiado Impreciso\n", + /*461*/ "Diana\n", + /*462*/ "Zona 1\n", + /*463*/ "Zona 2\n", + /*464*/ "Zona 3\n", + /*465*/ "Total\n", + /*466*/ "Puntuación\n", + /*467*/ "10\n", + /*468*/ "5\n", + /*469*/ "2\n", + /*470*/ "1\n", + /*471*/ "Límite de Munición:\n", + /*472*/ "Límite de Tiempo:\n", + /*473*/ "Precisión Mínima:\n", + /*474*/ "Blancos Necesarios:\n", + /*475*/ "Puntuación Necesaria:\n", + /*476*/ "Trucos\n", + /*477*/ "Hecho\n", + /*478*/ "Cuidado\n", + /*479*/ "Si activas cualquier truco, serás\nincapaz de avanzar más en el juego\nmientras ese truco esté activo.\n", + /*480*/ "Aceptar\n", + /*481*/ "Cancelar\n", + /*482*/ "Jugador %d: ", + /*483*/ "¡Pulsa START!\n", + /*484*/ "¡Buscando Cámara!\n", + /*485*/ "Calibrando Cámara\n", + /*486*/ "Descargando Imagen\n", + /*487*/ "Cargando Imagen\n", + /*488*/ "Guardando Imagen\n", + /*489*/ "Transfiriendo Imagen\n", + /*490*/ "Cargando Segmento\n", + /*491*/ "Compr. Controller Pak\n", + /*492*/ "Obteniendo PerfectHead\n", + /*493*/ "Guardando PerfectHead\n", + /*494*/ "Autoajuste de Cámara\n", + /*495*/ "Por favor... espera...\n", +}; diff --git a/src/files/lang/pal-final/mpweaponsE.c b/src/files/lang/pal-final/mpweaponsE.c new file mode 100644 index 000000000..2b1d497fb --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsE.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "French\n", + /*265*/ "German\n", + /*266*/ "Italian\n", + /*267*/ "Spanish\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweaponsJ.c b/src/files/lang/pal-final/mpweaponsJ.c new file mode 100644 index 000000000..191f20b6f --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsJ.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Capture the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Flag\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak Inserted\n", + /* 66*/ "is damaged or inserted\n", + /* 67*/ "incorrectly.\n", + /* 68*/ "Please remove and try again.\n", + /* 69*/ "Full Controller Pak Inserted\n", + /* 70*/ "is too full to save files.\n", + /* 71*/ "Use the Game Notes Editor to\n", + /* 72*/ "free some space (hold START\n", + /* 73*/ "while powering up.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "Superdragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP7\n", + /*111*/ "DD44\n", + /*112*/ "Klobb\n", + /*113*/ "KF7 Soviet\n", + /*114*/ "ZMG (9mm)\n", + /*115*/ "D5K\n", + /*116*/ "AR33\n", + /*117*/ "RC-P90\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then enter and exit menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak could\nnot be repaired.\n", + /*185*/ "L/R: ", + /*186*/ "C-UP: ", + /*187*/ "C-L/R: ", + /*188*/ "C-DOWN: ", + /*189*/ "A: ", + /*190*/ "B: ", + /*191*/ "STICK: ", + /*192*/ "Z: ", + /*193*/ "D-PAD: ", + /*194*/ "AIM TOGGLE", + /*195*/ "LOOK UP / GET UP", + /*196*/ "STRAFE", + /*197*/ "LOOK DOWN / CROUCH", + /*198*/ "CHANGE GUN / ACTIVEMENU", + /*199*/ "RELOAD / ACTION / SECONDARY FIRE", + /*200*/ "WALK AND TURN", + /*201*/ "FIRE", + /*202*/ "AS C-BUTTONS", + /*203*/ "Turn off all Cheats\n", + /*204*/ NULL, + /*205*/ NULL, + /*206*/ NULL, + /*207*/ NULL, + /*208*/ NULL, + /*209*/ NULL, + /*210*/ NULL, + /*211*/ NULL, + /*212*/ NULL, + /*213*/ NULL, + /*214*/ NULL, + /*215*/ NULL, + /*216*/ NULL, + /*217*/ NULL, + /*218*/ NULL, + /*219*/ NULL, + /*220*/ NULL, + /*221*/ NULL, + /*222*/ NULL, + /*223*/ NULL, + /*224*/ NULL, + /*225*/ NULL, + /*226*/ NULL, + /*227*/ NULL, + /*228*/ NULL, + /*229*/ NULL, + /*230*/ NULL, + /*231*/ NULL, + /*232*/ NULL, + /*233*/ NULL, + /*234*/ NULL, + /*235*/ NULL, + /*236*/ NULL, + /*237*/ NULL, + /*238*/ NULL, + /*239*/ NULL, + /*240*/ NULL, + /*241*/ NULL, + /*242*/ NULL, + /*243*/ NULL, + /*244*/ NULL, + /*245*/ NULL, + /*246*/ NULL, + /*247*/ NULL, + /*248*/ NULL, + /*249*/ NULL, + /*250*/ NULL, + /*251*/ NULL, + /*252*/ NULL, + /*253*/ NULL, + /*254*/ NULL, + /*255*/ NULL, + /*256*/ NULL, + /*257*/ NULL, + /*258*/ NULL, + /*259*/ NULL, + /*260*/ NULL, + /*261*/ NULL, + /*262*/ NULL, + /*263*/ NULL, + /*264*/ NULL, + /*265*/ NULL, + /*266*/ NULL, + /*267*/ NULL, + /*268*/ NULL, + /*269*/ NULL, + /*270*/ NULL, + /*271*/ NULL, + /*272*/ NULL, + /*273*/ NULL, + /*274*/ NULL, + /*275*/ NULL, + /*276*/ NULL, + /*277*/ NULL, + /*278*/ NULL, + /*279*/ NULL, + /*280*/ NULL, + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweaponsP.c b/src/files/lang/pal-final/mpweaponsP.c new file mode 100644 index 000000000..7250a3295 --- /dev/null +++ b/src/files/lang/pal-final/mpweaponsP.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shas the\nData Uplink\n", + /* 1*/ "%shas the\nBriefcase\n", + /* 2*/ "%shas the %s Briefcase\n", + /* 3*/ "%shas our\nBriefcase\n", + /* 4*/ "Got the %s Briefcase\n", + /* 5*/ "You captured\nthe %s Briefcase\n", + /* 6*/ "%scaptured our\nBriefcase\n", + /* 7*/ "%scaptured\nthe %s Briefcase\n", + /* 8*/ "Have a point for living!\n", + /* 9*/ "You're supposed to look\n", + /* 10*/ "after your friends!\n", + /* 11*/ "Well done!\n", + /* 12*/ "You popped a cap!\n", + /* 13*/ "Have 2 Points...\n", + /* 14*/ "You are the victim!\n", + /* 15*/ "Protect %s!\n", + /* 16*/ "Get %s!\n", + /* 17*/ "Download successful.\n", + /* 18*/ "Connection broken.\n", + /* 19*/ "Starting download.\n", + /* 20*/ "You need to use the Data Uplink.\n", + /* 21*/ "King of\nthe Hill!\n", + /* 22*/ "We have\nthe Hill!\n", + /* 23*/ "%shas captured\nthe Hill!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "No Shield\n", + /* 27*/ "Automatics\n", + /* 28*/ "Rocket Launcher\n", + /* 29*/ "Simulants\n", + /* 30*/ "King of the Hill\n", + /* 31*/ "Complex FarSight\n", + /* 32*/ "Hold the Briefcase\n", + /* 33*/ "Pistol One-Hit Kills\n", + /* 34*/ "Capture the Case\n", + /* 35*/ "Cloaking\n", + /* 36*/ "Temple Explosives\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquilizer\n", + /* 39*/ "Slow Motion\n", + /* 40*/ "Press START\n", + /* 41*/ "Paused\n", + /* 42*/ "Custom\n", + /* 43*/ "Random\n", + /* 44*/ "Random Five\n", + /* 45*/ "Close Combat\n", + /* 46*/ "Proximity Mine\n", + /* 47*/ "Rocket Launcher\n", + /* 48*/ "Grenade Launcher\n", + /* 49*/ "Explosive\n", + /* 50*/ "Golden Magnum\n", + /* 51*/ "Heavy\n", + /* 52*/ "Tranquilizer\n", + /* 53*/ "FarSight\n", + /* 54*/ "Power\n", + /* 55*/ "Automatics\n", + /* 56*/ "Pistols\n", + /* 57*/ "Test\n", + /* 58*/ "4mb Test\n", + /* 59*/ "Nothing\n", + /* 60*/ "Shield\n", + /* 61*/ "Disabled\n", + /* 62*/ "Objectives Complete\n", + /* 63*/ "Unknown\n", + /* 64*/ "Missing\n", + /* 65*/ "Damaged Controller Pak\n", + /* 66*/ "is damaged or\n", + /* 67*/ "inserted incorrectly.\n", + /* 68*/ "Attempt Repair\n", + /* 69*/ "Retry\n", + /* 70*/ "Continue without using\nthe Controller Pak\n", + /* 71*/ "Full Controller Pak\n", + /* 72*/ "is too full to save\nnote - 1 note and 28\npages required to save.\n", + /* 73*/ "Enter the Controller\nPak Menu to free some\nspace (hold START\nwhile powering up.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane Fists\n", + /* 77*/ "Cloaking Device\n", + /* 78*/ "Invincible\n", + /* 79*/ "All Guns in Solo\n", + /* 80*/ "Unlimited Ammo\n", + /* 81*/ "Unlimited Ammo, No Reloads\n", + /* 82*/ "Slo-mo Single Player\n", + /* 83*/ "DK Mode\n", + /* 84*/ "Trent's Magnum\n", + /* 85*/ "FarSight\n", + /* 86*/ "Small Jo\n", + /* 87*/ "Small Characters\n", + /* 88*/ "Enemy Shields\n", + /* 89*/ "Jo Shield\n", + /* 90*/ "Super Shield\n", + /* 91*/ "Classic Sight\n", + /* 92*/ "Team Heads Only\n", + /* 93*/ "Play as Elvis\n", + /* 94*/ "Enemy Rockets\n", + /* 95*/ "Unlimited Ammo - Laptop Sentry Gun\n", + /* 96*/ "Marquis of Queensbury Rules\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugilist\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker/Weapon Cache Locations\n", + /*103*/ "Rocket Launcher\n", + /*104*/ "Sniper Rifle\n", + /*105*/ "X-Ray Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Weapons\n", + /*122*/ "Buddies\n", + /*123*/ "Weapons for Jo in Solo\n", + /*124*/ "Classic Weapons for Jo in Solo\n", + /*125*/ "dataDyne Defection", + /*126*/ "dataDyne Extraction", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rescue", + /*129*/ "A51 Escape", + /*130*/ "Difficulty:\n", + /*131*/ "Cheat Solo Missions\n", + /*132*/ "Cheat Combat Simulator\n", + /*133*/ "Cheat Co-Operative\n", + /*134*/ "Cheat Counter-Operative\n", + /*135*/ "Dishonored\n", + /*136*/ "Cheated\n", + /*137*/ "Cheat available", + /*138*/ "Complete", + /*139*/ "for cheat:", + /*140*/ "on", + /*141*/ "in under", + /*142*/ " or insert Game Boy (r) Perfect Dark into Transfer Pak (tm), connect Transfer Pak to any controller, then exit and enter menu", + /*143*/ "Select cheat for information\n", + /*144*/ "Buddy Available", + /*145*/ "Win Golds on the firing range to enable classic guns.\n", + /*146*/ "Sight on Screen\n", + /*147*/ "Target\n", + /*148*/ "Zoom Range\n", + /*149*/ "Show Ammo\n", + /*150*/ "Gun Function\n", + /*151*/ "Paintball\n", + /*152*/ "Subtitles\n", + /*153*/ "Mission Time\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Do you want to abort\nthe mission?\n", + /*157*/ "Joanna Leather\n", + /*158*/ "Joanna Negotiator\n", + /*159*/ "Elvis (Waistcoat)\n", + /*160*/ "Error\n", + /*161*/ "Cannot delete file as\nit is being used.\n", + /*162*/ "Cancel\n", + /*163*/ "Time Limit:\n", + /*164*/ "Score Limit:\n", + /*165*/ "Team Score Limit:\n", + /*166*/ "Challenge Completed!\n", + /*167*/ "Challenge Failed!\n", + /*168*/ "Challenge Cheated!\n", + /*169*/ "Cutscene Subtitles\n", + /*170*/ "In-Game Subtitles\n", + /*171*/ "Alternative Title Screen\n", + /*172*/ "Start Challenge\n", + /*173*/ "dataDyne Investigation", + /*174*/ "Error\n", + /*175*/ "The Controller Pak\nhas been removed.\n", + /*176*/ "Attempt Repair\n", + /*177*/ "Are you sure you want\nto attempt repair of\nthis Controller Pak?\n", + /*178*/ "Data may be lost!\n", + /*179*/ "Cancel\n", + /*180*/ "Repair\n", + /*181*/ "Repair Successful\n", + /*182*/ "The Controller Pak has\nbeen repaired.\n", + /*183*/ "Repair Failed\n", + /*184*/ "The Controller Pak \ncannot be repaired.\nYou will not be able to\nload from or save to\nthis Controller Pak.\n", + /*185*/ "Player Handicaps\n", + /*186*/ "L/R BUTTONS: ", + /*187*/ "UP C BUTTON: ", + /*188*/ "LEFT/RIGHT C BUTTONS: ", + /*189*/ "DOWN C BUTTON: ", + /*190*/ "A BUTTON: ", + /*191*/ "B BUTTON: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "Z BUTTON: ", + /*194*/ "+ CONTROL PAD: ", + /*195*/ "AIM", + /*196*/ "AIM TOGGLE", + /*197*/ "LOOK UP", + /*198*/ "LOOK DOWN", + /*199*/ "LOOK DOWN", + /*200*/ "LOOK UP", + /*201*/ "FORWARDS", + /*202*/ "BACKWARDS", + /*203*/ "STRAFE", + /*204*/ "WEAPON", + /*205*/ "ACTION/RELOAD", + /*206*/ "FIRE", + /*207*/ "WALK/TURN", + /*208*/ "LOOK", + /*209*/ "WALK/STRAFE", + /*210*/ "LOOK/STRAFE", + /*211*/ "AS C BUTTONS", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Control Style %s %s\n", + /*215*/ "(One-Handed)", + /*216*/ "(Two-Handed)", + /*217*/ "Hold Weapon button for quick-menu.\nHold Action button to toggle function.\nAction+Fire temporarily changes function.\nAim allows you to target accurately.\nAim + Down C Button crouches.\nAim + Up C Button gets up.\n", + /*218*/ "Turn off all Cheats\n", + /*219*/ "Language Filter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choose Settings:\n", + /*224*/ "Enemy Reaction Speed:\n", + /*225*/ "Enemy Health:\n", + /*226*/ "Enemy Damage:\n", + /*227*/ "Enemy Accuracy:\n", + /*228*/ "OK\n", + /*229*/ "Cancel\n", + /*230*/ "Controller Pak Not Found\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "Duplicate File Name\n", + /*234*/ "already contains\n", + /*235*/ "a file named\n", + /*236*/ "Rename File\n", + /*237*/ "Change Location\n", + /*238*/ "Cancel\n", + /*239*/ "Change File Name\n", + /*240*/ "Enter new file name:\n", + /*241*/ "The file you are copying\ncannot be deleted.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Target Time:\n", + /*244*/ "New Cheat Available!:\n", + /*245*/ "Continue\n", + /*246*/ "Replay Last Level\n", + /*247*/ "Save Player\n", + /*248*/ "Save new player\nand statistics?\n", + /*249*/ "Save Now\n", + /*250*/ "No Thanks!\n", + /*251*/ "Confirm player name:\n", + /*252*/ "The saved file has\nbeen erased due\nto corruption\nor damage.\n", + /*253*/ "Continue\n", + /*254*/ "Error\n", + /*255*/ "Cannot read Game Boy Game Pak.\nCheck connections and make sure\ncorrect Game Boy Game Pak is\nbeing used.\n", + /*256*/ "Cancel\n", + /*257*/ "Error\n", + /*258*/ "The saved data has\n", + /*259*/ "been erased due to\n", + /*260*/ "corruption or damage.\n", + /*261*/ "Cancel\n", + /*262*/ "Choose your language:\n", + /*263*/ "English\n", + /*264*/ "Français\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "American\n", + /*269*/ "Language:\n", + /*270*/ "Language\n", + /*271*/ "Control Style\n", + /*272*/ "Reverse Pitch\n", + /*273*/ "Look Ahead\n", + /*274*/ "Head Roll\n", + /*275*/ "Auto-Aim\n", + /*276*/ "Aim Control\n", + /*277*/ "Hold\n", + /*278*/ "Toggle\n", + /*279*/ "Cutscene Subtitles\n", + /*280*/ "In-Game Subtitles\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_f.c b/src/files/lang/pal-final/mpweapons_str_f.c new file mode 100644 index 000000000..190ba1bd5 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_f.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtient:\nRécepteur\n", + /* 1*/ "%s obtient:\nMallette\n", + /* 2*/ "%s obtient:\nMallette %s\n", + /* 3*/ "%sa notre\nMallette\n", + /* 4*/ "Mallette %s", + /* 5*/ "Vous capturez:\nMallette %s\n", + /* 6*/ "%s capture notre\nMallette\n", + /* 7*/ "%s capture:\nMallette %s\n", + /* 8*/ "Un point pour survivre!\n", + /* 9*/ "Il faut s'occuper de\n", + /* 10*/ "vos amis!\n", + /* 11*/ "Bien joué!\n", + /* 12*/ "Vous décapsulez!\n", + /* 13*/ "2 Points...\n", + /* 14*/ "Vous êtes la victime!\n", + /* 15*/ "Protégez %s!\n", + /* 16*/ "Abattez %s!\n", + /* 17*/ "Téléchargement réussi.\n", + /* 18*/ "Connexion perdue.\n", + /* 19*/ "Début téléchargement.\n", + /* 20*/ "Il faut utiliser le récepteur.\n", + /* 21*/ "Roi de\nla zone!\n", + /* 22*/ "Vous avez\nla zone!\n", + /* 23*/ "%sa capturé\nla zone!\n", + /* 24*/ "%ds/Point\n", + /* 25*/ "1 Point!\n", + /* 26*/ "Pas de bouclier\n", + /* 27*/ "Automatiques\n", + /* 28*/ "L-roquettes\n", + /* 29*/ "Simulants\n", + /* 30*/ "Roi de la zone\n", + /* 31*/ "Complexe FarSight\n", + /* 32*/ "Tenir la mallette\n", + /* 33*/ "Pistolets meurtriers\n", + /* 34*/ "Capturer la mallette\n", + /* 35*/ "Occultage\n", + /* 36*/ "Temple Explosifs\n", + /* 37*/ "Slayer\n", + /* 38*/ "Tranquil.\n", + /* 39*/ "Ralenti\n", + /* 40*/ "Appuyer sur START\n", + /* 41*/ "En pause\n", + /* 42*/ "Custom\n", + /* 43*/ "Hasard\n", + /* 44*/ "Hasard 5\n", + /* 45*/ "Corps à corps\n", + /* 46*/ "Mine proximité\n", + /* 47*/ "L-roquettes\n", + /* 48*/ "Lance-grenades\n", + /* 49*/ "Explosif\n", + /* 50*/ "Magnum d'Or\n", + /* 51*/ "Lourd\n", + /* 52*/ "Tranquil.\n", + /* 53*/ "FarSight\n", + /* 54*/ "Puissant\n", + /* 55*/ "Automatiques\n", + /* 56*/ "Pistolets\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Rien\n", + /* 60*/ "Bouclier\n", + /* 61*/ "Annulé\n", + /* 62*/ "Objectifs remplis\n", + /* 63*/ "Inconnu\n", + /* 64*/ "Manquant\n", + /* 65*/ "Controller Pak inséré\n", + /* 66*/ "endommagé ou\n", + /* 67*/ "mal branché.\n", + /* 68*/ "Tenter répar.\n", + /* 69*/ "Recommencer\n", + /* 70*/ "Ne pas utiliser\n Controller Pak\n", + /* 71*/ "Controller Pak inséré\n", + /* 72*/ "Espace libre insuf.:\n1 note et 28 pages\nrequises.\n", + /* 73*/ "Utiliser le menu\npour faire de la place\n(maintenir START\nen allumant.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Poings du dragon\n", + /* 77*/ "Occulteur\n", + /* 78*/ "Invincible\n", + /* 79*/ "Toutes les armes en solo\n", + /* 80*/ "Munitions infinies\n", + /* 81*/ "Munit. inf. Pas de recharg.\n", + /* 82*/ "Ralenti\n", + /* 83*/ "Mode DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Petite Joanna\n", + /* 87*/ "Petits personnages\n", + /* 88*/ "Boucliers Ennemis\n", + /* 89*/ "Joanna bouclier\n", + /* 90*/ "Super bouclier\n", + /* 91*/ "Visée classique\n", + /* 92*/ "Têtes équipe seulement\n", + /* 93*/ "Jouer Elvis\n", + /* 94*/ "Ennemis roquettes\n", + /* 95*/ "Munit. inf. Laptop sentinelle\n", + /* 96*/ "Ennemis boxeurs\n", + /* 97*/ "Perfect Darkness\n", + /* 98*/ "Pugiliste\n", + /* 99*/ "Hotshot\n", + /*100*/ "Touche et tire\n", + /*101*/ "Extraterrestre\n", + /*102*/ "Pisteur-R / Coffres armes\n", + /*103*/ "Lance-roquettes\n", + /*104*/ "Fusil sniper\n", + /*105*/ "Scan rayonsX\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop Gun\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis Gun\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Spécial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Jouabilité\n", + /*121*/ "Armes\n", + /*122*/ "Amis\n", + /*123*/ "Armes pour Joanna en solo\n", + /*124*/ "Armes classiques pour Joanna en solo\n", + /*125*/ "Désertion dataDyne", + /*126*/ "Extraction dataDyne ", + /*127*/ "Infiltration S51 ", + /*128*/ "Sauvetage S51", + /*129*/ "Fuite S51", + /*130*/ "Difficulté:\n", + /*131*/ "Triche Missions Solo\n", + /*132*/ "Triche Simulateur Combat\n", + /*133*/ "Triche Coopératif\n", + /*134*/ "Triche Contre-Opération\n", + /*135*/ "Déshonneur\n", + /*136*/ "Tricheur\n", + /*137*/ "Triche disponible", + /*138*/ "Terminer", + /*139*/ "pour Triche:", + /*140*/ "sur", + /*141*/ "sous", + /*142*/ " ou brancher Perfect Dark Game Boy (r) dans le Transfer Pak (tm), connectez le Transfer Pak dans une manette , sortez et accédez au menu", + /*143*/ "Choix Triche pour information\n", + /*144*/ "Ami disponible", + /*145*/ "Gagner Or sur le champ de tir pour les armes classiques.\n", + /*146*/ "Visée à l'écran\n", + /*147*/ "Cible\n", + /*148*/ "Portée zoom\n", + /*149*/ "Voir munit.\n", + /*150*/ "Fonction arme\n", + /*151*/ "Paintball\n", + /*152*/ "Sous-titres\n", + /*153*/ "Temps mission\n", + /*154*/ "Mode\n", + /*155*/ "Split\n", + /*156*/ "Voulez-vous abandonner\nla mission?\n", + /*157*/ "Joanna Cuir\n", + /*158*/ "Joanna Négociatrice\n", + /*159*/ "Elvis (gilet)\n", + /*160*/ "Erreur\n", + /*161*/ "Opér. impossible.\nUtilisation en cours.\n", + /*162*/ "Annuler\n", + /*163*/ "Limite temps:\n", + /*164*/ "Limite score:\n", + /*165*/ "Limite score équipe:\n", + /*166*/ "Challenge réussi!\n", + /*167*/ "Challenge échoué!\n", + /*168*/ "Challenge triché!\n", + /*169*/ "Sous-titres ciné\n", + /*170*/ "Sous-titres jeu\n", + /*171*/ "Ecran titre optionnel\n", + /*172*/ "Commencer Challenge\n", + /*173*/ "Enquête dataDyne", + /*174*/ "Erreur\n", + /*175*/ "Le Controller Pak\na été enlevé.\n", + /*176*/ "Tentative réparation\n", + /*177*/ "Tenter une\nréparation du\nController Pak?\n", + /*178*/ "Donnée être\nperdue!\n", + /*179*/ "Annuler\n", + /*180*/ "Réparer\n", + /*181*/ "Réparation réussie\n", + /*182*/ "Controller Pak\nréparé.\n", + /*183*/ "Réparation échouée\n", + /*184*/ "Controller Pak\nne peut être réparé.\nSauvegarde ou\nchargement impossible\navec ce Cont. Pak.\n", + /*185*/ "Handicap\n", + /*186*/ "BOUTONS L/R: ", + /*187*/ "BOUTON C HAUT: ", + /*188*/ "BOUTONS C G/D: ", + /*189*/ "BOUTON C BAS: ", + /*190*/ "BOUTON A: ", + /*191*/ "BOUTON B: ", + /*192*/ "STICK ANALOG.: ", + /*193*/ "BOUTON Z: ", + /*194*/ "MANETTE +: ", + /*195*/ "VISER", + /*196*/ "ALT. VISER", + /*197*/ "REGARDER HAUT", + /*198*/ "REGARDER BAS", + /*199*/ "REGARDER BAS", + /*200*/ "REGARDER HAUT", + /*201*/ "AVANT", + /*202*/ "ARRIERE", + /*203*/ "DEP. LATERAL", + /*204*/ "ARME", + /*205*/ "ACTION/RECHARGER", + /*206*/ "FEU", + /*207*/ "MARCHER/TOURNER", + /*208*/ "REGARDER", + /*209*/ "MARCHER/LATERAL", + /*210*/ "REGARDER/LATERAL", + /*211*/ "COMME BOUTONS C", + /*212*/ "MAnette 1:", + /*213*/ "Manette 2:", + /*214*/ "Style contrôle %s %s\n", + /*215*/ "(Une main)", + /*216*/ "(Deux mains)", + /*217*/ "Maintenir bouton d'arme pour menu rapide.\nMaintenir action pour autre fonction.\nAction+Feu pour changer de fonction.\nViser pour plus de précision.\nViser + Bouton C Bas pour s'accroupir.\nViser + Bouton C Haut pour se lever.\n", + /*218*/ "Désactiver toutes les triches\n", + /*219*/ "Filtre langage\n", + /*220*/ "UTILISATEUR:\n", + /*221*/ "MOT DE PASSE:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Choix paramètres:\n", + /*224*/ "Vit. réaction ennemis:\n", + /*225*/ "Vie ennemis:\n", + /*226*/ "Dégâts ennemis:\n", + /*227*/ "Précision ennemis:\n", + /*228*/ "OK\n", + /*229*/ "Annuler\n", + /*230*/ "Controller Pak introuvable\n", + /*231*/ "Nom:\n", + /*232*/ "Emplacement:\n", + /*233*/ "Dupliquer nom fichier\n", + /*234*/ "contient déjà\n", + /*235*/ "un fichier nommé\n", + /*236*/ "Renommer fichier\n", + /*237*/ "Changer emplacement\n", + /*238*/ "Annuler\n", + /*239*/ "Changer nom fichier\n", + /*240*/ "Nouveau nom fichier:\n", + /*241*/ " Le fichier en copie\nne peut être effacé.\n", + /*242*/ "ShockSim:%d\n", + /*243*/ "Temps spécial:\n", + /*244*/ "Nouvelle triche disponible:\n", + /*245*/ "Continuer\n", + /*246*/ "Recommencer dernier niveau\n", + /*247*/ "Sauver joueur\n", + /*248*/ "Sauver nouveau joueur\net stats?\n", + /*249*/ "Sauver maintenant\n", + /*250*/ "Non merci!\n", + /*251*/ "Confirmer nom joueur:\n", + /*252*/ "Le fichier sauvé\na été effacé:\ncorrupu ou\nendommagé.\n", + /*253*/ "Continuer\n", + /*254*/ "Erreur\n", + /*255*/ "Cartouche Game Boy illisible.\nVérifier connexions et s'assurer\nque la bonne cartouche est\nutilisée.\n", + /*256*/ "Annuler\n", + /*257*/ "Erreur\n", + /*258*/ "La sauvegarde a été\n", + /*259*/ "effacée: corrompue\n", + /*260*/ "ou endommagée.\n", + /*261*/ "Annuler\n", + /*262*/ "Choix de langue:\n", + /*263*/ "English\n", + /*264*/ "Français\n", + /*265*/ "Deutsch\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "American\n", + /*269*/ "Langue:\n", + /*270*/ "Langue\n", + /*271*/ "Style contrôle\n", + /*272*/ "Visée inv.\n", + /*273*/ "Voir droit\n", + /*274*/ "Vue tête\n", + /*275*/ "Visée auto\n", + /*276*/ "Contrôle cible\n", + /*277*/ "Fixe\n", + /*278*/ "Alt.\n", + /*279*/ "Sous-titres ciné\n", + /*280*/ "Sous-titres jeu\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_g.c b/src/files/lang/pal-final/mpweapons_str_g.c new file mode 100644 index 000000000..1c60de014 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_g.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%shat den\nData Uplink\n", + /* 1*/ "%shat den\nAktenkoffer\n", + /* 2*/ "%shat den Koffer von %s\n", + /* 3*/ "%shat unseren\nAktenkoffer\n", + /* 4*/ "Aktenkoffer von %s geschnappt\n", + /* 5*/ "Sie haben den\nAktenkoffer von %s geschnappt.\n", + /* 6*/ "%shat unseren\nAktenkoffer geschnappt.\n", + /* 7*/ "%shat den\nAktenkoffer von %s geschnappt.\n", + /* 8*/ "Wieviel ist Ihnen das Leben wert?\n", + /* 9*/ "Sie sollten Ihr Team nicht\n", + /* 10*/ "angreifen!\n", + /* 11*/ "Gut gemacht!\n", + /* 12*/ "Einer weniger!\n", + /* 13*/ "Ist Ihnen das Leben noch immer etwas wert?\n", + /* 14*/ "Sie sind das Opfer!\n", + /* 15*/ "Beschützen Sie %s!\n", + /* 16*/ "Schnappen Sie %s!\n", + /* 17*/ "Download erfolgreich.\n", + /* 18*/ "Verbindung abgebrochen.\n", + /* 19*/ "Download gestartet.\n", + /* 20*/ "Sie müssen den Data Uplink einsetzen.\n", + /* 21*/ "Herr des\nHügels!\n", + /* 22*/ "Der Hügel\nist unser!\n", + /* 23*/ "%shat den Hügel\nerobert!\n", + /* 24*/ "%ds/Punkt\n", + /* 25*/ "1 Punkt!\n", + /* 26*/ "Kein Schild\n", + /* 27*/ "Auto\n", + /* 28*/ "Raketenw.\n", + /* 29*/ "Simulanten\n", + /* 30*/ "Herr des Hügels\n", + /* 31*/ "Weitsicht\n", + /* 32*/ "Der Koffer 1\n", + /* 33*/ "Höchste Vorsicht\n", + /* 34*/ "Der Koffer 2\n", + /* 35*/ "Tarnung\n", + /* 36*/ "Sprengs.\n", + /* 37*/ "Slayer\n", + /* 38*/ "B-Gewehr\n", + /* 39*/ "Zeitlupe\n", + /* 40*/ "Drücken Sie START\n", + /* 41*/ "Pause\n", + /* 42*/ "individuell\n", + /* 43*/ "zufällig\n", + /* 44*/ "Fünf Zuf.\n", + /* 45*/ "Nahkampf\n", + /* 46*/ "A-Mine\n", + /* 47*/ "Raketenw.\n", + /* 48*/ "Granatw.\n", + /* 49*/ "Sprengs.\n", + /* 50*/ "G-Magnum\n", + /* 51*/ "Schwere\n", + /* 52*/ "Bet.-Gewehr\n", + /* 53*/ "Fernsicht\n", + /* 54*/ "Power\n", + /* 55*/ "Autom.\n", + /* 56*/ "Pistolen\n", + /* 57*/ "Test\n", + /* 58*/ "4 MB-Test\n", + /* 59*/ "Nichts\n", + /* 60*/ "Schild\n", + /* 61*/ "Nicht belegt\n", + /* 62*/ "Alle Ziele erreicht\n", + /* 63*/ "Unbekannt\n", + /* 64*/ "Vermisst\n", + /* 65*/ "Contr.-Pak beschädigt\n", + /* 66*/ "ist beschädigt oder\n", + /* 67*/ "nicht korrekt eingelegt.\n", + /* 68*/ "Schaden beheben\n", + /* 69*/ "Nochmals versuchen\n", + /* 70*/ "Ohne Controller Pak \nfortfahren\n", + /* 71*/ "Controller Pak ist voll\n", + /* 72*/ "ist zu voll, um zu \nspeichern - Es werden 28 \nfreie Seiten benötigt.\n", + /* 73*/ "Schaffe im Controller Pak \nMenü ausreichend Platz. \n(Halte während des Einschaltens \nSTART gedrückt.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Hurricane-Faust\n", + /* 77*/ "Tarnkappe\n", + /* 78*/ "Unbesiegbar\n", + /* 79*/ "Alle Waffen verfügbar\n", + /* 80*/ "Unbegrenzte Munition\n", + /* 81*/ "Unbegrenzte Munition, kein Nachladen\n", + /* 82*/ "Zeitlupen-Modus\n", + /* 83*/ "DK-Modus\n", + /* 84*/ "Trents Magnum\n", + /* 85*/ "Fernsicht\n", + /* 86*/ "Mini-Jo\n", + /* 87*/ "Kleine Charaktere\n", + /* 88*/ "Feinde mit Schild\n", + /* 89*/ "Jo mit Schild\n", + /* 90*/ "Super-Schild\n", + /* 91*/ "Klassische Sicht\n", + /* 92*/ "Nur Köpfe des Teams\n", + /* 93*/ "Elvis\n", + /* 94*/ "Feinde mit Raketen\n", + /* 95*/ "Unbegr. Muni für Selbstschuss-Anlage\n", + /* 96*/ "Marquis of Queensbury-Regeln\n", + /* 97*/ "Perfekte Dunkelheit\n", + /* 98*/ "Boxer\n", + /* 99*/ "Hotshot\n", + /*100*/ "Hit and Run\n", + /*101*/ "Alien\n", + /*102*/ "R-Tracker / Munitions-Fundorte\n", + /*103*/ "Raketenw.\n", + /*104*/ "Sniper-Gewehr\n", + /*105*/ "Röntgen-Scanner\n", + /*106*/ "SuperDragon\n", + /*107*/ "Laptop-Gewehr\n", + /*108*/ "Phoenix\n", + /*109*/ "Psychosis-Gewehr\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KLO1313\n", + /*113*/ "KF7 Spezial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Fun\n", + /*120*/ "Gameplay\n", + /*121*/ "Waffen\n", + /*122*/ "Kumpel\n", + /*123*/ "Waffen für Jo im Solo-Modus\n", + /*124*/ "Klassische Waffe für Jo im Solo-Modus\n", + /*125*/ "dataDyne Überlauf", + /*126*/ "dataDyne Extraktion", + /*127*/ "A51 Infiltration", + /*128*/ "A51 Rettung", + /*129*/ "A51 Flucht", + /*130*/ "Schwierigkeit:\n", + /*131*/ "Cheat Solo Missionen\n", + /*132*/ "Cheat Kampf-Simulator\n", + /*133*/ "Cheat Teamwork\n", + /*134*/ "Cheat Counter Operative-Modus\n", + /*135*/ "Entehrt\n", + /*136*/ "Gecheated\n", + /*137*/ "Cheat verfügbar", + /*138*/ "Komplettierung", + /*139*/ "für den Cheat:", + /*140*/ "auf", + /*141*/ "in weniger als ", + /*142*/ " oder legen Sie Perfect Dark - Game Boy (R) in das Transfer Pak (TM) ein. Legen Sie ein Transfer Pak in einen beliebigen Controller ein, und gehen Sie ins Menü.", + /*143*/ "Wählen Sie den Cheat für mehr Infos aus.\n", + /*144*/ "Kumpel verfügbar", + /*145*/ "Erlangen Sie Gold am Schießstand, um klassische Waffen anzuwählen.\n", + /*146*/ "Display\n", + /*147*/ "Ziel\n", + /*148*/ "Zoom\n", + /*149*/ "Munition\n", + /*150*/ "Funktion\n", + /*151*/ "Paintball\n", + /*152*/ "Text\n", + /*153*/ "Zeit\n", + /*154*/ "Sound\n", + /*155*/ "Split\n", + /*156*/ "Möchten Sie die Mission\nabbrechen?\n", + /*157*/ "Joanna in Leder\n", + /*158*/ "Joanna als Unterhändler\n", + /*159*/ "Elvis (Weste)\n", + /*160*/ "Error\n", + /*161*/ "File ist aktiv. Aktive \nFiles können nicht \ngelöscht werden.\n", + /*162*/ "Abbrechen\n", + /*163*/ "Zeit-Limit:\n", + /*164*/ "Score-Limit:\n", + /*165*/ "Team Score-Limit:\n", + /*166*/ "Abgeschlossen!\n", + /*167*/ "Fehlgeschlagen!\n", + /*168*/ "CHEATER!\n", + /*169*/ "Cutscene Untertitel\n", + /*170*/ "In-Game Untertitel\n", + /*171*/ "Alternativer Titelbildschirm\n", + /*172*/ "Challenge beginnen\n", + /*173*/ "dataDyne Untersuchung", + /*174*/ "Error\n", + /*175*/ "Das Controller Pak \nwurde entfernt.\n", + /*176*/ "Schaden beheben\n", + /*177*/ "Sind Sie sicher, dass \nSie das Controller Pak \nreparieren wollen)\n", + /*178*/ "Datenverlust\nmöglich!\n", + /*179*/ "Abbruch\n", + /*180*/ "Reparatur\n", + /*181*/ "Reparatur erfolgreich\n", + /*182*/ "Das Controller Pak \nwurde repariert.\n", + /*183*/ "Reparatur nicht OK\n", + /*184*/ "Das Controller Pak \nkann nicht repariert\nwerden. Sie können\nkeine Daten laden \noder speichern.\n", + /*185*/ "Handicaps\n", + /*186*/ "L/R-TASTEN: ", + /*187*/ "C OBEN: ", + /*188*/ "C LINKS/RECHTS: ", + /*189*/ "C UNEN: ", + /*190*/ "A: ", + /*191*/ "B: ", + /*192*/ "3D-STICK: ", + /*193*/ "Z: ", + /*194*/ "+ STEUERKREUZ: ", + /*195*/ "ZIELEN", + /*196*/ "ZIELFUNKTION", + /*197*/ "BLICK OBEN", + /*198*/ "BLICK UNTEN", + /*199*/ "NACH UNTEN SCHAUEN", + /*200*/ "BLICK OBEN", + /*201*/ "VORWÄRTS", + /*202*/ "RÜCKWÄRTS", + /*203*/ "AUSW.", + /*204*/ "WAFFE", + /*205*/ "AKTION/NACHLADEN", + /*206*/ "FEUER", + /*207*/ "GEHEN/DREHEN", + /*208*/ "UMSCHAUEN", + /*209*/ "GEHEN/AUSW.", + /*210*/ "UMSCHAUEN/AUSW.", + /*211*/ "WIE C-KNÖPFE", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Steuerungsart %s %s\n", + /*215*/ "(Einhändig)", + /*216*/ "(Beidhändig)", + /*217*/ "'Waffe' gedrückt halten = Quick-Menü\n'Aktions' gedrückt halten = 2. Funktion\nAktion+Feuer ändert die Funktion kurz\nZielfunktion = manuelles Zielen\nZielen + C-Knopf unten = kriechen.\nZielen + C-Knopf oben = aufstehen.\n", + /*218*/ "Alle Cheats deaktivieren\n", + /*219*/ "Sprachfilter\n", + /*220*/ "USERNAME:\n", + /*221*/ "PASSWORT:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Einstellungen wählen:\n", + /*224*/ "Gegnerische Reaktion:\n", + /*225*/ "Gegnerische Energie:\n", + /*226*/ "Schaden durch Gegner:\n", + /*227*/ "Gegnerische Genauigkeit:\n", + /*228*/ "OK\n", + /*229*/ "Abbruch\n", + /*230*/ "Controller Pak wurde nicht gefunden\n", + /*231*/ "Name:\n", + /*232*/ "Location:\n", + /*233*/ "File Name duplizieren\n", + /*234*/ "beinhaltet bereits\n", + /*235*/ "ein File namens\n", + /*236*/ "File umbenennen\n", + /*237*/ "Location wechseln\n", + /*238*/ "Abbruch\n", + /*239*/ "File Namen ändern\n", + /*240*/ "Neuen Namen eingeben:\n", + /*241*/ "Das zu kopierende File \nkann nicht gelöscht werden.\n", + /*242*/ "SchockSim:%d\n", + /*243*/ "Maximale Zeit:\n", + /*244*/ "Neuer Cheat verfügbar!\n", + /*245*/ "Weiter\n", + /*246*/ "Letzten Level wiederholen\n", + /*247*/ "Spieler speichern\n", + /*248*/ "Neuen Spieler und \nWerte speichern?\n", + /*249*/ "Speichern\n", + /*250*/ "Nein Danke!\n", + /*251*/ "Spielernamen bestätigen:\n", + /*252*/ "Das gespeicherte File wurde \naufgrund von beschädigten Daten \noder Hardware-Schäden \ngelöscht.\n", + /*253*/ "Weiter\n", + /*254*/ "Error\n", + /*255*/ "Game Boy-Modul kann nicht gelesen werden.\nBitte überprüfen Sie, ob\ndas richtige Game Boy-Modul\neingelegt ist.\n", + /*256*/ "Abbruch\n", + /*257*/ "Error\n", + /*258*/ "Die gespeicherten Daten\n", + /*259*/ "wurden aufgrund einer\n", + /*260*/ "Beschädigung gelöscht.\n", + /*261*/ "Abbruch\n", + /*262*/ "Wählen Sie die Sprache:\n", + /*263*/ "Englisch\n", + /*264*/ "Französisch\n", + /*265*/ "Deutsch\n", + /*266*/ "Italienisch\n", + /*267*/ "Spanisch\n", + /*268*/ "Amerikanisch\n", + /*269*/ "Sprache:\n", + /*270*/ "Sprache\n", + /*271*/ "Steuerung\n", + /*272*/ "Blickrichtung\n", + /*273*/ "Geradeaus\n", + /*274*/ "Kopfbewegung\n", + /*275*/ "Auto-Visier\n", + /*276*/ "Fadenkreuz\n", + /*277*/ "Halten\n", + /*278*/ "Umsch.\n", + /*279*/ "Cutscene Untertitel\n", + /*280*/ "In-Game Untertitel\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_i.c b/src/files/lang/pal-final/mpweapons_str_i.c new file mode 100644 index 000000000..08b885cfa --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_i.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%sha il\nConnettore Dati\n", + /* 1*/ "%sha la\ncartella\n", + /* 2*/ "%sha la cartella di %s\n", + /* 3*/ "%sha la nostra\ncartella\n", + /* 4*/ "Presa la cartella di %s\n", + /* 5*/ "Hai preso la\ncartella di %s\n", + /* 6*/ "%s ha preso la nostra\ncartella\n", + /* 7*/ "%s ha preso la\ncartella di %s\n", + /* 8*/ "Un punto per la resistenza!\n", + /* 9*/ "Dovresti aver cura\n", + /* 10*/ "dei tuoi amici!\n", + /* 11*/ "Ben fatto!\n", + /* 12*/ "Libero!\n", + /* 13*/ "Due punti ...\n", + /* 14*/ "Sei la vittima!\n", + /* 15*/ "Proteggi %s!\n", + /* 16*/ "Prendi %s!\n", + /* 17*/ "Scaricamento avvenuto.\n", + /* 18*/ "Connessione fallita.\n", + /* 19*/ "Avvio scaricamento.\n", + /* 20*/ "Devi usare il Connettore Dati.\n", + /* 21*/ "Re \ndel colle!\n", + /* 22*/ "Abbiamo\nil colle!\n", + /* 23*/ "%sha preso\nil colle!\n", + /* 24*/ "%ds/punto\n", + /* 25*/ "Un punto!\n", + /* 26*/ "Niente scudo\n", + /* 27*/ "Automatica\n", + /* 28*/ "Lanciamissili\n", + /* 29*/ "Replicanti\n", + /* 30*/ "Re del Colle\n", + /* 31*/ "TeleVista complessa\n", + /* 32*/ "Prendi la cartella\n", + /* 33*/ "Un-colpo-e-sei-morto\n", + /* 34*/ "Prendi la cassa\n", + /* 35*/ "Mimesi\n", + /* 36*/ "Esplosivi tempio\n", + /* 37*/ "Killer\n", + /* 38*/ "Sedativo\n", + /* 39*/ "Al rallentatore\n", + /* 40*/ "Premi START\n", + /* 41*/ "In pausa\n", + /* 42*/ "Personale\n", + /* 43*/ "A caso\n", + /* 44*/ "5 a caso\n", + /* 45*/ "Lotta\n", + /* 46*/ "Mina pross.\n", + /* 47*/ "Lanciamissili\n", + /* 48*/ "Lanciagran.\n", + /* 49*/ "Esplosivo\n", + /* 50*/ "Magnum Oro\n", + /* 51*/ "Pesante\n", + /* 52*/ "Sedativo\n", + /* 53*/ "TeleVista\n", + /* 54*/ "Power\n", + /* 55*/ "Automatico\n", + /* 56*/ "Pistole\n", + /* 57*/ "Prova\n", + /* 58*/ "Prova 4mb\n", + /* 59*/ "Niente\n", + /* 60*/ "Scudo\n", + /* 61*/ "Disattivato\n", + /* 62*/ "Obiettivi raggiunti\n", + /* 63*/ "Sconosciuto\n", + /* 64*/ "Mancante\n", + /* 65*/ "Controller Pak difettoso\n", + /* 66*/ "È danneggiato o \n", + /* 67*/ "inserito male.\n", + /* 68*/ "Sistemalo\n", + /* 69*/ "Riprova\n", + /* 70*/ "Continua senza\nController Pak\n", + /* 71*/ "Controller Pak pieno\n", + /* 72*/ "Memoria esaurita,\nimpossibile salvare.\n", + /* 73*/ "Accedi al menu\nController Pak per\nliberare spazio - premi\nSTART all'avvio del gioco.\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Pugni uragano\n", + /* 77*/ "Dispositivo mimetico\n", + /* 78*/ "Invulnerabile\n", + /* 79*/ "Tutte le armi per missioni individuali\n", + /* 80*/ "Munizioni illimitate\n", + /* 81*/ "Munizioni illimitate, senza ricarica\n", + /* 82*/ "Un giocatore al rallentatore \n", + /* 83*/ "Modalità DK\n", + /* 84*/ "Magnum di Trent\n", + /* 85*/ "TeleVista\n", + /* 86*/ "Jo Piccola\n", + /* 87*/ "Personaggi piccoli\n", + /* 88*/ "Scudi nemici\n", + /* 89*/ "Scudo di Jo\n", + /* 90*/ "SuperScudo\n", + /* 91*/ "Vista classica\n", + /* 92*/ "Solo capi squadra\n", + /* 93*/ "Gioca come Elvis\n", + /* 94*/ "Missili nemici\n", + /* 95*/ "Munizioni illimitate - Pistola Laptop Sentinella\n", + /* 96*/ "Regole del Marchese di Queensbury\n", + /* 97*/ "BuioPerfect\n", + /* 98*/ "Pugile\n", + /* 99*/ "Colpo\n", + /*100*/ "Toccata e fuga\n", + /*101*/ "Alieno\n", + /*102*/ "Puntatore R/Disposizione armi nascoste\n", + /*103*/ "Lanciamissili\n", + /*104*/ "Fucile cecchino\n", + /*105*/ "Scanner a raggi X\n", + /*106*/ "SuperDragon\n", + /*107*/ "Pistola Laptop\n", + /*108*/ "Phoenix\n", + /*109*/ "PsicoArma\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "KL01313\n", + /*113*/ "KF7 Special\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Divertimento\n", + /*120*/ "Gioco\n", + /*121*/ "Armi\n", + /*122*/ "Amici\n", + /*123*/ "Armi per Jo da sola\n", + /*124*/ "Armi classiche per Jo da sola\n", + /*125*/ "Ribellione dD", + /*126*/ "Salvataggio dD", + /*127*/ "Infiltrazione A51", + /*128*/ "Salvataggio A51", + /*129*/ "Fuga A51", + /*130*/ "Difficoltà:\n", + /*131*/ "Trucco Missioni Individuali\n", + /*132*/ "Trucco Simulatore Lotta\n", + /*133*/ "Trucco Collaborazione\n", + /*134*/ "Trucco Tutti-contro-Tutti\n", + /*135*/ "Disonore\n", + /*136*/ "Truccata\n", + /*137*/ "Trucco disponibile", + /*138*/ "Completa", + /*139*/ "per trucco:", + /*140*/ "con", + /*141*/ "in meno di", + /*142*/ " o inserisci Perfect Dark Game Boy (r) nel Transfer Pak (tm), connetti il Transfer Pak ad un Controller, esci e accedi al menu", + /*143*/ "Seleziona trucco per informazioni\n", + /*144*/ "Amico disponibile", + /*145*/ "Vinci medaglie d'oro al poligono per attivare le pistole classiche.\n", + /*146*/ "Vista su schermo\n", + /*147*/ "Obiettivo\n", + /*148*/ "Area Zoom\n", + /*149*/ "Munizioni\n", + /*150*/ "Funzioni arma\n", + /*151*/ "Macchia colorata\n", + /*152*/ "Didascalie\n", + /*153*/ "Tempo Missione\n", + /*154*/ "Modalità\n", + /*155*/ "Dividi\n", + /*156*/ "Vuoi interrompere\nla missione?\n", + /*157*/ "Pelle Joanna\n", + /*158*/ "Negoziatore Joanna\n", + /*159*/ "Gilet Elvis\n", + /*160*/ "Errore\n", + /*161*/ "Impossibile eliminare\nfile in uso.\n", + /*162*/ "Annulla\n", + /*163*/ "Lim. tempo:\n", + /*164*/ "Lim. punti:\n", + /*165*/ "Lim. punti squadra:\n", + /*166*/ "Sfida compiuta!\n", + /*167*/ "Sfida fallita!\n", + /*168*/ "Sfida truccata!\n", + /*169*/ "Didascalie film\n", + /*170*/ "Didascalie nel gioco\n", + /*171*/ "Schermo alternativo titolo\n", + /*172*/ "Inizia sfida\n", + /*173*/ "Indagine dataDyne", + /*174*/ "Errore\n", + /*175*/ "Il Controller Pak\nè stato tolto.\n", + /*176*/ "Sistemalo\n", + /*177*/ "Sicuro di voler\nsistemare il\nController Pak?\n", + /*178*/ "Potresti perdere i dati!\n", + /*179*/ "Annulla\n", + /*180*/ "Sistema\n", + /*181*/ "Ci sei riuscito!\n", + /*182*/ "Il Controller Pak\nè stato sistemato.\n", + /*183*/ "Non ci sei riuscito.\n", + /*184*/ "Impossibile sistemare\nil Controller Pak:\nimpossibile caricare\no salvare su questo\nController Pak.\n", + /*185*/ "Svantaggio giocatore\n", + /*186*/ "PULSANTI L/R: ", + /*187*/ "PULSANTE C SU: ", + /*188*/ "PULSANTI C DX/SX: ", + /*189*/ "PULSANTE C GIÙ: ", + /*190*/ "PULSANTE A: ", + /*191*/ "PULSANTE B: ", + /*192*/ "CONTROL STICK: ", + /*193*/ "PULSANTE Z: ", + /*194*/ "PULSANTIERA +: ", + /*195*/ "MIRA", + /*196*/ "DIS/ATTIVA MIRA", + /*197*/ "GUARDA SU", + /*198*/ "GUARDA GIÙ", + /*199*/ "GUARDA GIÙ", + /*200*/ "GUARDA SU", + /*201*/ "AVANTI", + /*202*/ "INDIETRO", + /*203*/ "SPOSTATI", + /*204*/ "ARMA", + /*205*/ "AZIONE/RICARICA", + /*206*/ "FUOCO", + /*207*/ "VAI/GIRA", + /*208*/ "GUARDA", + /*209*/ "VAI/SPOSTATI", + /*210*/ "VAI/SPOSTATI", + /*211*/ "COME PULSANTI C", + /*212*/ "Controller 1:", + /*213*/ "Controller 2:", + /*214*/ "Modalità comandi %s %s\n", + /*215*/ "(una mano)", + /*216*/ "(due mani)", + /*217*/ "Tieni premuto ARMA per menu rapido.\nTieni premuto AZIONE per dis/attivare.\nAZIONE+FUOCO per cambiare funzioni.\nCon MIRA puoi mirare accuratamente.\nMIRA + C GIÙ per accucciarti.\nMIRA + C SU per alzarti.\n", + /*218*/ "Disattiva i trucchi\n", + /*219*/ "Filtro lingua\n", + /*220*/ "NOME UTENTE:\n", + /*221*/ "PASSWORD:\n", + /*222*/ "Perfect Dark\n", + /*223*/ "Scegli impostaz.:\n", + /*224*/ "Velocità reazione nemico:\n", + /*225*/ "Salute nemico:\n", + /*226*/ "Danno nemico:\n", + /*227*/ "Precisione nemico:\n", + /*228*/ "OK\n", + /*229*/ "Annulla\n", + /*230*/ "Controller Pak assente\n", + /*231*/ "Nome:\n", + /*232*/ "Dove:\n", + /*233*/ "Copia nome file\n", + /*234*/ "contiene già un\n", + /*235*/ "file di nome\n", + /*236*/ "Rinomina file\n", + /*237*/ "Cambia posto\n", + /*238*/ "Annulla\n", + /*239*/ "Cambia nome file\n", + /*240*/ "Digita nuovo nome:\n", + /*241*/ "Il file che stai copiando\nnon può essere cancellato.\n", + /*242*/ "RepShock:%d\n", + /*243*/ "Tempo-obiettivo:\n", + /*244*/ "Nuovo trucco disponibile!:\n", + /*245*/ "Continua\n", + /*246*/ "Replay ultimo livello\n", + /*247*/ "Salva giocatore\n", + /*248*/ "Salva nuovo giocatore\ne statistiche?\n", + /*249*/ "Salva!\n", + /*250*/ "Non salvare!\n", + /*251*/ "Conferma nome giocatore:\n", + /*252*/ "Il file in memoria\nè stato cancellato\na causa di un errore.\n", + /*253*/ "Continua\n", + /*254*/ "Errore\n", + /*255*/ "Impossibile leggere la cassetta\ndi gioco Game Boy. Controlla le\nconnessioni e assicurati che si\ntratti della cassetta giusta.\n", + /*256*/ "Annulla\n", + /*257*/ "Errore\n", + /*258*/ "I dati in memoria\n", + /*259*/ "sono stati eliminati\n", + /*260*/ "perché danneggiati.\n", + /*261*/ "Annulla\n", + /*262*/ "Scegli la lingua:\n", + /*263*/ "Inglese\n", + /*264*/ "Francese\n", + /*265*/ "Tedesco\n", + /*266*/ "Italiano\n", + /*267*/ "Spagnolo\n", + /*268*/ "Americano\n", + /*269*/ "Lingua:\n", + /*270*/ "Lingua\n", + /*271*/ "Modalità comandi\n", + /*272*/ "Inv. punto vista\n", + /*273*/ "Vista in avanti\n", + /*274*/ "Rotazione testa\n", + /*275*/ "Mira automatica\n", + /*276*/ "Mirino\n", + /*277*/ "Tieni premuto\n", + /*278*/ "Dis/Attiva\n", + /*279*/ "Didascalie film\n", + /*280*/ "Didascalie nel gioco\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/mpweapons_str_s.c b/src/files/lang/pal-final/mpweapons_str_s.c new file mode 100644 index 000000000..14d747c64 --- /dev/null +++ b/src/files/lang/pal-final/mpweapons_str_s.c @@ -0,0 +1,288 @@ +#include + +char *lang[] = { + /* 0*/ "%stiene el\nC. de Datos\n", + /* 1*/ "%stiene el\nMaletín\n", + /* 2*/ "%stiene el Maletín de %s\n", + /* 3*/ "%stiene nuestro Maletín\n", + /* 4*/ "Atrapaste el Maletín\nde %s\n", + /* 5*/ "Has capturado el\nMaletín de %s\n", + /* 6*/ "%sha capturado\nnuestro Maletín\n", + /* 7*/ "%sha capturado\nel Maletín de %s\n", + /* 8*/ "¡Un punto por sobrevivir!\n", + /* 9*/ "¡Se supone que debes\n", + /* 10*/ "proteger a tus amigos!\n", + /* 11*/ "¡Bien hecho!\n", + /* 12*/ "¡Tú la llevas!\n", + /* 13*/ "Obtienes 2 Puntos...\n", + /* 14*/ "¡Eres la víctima!\n", + /* 15*/ "¡Protege a\n%s!\n", + /* 16*/ "¡Coge a\n%s!\n", + /* 17*/ "Descarga completada.\n", + /* 18*/ "Conexión perdida.\n", + /* 19*/ "Comenzando descarga.\n", + /* 20*/ "Necesitas usar el Conector de Datos.\n", + /* 21*/ "¡Rey de\nla Colina!\n", + /* 22*/ "¡Tenemos\nla Colina!\n", + /* 23*/ "¡%sha capturado\nla Colina!\n", + /* 24*/ "%ds/Punto\n", + /* 25*/ "¡1 Punto!\n", + /* 26*/ "Sin Escudo\n", + /* 27*/ "Automáticas\n", + /* 28*/ "Lanzacohetes\n", + /* 29*/ "Simulantes\n", + /* 30*/ "Rey de la Colina\n", + /* 31*/ "Complejo FarSight\n", + /* 32*/ "Mantén el Maletín\n", + /* 33*/ "Mata de Un Tiro\n", + /* 34*/ "Captura el Maletín\n", + /* 35*/ "Ocultación\n", + /* 36*/ "Explosivos Templo\n", + /* 37*/ "Asesino\n", + /* 38*/ "Tranquilizante\n", + /* 39*/ "Cámara Lenta\n", + /* 40*/ "Pulsa START\n", + /* 41*/ "Pausa\n", + /* 42*/ "Personalizado\n", + /* 43*/ "Aleatorio\n", + /* 44*/ "Cinco al Azar\n", + /* 45*/ "Mano a Mano\n", + /* 46*/ "Minas Proxim.\n", + /* 47*/ "Lanzacohetes\n", + /* 48*/ "Lanzagranadas\n", + /* 49*/ "Explosivos\n", + /* 50*/ "Magnum Dorada\n", + /* 51*/ "Armas Pesadas\n", + /* 52*/ "Tranquilizantes\n", + /* 53*/ "FarSight\n", + /* 54*/ "Fuerza Bruta\n", + /* 55*/ "Automáticas\n", + /* 56*/ "Pistolas\n", + /* 57*/ "Test\n", + /* 58*/ "Test 4mb\n", + /* 59*/ "Nada\n", + /* 60*/ "Escudo\n", + /* 61*/ "Desactivado\n", + /* 62*/ "Objetivos Completados\n", + /* 63*/ "Desconocido\n", + /* 64*/ "Desaparecido\n", + /* 65*/ "Controller Pak Dañado\n", + /* 66*/ "está dañado o\n", + /* 67*/ "mal insertado.\n", + /* 68*/ "Intentar Reparar\n", + /* 69*/ "Reintentar\n", + /* 70*/ "Continuar sin usar\nel Controller Pak\n", + /* 71*/ "Controller Pak Lleno\n", + /* 72*/ "Está demasiado lleno. Se\nnecesitan 1 nota y 28\npáginas para guardar.\n", + /* 73*/ "Entra en el Menú del\nController Pak para liberar\nespacio (pulsa START\nmientras enciendes.)\n", + /* 74*/ "OK\n", + /* 75*/ "----------\n", + /* 76*/ "Puñetazos Huracán\n", + /* 77*/ "Dispositivo de Ocultación\n", + /* 78*/ "Invencible\n", + /* 79*/ "Todas las Armas en Solo\n", + /* 80*/ "Munición Ilimitada\n", + /* 81*/ "Munición Ilimitada sin Recargas\n", + /* 82*/ "Un jugador Cámara Lenta\n", + /* 83*/ "Modo DK\n", + /* 84*/ "Magnum de Trent\n", + /* 85*/ "FarSight\n", + /* 86*/ "Mini-Joanna\n", + /* 87*/ "Mini-Personajes\n", + /* 88*/ "Escudo de Enemigos\n", + /* 89*/ "Escudo de Joanna\n", + /* 90*/ "Súper Escudo\n", + /* 91*/ "Mirilla Clásica\n", + /* 92*/ "Sólo Jefes de Equipo\n", + /* 93*/ "Jugar como Elvis\n", + /* 94*/ "Cohetes Enemigos\n", + /* 95*/ "Munición Ilimitada - Arma PC Centinela\n", + /* 96*/ "Reglas del Marqués de Queensbury\n", + /* 97*/ "Oscuridad Perfecta\n", + /* 98*/ "Pugilista\n", + /* 99*/ "Disparo Caliente\n", + /*100*/ "Golpea y Corre\n", + /*101*/ "Alienígena\n", + /*102*/ "Rastreador/Localización de armas\n", + /*103*/ "Lanzacohetes\n", + /*104*/ "Rifle Francotirador\n", + /*105*/ "Escáner de Rayos-X\n", + /*106*/ "SuperDragón\n", + /*107*/ "Arma PC\n", + /*108*/ "Phoenix\n", + /*109*/ "Pistola Psicosis\n", + /*110*/ "PP9i\n", + /*111*/ "CC13\n", + /*112*/ "Klo1313\n", + /*113*/ "KF7 Especial\n", + /*114*/ "ZZT (9mm)\n", + /*115*/ "DMC\n", + /*116*/ "AR53\n", + /*117*/ "RC-P45\n", + /*118*/ "Velvet Dark\n", + /*119*/ "Diversión\n", + /*120*/ "Jugabilidad\n", + /*121*/ "Armas\n", + /*122*/ "Compañeros\n", + /*123*/ "Armas para Joanna en Solo\n", + /*124*/ "Armas Clásicas para Joanna en Solo\n", + /*125*/ "Entrando en dataDyne", + /*126*/ "Extracción de dataDyne", + /*127*/ "Infiltración en A51", + /*128*/ "Rescate en A51", + /*129*/ "Escape de A51", + /*130*/ "Dificultad:\n", + /*131*/ "Trucos en Misiones Solo\n", + /*132*/ "Trucos en Simulador de Combate\n", + /*133*/ "Trucos en Co-operativo\n", + /*134*/ "Trucos en Contra-Operativa\n", + /*135*/ "Sin honor\n", + /*136*/ "Trucada\n", + /*137*/ "Truco disponible", + /*138*/ "Completa", + /*139*/ "para el truco:", + /*140*/ "en", + /*141*/ "por debajo de", + /*142*/ " o inserta Perfect Dark de Game Boy (r) en un Transfer Pak (tm), conecta el Transfer Pak a cualquier mando, y sal y vuelve a entrar en el menú", + /*143*/ "Elige truco para más información\n", + /*144*/ "Camarada disponible", + /*145*/ "Gana Oros en las pruebas de tiro para activar las armas clásicas.\n", + /*146*/ "Mirilla\n", + /*147*/ "Objetivo\n", + /*148*/ "Alcance de Zoom\n", + /*149*/ "Mostrar Munición\n", + /*150*/ "Función Arma\n", + /*151*/ "Bolas de Pintura\n", + /*152*/ "Subtítulos\n", + /*153*/ "Tiempo Misión\n", + /*154*/ "Modo\n", + /*155*/ "Corte\n", + /*156*/ "¿Quieres interrumpir\nla misión?\n", + /*157*/ "Joanna en Piel\n", + /*158*/ "Joanna Negociadora\n", + /*159*/ "Elvis (Chaleco)\n", + /*160*/ "Error\n", + /*161*/ "No se puede borrar un\nfichero en uso.\n", + /*162*/ "Cancelar\n", + /*163*/ "Límite Tiempo:\n", + /*164*/ "Límite Puntos:\n", + /*165*/ "Límite P. Equipo:\n", + /*166*/ "¡Desafío Completado!\n", + /*167*/ "¡Desafío Fallado!\n", + /*168*/ "¡Desafío Trucado!\n", + /*169*/ "Subtítulos en Escenas\n", + /*170*/ "Subtítulos en el Juego\n", + /*171*/ "Pantalla de Título Alternativa\n", + /*172*/ "Empezar Desafío\n", + /*173*/ "Investigación dataDyne", + /*174*/ "Error\n", + /*175*/ "El Controller Pak\nha sido quitado.\n", + /*176*/ "Intentar Reparación\n", + /*177*/ "¿Quieres intentar\nreparar este\nController Pak?\n", + /*178*/ "¡Puedes perder datos!\n", + /*179*/ "Cancelar\n", + /*180*/ "Reparar\n", + /*181*/ "Reparado con Éxito\n", + /*182*/ "El Controller Pak ha\nsido reparado.\n", + /*183*/ "Reparación Fallada\n", + /*184*/ "El Controller Pak \nno puede ser reparado.\nNo podrás cargar o\nguardar en este\nController Pak.\n", + /*185*/ "Hándicap Jugador\n", + /*186*/ "BOTONES L/R: ", + /*187*/ "BOTÓN C ARRIBA: ", + /*188*/ "BOTONES C I./D.: ", + /*189*/ "BOTÓN C ABAJO: ", + /*190*/ "BOTÓN A: ", + /*191*/ "BOTÓN B: ", + /*192*/ "STICK C.: ", + /*193*/ "BÓTON Z: ", + /*194*/ "+ PANEL C.: ", + /*195*/ "APUNTAR", + /*196*/ "CAMBIAR A PUNTAR", + /*197*/ "MIRAR ARRIBA", + /*198*/ "MIRAR ABAJO", + /*199*/ "MIRAR ABAJO", + /*200*/ "MIRAR ARRIBA", + /*201*/ "ADELANTE", + /*202*/ "ATRÁS", + /*203*/ "DESP. LATERAL", + /*204*/ "ARMA", + /*205*/ "ACCIÓN/RECARGA", + /*206*/ "DISPARO", + /*207*/ "CAMINAR/VOLVER", + /*208*/ "MIRAR", + /*209*/ "CAMINAR/DESP.", + /*210*/ "MIRAR/DESP.", + /*211*/ "COMO BOTONES C", + /*212*/ "Mando 1:", + /*213*/ "Mando 2:", + /*214*/ "Estilo de Control %s %s\n", + /*215*/ "(1 Mando)", + /*216*/ "(2 Mandos)", + /*217*/ "Mantén Arma para el menú rápido.\nMantén Acción para cambiar función.\nAcción+Disparo cambia temp. la función.\nApuntar aporta una mayor precisión.\nApuntar + Botón C Abajo te agacha.\nApuntar + Botón C Arriba te levanta.\n", + /*218*/ "Desactiva todos los Trucos\n", + /*219*/ "Filtro de Lenguaje\n", + /*220*/ "USUARIO:\n", + /*221*/ "CLAVE:\n", + /*222*/ "Oscuridad Perfecta\n", + /*223*/ "Elige Opciones:\n", + /*224*/ "Vel. de Reacción Enemiga:\n", + /*225*/ "Salud del Enemigo:\n", + /*226*/ "Daño del Enemigo:\n", + /*227*/ "Precisión del Enemigo:\n", + /*228*/ "Aceptar\n", + /*229*/ "Cancelar\n", + /*230*/ "Controller Pak No Encontrado\n", + /*231*/ "Nombre:\n", + /*232*/ "Lugar:\n", + /*233*/ "Nombre Duplicado\n", + /*234*/ "ya tiene\n", + /*235*/ "un fichero nombrado\n", + /*236*/ "Renombrar Fichero\n", + /*237*/ "Cambiar Lugar\n", + /*238*/ "Cancelar\n", + /*239*/ "Cambiar Nombre\n", + /*240*/ "Introduce nuevo nombre:\n", + /*241*/ "El fichero que estás copiando\nno puede ser borrado.\n", + /*242*/ "SimShock:%d\n", + /*243*/ "Tiempo Requerido:\n", + /*244*/ "¡Nuevo Truco Disponible!:\n", + /*245*/ "Continuar\n", + /*246*/ "Volver a Jugar el Nivel\n", + /*247*/ "Guardar Jugador\n", + /*248*/ "¿Guardar nuevo jugador\ny estadísticas?\n", + /*249*/ "Guardar Ahora\n", + /*250*/ "¡No, Gracias!\n", + /*251*/ "Confirmar nombre:\n", + /*252*/ "El fichero guardado ha\nsido borrado debido\na datos corruptos\no dañados.\n", + /*253*/ "Continuar\n", + /*254*/ "Error\n", + /*255*/ "No se puede acceder al Cartucho de GB.\nComprueba las conexiones y asegúrate\nde que estás usando el cartucho de\nGame Boy correcto.\n", + /*256*/ "Cancelar\n", + /*257*/ "Error\n", + /*258*/ "Los datos guardados\n", + /*259*/ "han sido borrados\n", + /*260*/ "porque estaban dañados.\n", + /*261*/ "Cancelar\n", + /*262*/ "Elige tu idioma:\n", + /*263*/ "Inglés\n", + /*264*/ "Francés\n", + /*265*/ "Alemán\n", + /*266*/ "Italiano\n", + /*267*/ "Español\n", + /*268*/ "I. Americano\n", + /*269*/ "Idioma:\n", + /*270*/ "Idioma\n", + /*271*/ "Estilo C.\n", + /*272*/ "C. Opuesto\n", + /*273*/ "M. Frente\n", + /*274*/ "G. Cabeza\n", + /*275*/ "Auto-Apun.\n", + /*276*/ "C. Apuntar\n", + /*277*/ "Mant.\n", + /*278*/ "Camb.\n", + /*279*/ "Subt. Escenas\n", + /*280*/ "Subt. Juego\n", + /*281*/ NULL, + /*282*/ NULL, + /*283*/ NULL, +}; diff --git a/src/files/lang/pal-final/oatE.c b/src/files/lang/pal-final/oatE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oatJ.c b/src/files/lang/pal-final/oatJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oatP.c b/src/files/lang/pal-final/oatP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oatP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_f.c b/src/files/lang/pal-final/oat_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_g.c b/src/files/lang/pal-final/oat_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_i.c b/src/files/lang/pal-final/oat_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oat_str_s.c b/src/files/lang/pal-final/oat_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oat_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldE.c b/src/files/lang/pal-final/oldE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldJ.c b/src/files/lang/pal-final/oldJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/oldP.c b/src/files/lang/pal-final/oldP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/oldP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_f.c b/src/files/lang/pal-final/old_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_g.c b/src/files/lang/pal-final/old_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_i.c b/src/files/lang/pal-final/old_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/old_str_s.c b/src/files/lang/pal-final/old_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/old_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/optionsE.c b/src/files/lang/pal-final/optionsE.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/pal-final/optionsE.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/optionsJ.c b/src/files/lang/pal-final/optionsJ.c new file mode 100644 index 000000000..4ed3c13c7 --- /dev/null +++ b/src/files/lang/pal-final/optionsJ.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " pre-history", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Purple\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trenchcoat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wetsuit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "DataDyne Shock Trooper\n", + /* 37*/ "DataDyne Female Guard\n", + /* 38*/ "DataDyne Security\n", + /* 39*/ "DataDyne Guard\n", + /* 40*/ "DataDyne Guard 2\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "DataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "Stripes\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "DataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "No controller in controller socket 1", + /* 72*/ "Please power off and attach a controller", + /* 73*/ "DETECTED\n", + /* 74*/ "NOT DETECTED\n", + /* 75*/ "tm\n", + /* 76*/ "N64 EXPANSION PAK\nNintendo 64 Product Identification\n", + /* 77*/ "Product ID:\n", + /* 78*/ "Product Code:\n", + /* 79*/ "Variant:\n", + /* 80*/ "Developer:\n", + /* 81*/ "Perfect Dark\n", + /* 82*/ "NUS-NPDE-USA\n", + /* 83*/ "NTSC version 4.4 beta\n", + /* 84*/ "Rare Ltd. (twycross)\n", + /* 85*/ "Copyright Rare Ltd. 2000\n", + /* 86*/ "Perfect Dark and PerfectHead are trademarks of Rare Ltd.\n", + /* 87*/ "Presented in\nDolby Surround\n", + /* 88*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\n", + /* 89*/ "MPEG Layer-3 playback supplied with the Miles Sound System from\n", + /* 90*/ "RAD Game Tools, Inc. MPEG Layer-3 audio compression technology\n", + /* 91*/ "licensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 92*/ "rare designs on the future <<<\n", + /* 93*/ "Perfect Dark\n", + /* 94*/ "JAP Your Reality\n", + /* 95*/ "New...\n", + /* 96*/ "New Agent...\n", + /* 97*/ "Game Files\n", + /* 98*/ "Copy:\n", + /* 99*/ "Delete:\n", + /*100*/ "Delete Game Notes...\n", + /*101*/ "Single Player Files\n", + /*102*/ "MultiPlayer Game Files\n", + /*103*/ "MultiPlayer Player Files\n", + /*104*/ "PerfectHead Files\n", + /*105*/ "Controller Pak Game Notes Editor\n", + /*106*/ "Use this editor to delete game notes\nfrom your controller paks.\n", + /*107*/ "Choose Controller Pak to Edit:\n", + /*108*/ "Exit\n", + /*109*/ "Game Pak\n", + /*110*/ "Controller Pak 1\n", + /*111*/ "Controller Pak 2\n", + /*112*/ "Controller Pak 3\n", + /*113*/ "Controller Pak 4\n", + /*114*/ "Perfect Menu\n", + /*115*/ "Solo Missions\n", + /*116*/ "Combat Simulator\n", + /*117*/ "Co-Operative\n", + /*118*/ "Counter-Operative\n", + /*119*/ "Cinema\n", + /*120*/ "Mission Select\n", + /*121*/ "Mission 1\n", + /*122*/ "Mission 2\n", + /*123*/ "Mission 3\n", + /*124*/ "Mission 4\n", + /*125*/ "Mission 5\n", + /*126*/ "Mission 6\n", + /*127*/ "Mission 7\n", + /*128*/ "Mission 8\n", + /*129*/ "Mission 9\n", + /*130*/ "Special Assignments\n", + /*131*/ "dataDyne Central", + /*132*/ "- Defection", + /*133*/ "dataDyne Research", + /*134*/ "- Investigation", + /*135*/ "dataDyne Central", + /*136*/ "- Extraction", + /*137*/ "Carrington Villa", + /*138*/ "- Hostage One", + /*139*/ "Chicago", + /*140*/ "- Stealth", + /*141*/ "G5 Building", + /*142*/ "- Reconnaissance", + /*143*/ "Area 51", + /*144*/ "- Infiltration", + /*145*/ "Area 51", + /*146*/ "- Rescue", + /*147*/ "Area 51", + /*148*/ "- Escape", + /*149*/ "Air Base", + /*150*/ "- Espionage", + /*151*/ "Air Force One", + /*152*/ "- Anti-Terrorism", + /*153*/ "Crash Site", + /*154*/ "- Confrontation", + /*155*/ "Pelagic II", + /*156*/ "- Exploration", + /*157*/ "Deep Sea", + /*158*/ "- Nullify Threat", + /*159*/ "Carrington Institute", + /*160*/ "- Defense", + /*161*/ "Attack Ship", + /*162*/ "- Covert Assault", + /*163*/ "Skedar Ruins", + /*164*/ "- Battle Shrine", + /*165*/ "Mr. Blonde's Revenge", + /*166*/ "Maian SOS", + /*167*/ "Retaking the Institute", + /*168*/ "WAR!", + /*169*/ "The Duel", + /*170*/ "Mission Status\n", + /*171*/ "Abort!\n", + /*172*/ "Warning\n", + /*173*/ "Do you want to abort the mission?\n", + /*174*/ "Cancel\n", + /*175*/ "Abort\n", + /*176*/ "Inventory\n", + /*177*/ "Weapons Available\n", + /*178*/ "Options\n", + /*179*/ "Audio\n", + /*180*/ "Video\n", + /*181*/ "Control\n", + /*182*/ "Display\n", + /*183*/ "Cheats\n", + /*184*/ "Save Game\n", + /*185*/ "Change Agent...\n", + /*186*/ "Warning\n", + /*187*/ "Do you want to load another agent?\n", + /*188*/ "Yes\n", + /*189*/ "No\n", + /*190*/ "Control Options\n", + /*191*/ "Control Player 2\n", + /*192*/ "Control Style\n", + /*193*/ "Reverse Pitch\n", + /*194*/ "Look Ahead\n", + /*195*/ "Head Roll\n", + /*196*/ "Auto-Aim\n", + /*197*/ "Aim Control\n", + /*198*/ "Back\n", + /*199*/ "Hold\n", + /*200*/ "Toggle\n", + /*201*/ "Display Options\n", + /*202*/ "Display Player 2\n", + /*203*/ "Sight On Screen\n", + /*204*/ "Always Show Target\n", + /*205*/ "Show Zoom Range\n", + /*206*/ "Ammo On Screen\n", + /*207*/ "Show Gun Function\n", + /*208*/ "Paintball\n", + /*209*/ "Subtitles\n", + /*210*/ "Show Mission Time\n", + /*211*/ "Back\n", + /*212*/ "Video Options\n", + /*213*/ "Screen Size\n", + /*214*/ "Ratio\n", + /*215*/ "Hi Res\n", + /*216*/ "2-Player Screen Split\n", + /*217*/ "Back\n", + /*218*/ "Full\n", + /*219*/ "Wide\n", + /*220*/ "Cinema\n", + /*221*/ "Normal\n", + /*222*/ "16:9\n", + /*223*/ "Horizontal\n", + /*224*/ "Vertical\n", + /*225*/ "Audio Options\n", + /*226*/ "Sound\n", + /*227*/ "Music\n", + /*228*/ "Sound Mode\n", + /*229*/ "Back\n", + /*230*/ "Mono", + /*231*/ "Stereo", + /*232*/ "Headphone", + /*233*/ "Surround", + /*234*/ "Control\n", + /*235*/ "Single\n", + /*236*/ "Double\n", + /*237*/ "1.1\n", + /*238*/ "1.2\n", + /*239*/ "1.3\n", + /*240*/ "1.4\n", + /*241*/ "2.1\n", + /*242*/ "2.2\n", + /*243*/ "2.3\n", + /*244*/ "2.4\n", + /*245*/ "Briefing\n", + /*246*/ "Select Difficulty\n", + /*247*/ "Difficulty\n", + /*248*/ "Best Time\n", + /*249*/ "Agent\n", + /*250*/ "Special Agent\n", + /*251*/ "Perfect Agent\n", + /*252*/ "Cancel\n", + /*253*/ "Co-Operative Options\n", + /*254*/ "Radar On\n", + /*255*/ "Friendly Fire\n", + /*256*/ "Perfect Buddy\n", + /*257*/ "Continue\n", + /*258*/ "Cancel\n", + /*259*/ "Human", + /*260*/ "1 Sim", + /*261*/ "2 Sims", + /*262*/ "3 Sims", + /*263*/ "4 Sims", + /*264*/ "Counter-Operative Options\n", + /*265*/ "Radar On\n", + /*266*/ "Counter-Operative\n", + /*267*/ "Continue\n", + /*268*/ "Cancel\n", + /*269*/ "Player 1", + /*270*/ "Player 2", + /*271*/ "Mission Overview\n", + /*272*/ "Accept\n", + /*273*/ "Decline\n", + /*274*/ "Mission Completed\n", + /*275*/ "Mission Failed\n", + /*276*/ "Mission Status:\n", + /*277*/ "Agent Status:\n", + /*278*/ "Mission Time:\n", + /*279*/ "Weapon of Choice:\n", + /*280*/ "Kills:\n", + /*281*/ "Accuracy:\n", + /*282*/ "Shot Total:\n", + /*283*/ " Head Shots:\n", + /*284*/ " Body Shots:\n", + /*285*/ " Limb Shots:\n", + /*286*/ " Others:\n", + /*287*/ "Press Start\n", + /*288*/ "Deceased\n", + /*289*/ "Active\n", + /*290*/ "Disavowed\n", + /*291*/ "Failed\n", + /*292*/ "Completed\n", + /*293*/ "Aborted\n", + /*294*/ "Retry Mission\n", + /*295*/ "Next Mission\n", + /*296*/ "Accept\n", + /*297*/ "Decline\n", + /*298*/ "Objectives\n", + /*299*/ "Press Start\n", + /*300*/ "Small but Perfect Menu\n", + /*301*/ "Combat Simulator\n", + /*302*/ "Training\n", + /*303*/ "Audio/Video\n", + /*304*/ "Change Agent\n", + /*305*/ "Audio/Visual\n", + /*306*/ "Sound\n", + /*307*/ "Music\n", + /*308*/ "Sound Mode\n", + /*309*/ "Ratio\n", + /*310*/ "Back\n", + /*311*/ "< Empty >\n", + /*312*/ "DEL", + /*313*/ "CAPS", + /*314*/ "CANCEL", + /*315*/ "OK", + /*316*/ "Combat Simulator Heads\n", + /*317*/ "Mission Heads\n", + /*318*/ "Error\n", + /*319*/ "Cancel\n", + /*320*/ "The pak was not found.\n", + /*321*/ "File was not saved.\n", + /*322*/ "File would not load.\n", + /*323*/ "Could not delete the file.\n", + /*324*/ "Out of Memory.\n", + /*325*/ "This player is already\nloaded for this game.\n", + /*326*/ "Pak has been removed\n", + /*327*/ "Pak is damaged or incorrectly inserted\n", + /*328*/ "Game Note Delete Failed\n", + /*329*/ "Error Loading Game\n", + /*330*/ "Error Saving Game\n", + /*331*/ "Error Loading Player\n", + /*332*/ "Error Saving Player\n", + /*333*/ "Error Loading PerfectHead\n", + /*334*/ "Error Saving PerfectHead\n", + /*335*/ "Error Reading File\n", + /*336*/ "Error Writing File\n", + /*337*/ "Error\n", + /*338*/ "Delete Failed\n", + /*339*/ "Could not delete the file.\n", + /*340*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*341*/ "Cancel\n", + /*342*/ "There is no space.\n", + /*343*/ "Cool!\n", + /*344*/ "File Saved.\n", + /*345*/ "OK\n", + /*346*/ "An error occured while\ntrying to save.\n", + /*347*/ "Try Again\n", + /*348*/ "Save Elsewhere\n", + /*349*/ "Cancel\n", + /*350*/ "An error occured while\ntrying to load.\n", + /*351*/ "Try Again\n", + /*352*/ "Cancel\n", + /*353*/ "Need Space For Head\n", + /*354*/ "Choose a head to load over:\n", + /*355*/ "OK\n", + /*356*/ "Cancel\n", + /*357*/ "Save\n", + /*358*/ "Would you like to save\nyour file elsewhere?\n", + /*359*/ "Yes\n", + /*360*/ "No\n", + /*361*/ "Please insert the pak\ncontaining your file\n", + /*362*/ "Please insert the pak\nyou are saving to\n", + /*363*/ "OK\n", + /*364*/ "Cancel\n", + /*365*/ "Select Location\n", + /*366*/ "Where\n", + /*367*/ "Spaces\n", + /*368*/ "Delete Files...\n", + /*369*/ "Cancel\n", + /*370*/ "Full", + /*371*/ "Copy File\n", + /*372*/ "Select a file to copy:\n", + /*373*/ "Push to Exit\n", + /*374*/ "Delete File\n", + /*375*/ "Select a file to delete:\n", + /*376*/ "Push to Exit\n", + /*377*/ "Warning\n", + /*378*/ "Are you sure you want\nto delete this file?\n", + /*379*/ "Cancel\n", + /*380*/ "OK\n", + /*381*/ "Delete Game Note\n", + /*382*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*383*/ "No\n", + /*384*/ "Yes\n", + /*385*/ "Game Notes\n", + /*386*/ "Delete Game Notes:\n", + /*387*/ "Note\n", + /*388*/ "Pages\n", + /*389*/ "Push to Exit\n", + /*390*/ "Empty\n", + /*391*/ "--\n", + /*392*/ "Pages Free: \n", + /*393*/ "Pages Free: %d\n", + /*394*/ "Pages Used: \n", + /*395*/ "Pages Used: %d\n", + /*396*/ "Perfect Dark Save already exists on this pak\n", + /*397*/ "There is enough space for perfect dark saves\n", + /*398*/ "Perfect Dark Requires %d More Notes\n", + /*399*/ "Enter Agent Name\n", + /*400*/ "New...\n", + /*401*/ "New Agent...\n", + /*402*/ "New Recruit", + /*403*/ "Mission Time:", + /*404*/ "Challenge 1", + /*405*/ "Challenge 2", + /*406*/ "Challenge 3", + /*407*/ "Challenge 4", + /*408*/ "Challenge 5", + /*409*/ "Challenge 6", + /*410*/ "Challenge 7", + /*411*/ "Challenge 8", + /*412*/ "Challenge 9", + /*413*/ "Challenge 10", + /*414*/ "Challenge 11", + /*415*/ "Challenge 12", + /*416*/ "Challenge 13", + /*417*/ "Challenge 14", + /*418*/ "Challenge 15", + /*419*/ "Challenge 16", + /*420*/ "Challenge 17", + /*421*/ "Challenge 18", + /*422*/ "Challenge 19", + /*423*/ "Challenge 20", + /*424*/ "Challenge 21", + /*425*/ "Challenge 22", + /*426*/ "Challenge 23", + /*427*/ "Challenge 24", + /*428*/ "Challenge 25", + /*429*/ "Challenge 26", + /*430*/ "Challenge 27", + /*431*/ "Challenge 28", + /*432*/ "Challenge 29", + /*433*/ "Challenge 30", + /*434*/ "Special\n", + /*435*/ "Intro\n", + /*436*/ "Mission 1\n", + /*437*/ "Mission 2\n", + /*438*/ "Mission 3\n", + /*439*/ "Mission 4\n", + /*440*/ "Mission 5\n", + /*441*/ "Mission 6\n", + /*442*/ "Mission 7\n", + /*443*/ "Mission 8\n", + /*444*/ "Mission 9\n", + /*445*/ "Finale\n", + /*446*/ "Play All\n", + /*447*/ "Intro\n", + /*448*/ "1:1 Intro\n", + /*449*/ "1:1 Outro\n", + /*450*/ "1:2 Intro\n", + /*451*/ "1:2 Outro\n", + /*452*/ "1:3 Intro\n", + /*453*/ "1:3 Outro\n", + /*454*/ "2:1 Intro\n", + /*455*/ "2:1 Intro 2\n", + /*456*/ "2:1 Outro\n", + /*457*/ "3:1 Intro\n", + /*458*/ "3:1 Outro\n", + /*459*/ "3:2 Intro\n", + /*460*/ "3:2 Special\n", + /*461*/ "3:2 Outro\n", + /*462*/ "4:1 Intro\n", + /*463*/ "4:1 Outro\n", + /*464*/ "4:2 Intro\n", + /*465*/ "4:2 Outro\n", + /*466*/ "4:3 Intro\n", + /*467*/ "4:3 Special\n", + /*468*/ "4:3 Outro\n", + /*469*/ "5:1 Intro\n", + /*470*/ "5:1 Outro\n", + /*471*/ "5:2 Intro\n", + /*472*/ "5:2 Special\n", + /*473*/ "5:2 Outro\n", + /*474*/ "5:3 Intro\n", + /*475*/ "5:3 Outro\n", + /*476*/ "6:1 Intro\n", + /*477*/ "6:1 Outro\n", + /*478*/ "6:2 Intro\n", + /*479*/ "6:2 Special\n", + /*480*/ "6:2 Outro\n", + /*481*/ "7:1 Intro\n", + /*482*/ "7:1 Outro\n", + /*483*/ "8:1 Intro\n", + /*484*/ "8:1 Outro\n", + /*485*/ "9:1 Intro\n", + /*486*/ "9:1 Outro\n", + /*487*/ "End Sequence\n", + /*488*/ "Cinema\n", + /*489*/ "cloak %d", + /*490*/ "Pick Target\n", + /*491*/ "Kills Score\n", + /*492*/ NULL, + /*493*/ NULL, + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/optionsP.c b/src/files/lang/pal-final/optionsP.c new file mode 100644 index 000000000..5395c7e03 --- /dev/null +++ b/src/files/lang/pal-final/optionsP.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Complete\n", + /* 1*/ "Incomplete\n", + /* 2*/ "Failed\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "earth:", + /* 6*/ " prehistory", + /* 7*/ "rare presents", + /* 8*/ "Red\n", + /* 9*/ "Yellow\n", + /* 10*/ "Blue\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Brown\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna Trench Coat\n", + /* 18*/ "Joanna Party Frock\n", + /* 19*/ "Joanna Frock (Ripped)\n", + /* 20*/ "Joanna Stewardess\n", + /* 21*/ "Joanna Wet Suit\n", + /* 22*/ "Joanna Aqualung\n", + /* 23*/ "Joanna Arctic\n", + /* 24*/ "Joanna Lab Tech.\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington Evening Wear\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI Male Lab Technician\n", + /* 34*/ "CI Female Lab Technician\n", + /* 35*/ "CI Soldier\n", + /* 36*/ "dataDyne Shock Trooper\n", + /* 37*/ "dataDyne Female Guard\n", + /* 38*/ "dataDyne Security\n", + /* 39*/ "dataDyne Infantry\n", + /* 40*/ "dataDyne Trooper\n", + /* 41*/ "Secretary\n", + /* 42*/ "Office Suit\n", + /* 43*/ "Office Casual\n", + /* 44*/ "Negotiator\n", + /* 45*/ "dataDyne Sniper\n", + /* 46*/ "G5 Guard\n", + /* 47*/ "G5 SWAT Guard\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Guard\n", + /* 51*/ "Area 51 Trooper\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Male Lab Technician\n", + /* 56*/ "Female Lab Technician\n", + /* 57*/ "dataDyne Lab Technician\n", + /* 58*/ "Biotechnician\n", + /* 59*/ "Alaskan Guard\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Head Stewardess\n", + /* 64*/ "The President\n", + /* 65*/ "NSA Lackey\n", + /* 66*/ "Presidential Security\n", + /* 67*/ "President\"s Clone\n", + /* 68*/ "Pelagic II Guard\n", + /* 69*/ "Maian Soldier\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- no controller in controller socket 1 -", + /* 72*/ "please power off and attach a controller", + /* 73*/ "DETECTED", + /* 74*/ "NOT DETECTED", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choose Your Reality\n", + /* 97*/ "New...\n", + /* 98*/ "New Agent...\n", + /* 99*/ "Game Files\n", + /*100*/ "Copy:\n", + /*101*/ "Delete:\n", + /*102*/ "Delete Game Notes...\n", + /*103*/ "Single Player Agent File\n", + /*104*/ "Combat Simulator Settings File\n", + /*105*/ "Combat Simulator Player File\n", + /*106*/ "PerfectHead Files\n", + /*107*/ "Controller Pak Menu\n", + /*108*/ "Use this menu to delete game notes\nfrom your Controller Paks.\n", + /*109*/ "Choose Controller Pak to Edit:\n", + /*110*/ "Exit\n", + /*111*/ "Game Pak\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menu\n", + /*117*/ "Solo Missions\n", + /*118*/ "Combat Simulator\n", + /*119*/ "Co-Operative\n", + /*120*/ "Counter-Operative\n", + /*121*/ "Cinema\n", + /*122*/ "Mission Select\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Special Assignments\n", + /*133*/ "dataDyne Central", + /*134*/ "- Defection", + /*135*/ "dataDyne Research", + /*136*/ "- Investigation", + /*137*/ "dataDyne Central", + /*138*/ "- Extraction", + /*139*/ "Carrington Villa", + /*140*/ "- Hostage One", + /*141*/ "Chicago", + /*142*/ "- Stealth", + /*143*/ "G5 Building", + /*144*/ "- Reconnaissance", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rescue", + /*149*/ "Area 51", + /*150*/ "- Escape", + /*151*/ "Air Base", + /*152*/ "- Espionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorism", + /*155*/ "Crash Site", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Deep Sea", + /*160*/ "- Nullify Threat", + /*161*/ "Carrington Institute", + /*162*/ "- Defense", + /*163*/ "Attack Ship", + /*164*/ "- Covert Assault", + /*165*/ "Skedar Ruins", + /*166*/ "- Battle Shrine", + /*167*/ "Mr. Blonde's Revenge", + /*168*/ "Maian SOS", + /*169*/ "Retaking the Institute", + /*170*/ "WAR!", + /*171*/ "The Duel", + /*172*/ "Status\n", + /*173*/ "Abort!\n", + /*174*/ "Warning\n", + /*175*/ "Do you want to abort the mission?\n", + /*176*/ "Cancel\n", + /*177*/ "Abort\n", + /*178*/ "Inventory\n", + /*179*/ "Weapons Available\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Control\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Save Game\n", + /*187*/ "Change Agent...\n", + /*188*/ "Warning\n", + /*189*/ "Do you want to load another agent?\n", + /*190*/ "Yes\n", + /*191*/ "No\n", + /*192*/ "Control Options\n", + /*193*/ "Control Player 2\n", + /*194*/ "Control Style\n", + /*195*/ "Reverse Pitch\n", + /*196*/ "Look Ahead\n", + /*197*/ "Head Roll\n", + /*198*/ "Auto-Aim\n", + /*199*/ "Aim Control\n", + /*200*/ "Back\n", + /*201*/ "Hold\n", + /*202*/ "Toggle\n", + /*203*/ "Display Options\n", + /*204*/ "Display Player 2\n", + /*205*/ "Sight on Screen\n", + /*206*/ "Always Show Target\n", + /*207*/ "Show Zoom Range\n", + /*208*/ "Ammo on Screen\n", + /*209*/ "Show Gun Function\n", + /*210*/ "Paintball\n", + /*211*/ "Subtitles\n", + /*212*/ "Show Mission Time\n", + /*213*/ "Back\n", + /*214*/ "Video Options\n", + /*215*/ "Screen Size\n", + /*216*/ "Ratio\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Player Screen Split\n", + /*219*/ "Back\n", + /*220*/ "Full\n", + /*221*/ "Wide\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Audio Options\n", + /*228*/ "Sound\n", + /*229*/ "Music\n", + /*230*/ "Sound Mode\n", + /*231*/ "Back\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Headphone", + /*235*/ "Surround", + /*236*/ "Control\n", + /*237*/ "Single\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Select Difficulty\n", + /*249*/ "Difficulty\n", + /*250*/ "Best Time\n", + /*251*/ "Agent\n", + /*252*/ "Special Agent\n", + /*253*/ "Perfect Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Co-Operative Options\n", + /*256*/ "Radar On\n", + /*257*/ "Friendly Fire\n", + /*258*/ "Perfect Buddy\n", + /*259*/ "Continue\n", + /*260*/ "Cancel\n", + /*261*/ "Human", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Counter-Operative Options\n", + /*267*/ "Radar On\n", + /*268*/ "Counter-Operative\n", + /*269*/ "Continue\n", + /*270*/ "Cancel\n", + /*271*/ "Player 1", + /*272*/ "Player 2", + /*273*/ "Overview\n", + /*274*/ "Accept\n", + /*275*/ "Decline\n", + /*276*/ "Completed\n", + /*277*/ "Failed\n", + /*278*/ "Mission Status:\n", + /*279*/ "Agent Status:\n", + /*280*/ "Mission Time:\n", + /*281*/ "Weapon of Choice:\n", + /*282*/ "Kills:\n", + /*283*/ "Accuracy:\n", + /*284*/ "Shot Total:\n", + /*285*/ " Head Shots:\n", + /*286*/ " Body Shots:\n", + /*287*/ " Limb Shots:\n", + /*288*/ " Others:\n", + /*289*/ "Press START\n", + /*290*/ "Deceased\n", + /*291*/ "Active\n", + /*292*/ "Disavowed\n", + /*293*/ "Failed\n", + /*294*/ "Completed\n", + /*295*/ "Aborted\n", + /*296*/ "Retry", + /*297*/ "Next Mission", + /*298*/ "Accept\n", + /*299*/ "Decline\n", + /*300*/ "Objectives\n", + /*301*/ "Press START\n", + /*302*/ "Small but Perfect Menu\n", + /*303*/ "Combat Simulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Change Agent\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sound\n", + /*309*/ "Music\n", + /*310*/ "Sound Mode\n", + /*311*/ "Ratio\n", + /*312*/ "Back\n", + /*313*/ "< Empty >\n", + /*314*/ "DEL", + /*315*/ "CAPS", + /*316*/ "CANCEL", + /*317*/ "OK", + /*318*/ "Combat Simulator Heads\n", + /*319*/ "Mission Heads\n", + /*320*/ "Error\n", + /*321*/ "Cancel\n", + /*322*/ "The Controller Pak\nwas not found\nin any controller.\n", + /*323*/ "File was not saved.\n", + /*324*/ "File would not load.\n", + /*325*/ "Could not delete the file.\n", + /*326*/ "Out of memory.\n", + /*327*/ "This player is already\nloaded for this game.\n", + /*328*/ "has been removed.\n", + /*329*/ "Controller Pak is damaged or incorrectly inserted.\n", + /*330*/ "Game note delete failed.\n", + /*331*/ "Error Loading Game\n", + /*332*/ "Error Saving Game\n", + /*333*/ "Error Loading Player\n", + /*334*/ "Error Saving Player\n", + /*335*/ "Error Loading PerfectHead\n", + /*336*/ "Error Saving PerfectHead\n", + /*337*/ "Error Reading File\n", + /*338*/ "Error Writing File\n", + /*339*/ "Error\n", + /*340*/ "Delete Failed\n", + /*341*/ "Could not delete the file.\n", + /*342*/ "- Check that the Controller Pak is\ninserted correctly.\n", + /*343*/ "Cancel\n", + /*344*/ "There is no space.\n", + /*345*/ "Cool!\n", + /*346*/ "File Saved.\n", + /*347*/ "OK\n", + /*348*/ "An error occurred while\ntrying to save.\n", + /*349*/ "Try Again\n", + /*350*/ "Save Elsewhere\n", + /*351*/ "Cancel\n", + /*352*/ "An error occurred while\ntrying to load.\n", + /*353*/ "Try Again\n", + /*354*/ "Cancel\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Save\n", + /*360*/ "Would you like to save\nyour file elsewhere?\n", + /*361*/ "Yes\n", + /*362*/ "No\n", + /*363*/ "Please insert the Controller Pak containing your %s into any controller.\n", + /*364*/ "Please insert the\nController Pak\nyou are saving to\ninto any controller.\n", + /*365*/ "OK\n", + /*366*/ "Cancel\n", + /*367*/ "Select Location\n", + /*368*/ "Where\n", + /*369*/ "Spaces\n", + /*370*/ "Delete Files...\n", + /*371*/ "Cancel\n", + /*372*/ "Full", + /*373*/ "Copy File\n", + /*374*/ "Select a file to copy:\n", + /*375*/ "Press B Button to exit.\n", + /*376*/ "Delete File\n", + /*377*/ "Select a file to delete:\n", + /*378*/ "Press B Button to exit.\n", + /*379*/ "Warning\n", + /*380*/ "Are you sure you want\nto delete this file?\n", + /*381*/ "Cancel\n", + /*382*/ "OK\n", + /*383*/ "Delete Game Note\n", + /*384*/ "Are you sure you\nwant to delete\nthis game note?\n", + /*385*/ "No\n", + /*386*/ "Yes\n", + /*387*/ "Game Notes\n", + /*388*/ "Delete Game Notes:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Press the B Button to exit.\n", + /*392*/ "Empty\n", + /*393*/ "--\n", + /*394*/ "Pages Free: \n", + /*395*/ "Pages Free: %d\n", + /*396*/ "Pages Used: \n", + /*397*/ "Pages Used: %d\n", + /*398*/ "Perfect Dark note already exists\non this Controller Pak.\n", + /*399*/ "There is enough space for\nPerfect Dark note.\n", + /*400*/ "Controller Pak is too full to save note- 1 note\nand 28 pages required to save to Controller Pak.\n", + /*401*/ "Enter Agent Name\n", + /*402*/ "New...\n", + /*403*/ "New Agent...\n", + /*404*/ "New Recruit", + /*405*/ "Mission Time:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Central\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5 Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institute\n", + /*445*/ "Mission 8 - Skedar Attack Ship\n", + /*446*/ "Mission 9 - Skedar Ruins\n", + /*447*/ "Finale\n", + /*448*/ "Play All\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Enter The Dark\n", + /*451*/ "1:1 Outro - Quick Descent\n", + /*452*/ "1:2 Intro - Going Down\n", + /*453*/ "1:2 Outro - Meet The Doctor\n", + /*454*/ "1:3 Intro - Lights Out\n", + /*455*/ "1:3 Outro - Going Somewhere?\n", + /*456*/ "2:1 Intro - Negotiate This!\n", + /*457*/ "2:1 Intro 2 - Life On The Line\n", + /*458*/ "2:1 Outro - Carrington Rescued\n", + /*459*/ "3:1 Intro - Dark Alley\n", + /*460*/ "3:1 Outro - G5 Penetrated\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Special - Conspiracy\n", + /*463*/ "3:2 Outro - Fire Escape\n", + /*464*/ "4:1 Intro - Video Nasty\n", + /*465*/ "4:1 Outro - Loose Ends\n", + /*466*/ "4:2 Intro - Pearls Of Wisdom\n", + /*467*/ "4:2 Outro - Under The Knife\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Elvis Wakes Up\n", + /*470*/ "4:3 Outro - Escape\n", + /*471*/ "5:1 Intro - High Altitude\n", + /*472*/ "5:1 Outro - Takeoff\n", + /*473*/ "5:2 Intro - Last Chance\n", + /*474*/ "5:2 Special - Docking\n", + /*475*/ "5:2 Outro - Out Of Options\n", + /*476*/ "5:3 Intro - Red Horizons\n", + /*477*/ "5:3 Outro - Blonde Freak\n", + /*478*/ "6:1 Intro - Sneak On Board\n", + /*479*/ "6:1 Outro - Descent Into The Depths\n", + /*480*/ "6:2 Intro - Deeper Inside\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Pulling Out\n", + /*483*/ "7:1 Intro - Victory Salute\n", + /*484*/ "7:1 Outro - Dash For Freedom\n", + /*485*/ "8:1 Intro - Snatched!\n", + /*486*/ "8:1 Outro - Heading For Trouble\n", + /*487*/ "9:1 Intro - Air Of Calm\n", + /*488*/ "9:1 Outro - Gotcha!\n", + /*489*/ "End Sequence\n", + /*490*/ "Cinema\n", + /*491*/ "cloak %d\n", + /*492*/ "Pick Target\n", + /*493*/ "Kills Score\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_f.c b/src/files/lang/pal-final/options_str_f.c new file mode 100644 index 000000000..ae50a4297 --- /dev/null +++ b/src/files/lang/pal-final/options_str_f.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Succès\n", + /* 1*/ "Inachevé\n", + /* 2*/ "Echec\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terre:", + /* 6*/ " préhistoire", + /* 7*/ "rare présente", + /* 8*/ "Rouge\n", + /* 9*/ "Jaune\n", + /* 10*/ "Bleu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Rose\n", + /* 15*/ "Marron\n", + /* 16*/ "Joanna Combat\n", + /* 17*/ "Joanna imper\n", + /* 18*/ "Joanna Robe\n", + /* 19*/ "Joanna Robe courte\n", + /* 20*/ "Joanna Hôtesse\n", + /* 21*/ "Joanna Plongée\n", + /* 22*/ "Joanna Scaphandre\n", + /* 23*/ "Joanna Arctique\n", + /* 24*/ "Joanna Laborantin\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington smoking\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Technicien IC H\n", + /* 34*/ "Technicien IC F\n", + /* 35*/ "Soldat IC\n", + /* 36*/ "Commando dataDyne\n", + /* 37*/ "Femme Garde dataDyne\n", + /* 38*/ "Sécurité dataDyne\n", + /* 39*/ "Infanterie dataDyne\n", + /* 40*/ "Troupes dataDyne\n", + /* 41*/ "Secrétaire\n", + /* 42*/ "Tenue de Bureau\n", + /* 43*/ "Tenue de Bureau\n", + /* 44*/ "Négociateur\n", + /* 45*/ "Sniper dataDyne\n", + /* 46*/ "Garde G5\n", + /* 47*/ "Garde SWAT G5\n", + /* 48*/ "Agent CIA\n", + /* 49*/ "Agent FBI\n", + /* 50*/ "Garde Secteur 51\n", + /* 51*/ "Soldat Secteur 51\n", + /* 52*/ "Pilote\n", + /* 53*/ "Ensemble\n", + /* 54*/ "Garde du Corps NSA\n", + /* 55*/ "Technicien Homme\n", + /* 56*/ "Technicien Femme\n", + /* 57*/ "Technicien dataDyne\n", + /* 58*/ "Bio technicien\n", + /* 59*/ "Garde Alaska\n", + /* 60*/ "Pilote AF One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hôtesse\n", + /* 63*/ "Chef Hôtesse\n", + /* 64*/ "Le président\n", + /* 65*/ "Groom NSA\n", + /* 66*/ "Sécurité Président\n", + /* 67*/ "Clone Président\n", + /* 68*/ "Garde Pelagic II\n", + /* 69*/ "Soldat Maian\n", + /* 70*/ "Smoking\n", + /* 71*/ "- Pas de Manette branchée dans le port 1 -", + /* 72*/ "Eteindre et brancher une manette", + /* 73*/ "DETECTE", + /* 74*/ "NON DETECTE", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Identification Produit Nintendo 64\n", + /* 78*/ "ID Produit:\n", + /* 79*/ "Code Produit:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Développeur:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "NTSC version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "Le Logo Rareware et Perfect Dark sont des trademarks Rare Ltd.\n", + /* 88*/ "Présenté en Dolby Surround. Dolby et le double-D\nsont des trademarks des laboratoires Dolby.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Choisissez votre réalité\n", + /* 97*/ "Nouveau...\n", + /* 98*/ "Nouvel Agent...\n", + /* 99*/ "Fichier\n", + /*100*/ "Copier:\n", + /*101*/ "Effacer:\n", + /*102*/ "Effacer notes de jeu...\n", + /*103*/ "Fichier un joueur agent\n", + /*104*/ "Fichier paramètres simulateur combat\n", + /*105*/ "Fichier joueur simulateur combat\n", + /*106*/ "Fichier PerfcetHead\n", + /*107*/ "Controller Pak\n", + /*108*/ "Utiliser cet éditeur pour effacer les notes de jeu\nde votre Controller Pak.\n", + /*109*/ "Choisir le Controller Pak à éditer:\n", + /*110*/ "Sortie\n", + /*111*/ "Cartouche\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missions Solo\n", + /*118*/ "Simulateur de Combat\n", + /*119*/ "Coopératif\n", + /*120*/ "Contre-Opération\n", + /*121*/ "Cinéma\n", + /*122*/ "Sélection Mission\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Missions spéciales\n", + /*133*/ "Centre dataDyne", + /*134*/ "- Défection", + /*135*/ "Recherche dataDyne", + /*136*/ "- Enquête", + /*137*/ "Centre dataDyne", + /*138*/ "- Extraction", + /*139*/ "Villa Carrington", + /*140*/ "- Otage", + /*141*/ "Chicago", + /*142*/ "- Furtif", + /*143*/ "Immeuble G5", + /*144*/ "- Reconnaissance", + /*145*/ "Secteur 51", + /*146*/ "- Infiltration", + /*147*/ "Secteur 51", + /*148*/ "- Sauvetage", + /*149*/ "Secteur 51", + /*150*/ "- Fuite", + /*151*/ "Base Aérienne", + /*152*/ "- Espionnage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorisme", + /*155*/ "Site du Crash", + /*156*/ "- Confrontation", + /*157*/ "Pelagic II", + /*158*/ "- Exploration", + /*159*/ "Abysses", + /*160*/ "- Eliminer la menace", + /*161*/ "Institut Carrington", + /*162*/ "- Défense", + /*163*/ "Croiseur", + /*164*/ "- Assaut", + /*165*/ "Ruines Skedars", + /*166*/ "- Autel Combat", + /*167*/ "Blonde: la vengeance", + /*168*/ "SOS Maian", + /*169*/ "Sauver l'Institut", + /*170*/ "GUERRE!", + /*171*/ "Le Duel", + /*172*/ "Statut\n", + /*173*/ "Abandonner!\n", + /*174*/ "Attention\n", + /*175*/ "Voulez-vous abandonner la mission?\n", + /*176*/ "Annuler\n", + /*177*/ "Abandonner\n", + /*178*/ "Inventaire\n", + /*179*/ "Armes Disponibles\n", + /*180*/ "Options\n", + /*181*/ "Audio\n", + /*182*/ "Vidéo\n", + /*183*/ "Contrôle\n", + /*184*/ "Affichage\n", + /*185*/ "Triche\n", + /*186*/ "Sauvegarder jeu\n", + /*187*/ "Changer d'Agent...\n", + /*188*/ "Attention\n", + /*189*/ "Voulez charger un autre agent?\n", + /*190*/ "Oui\n", + /*191*/ "Non\n", + /*192*/ "Options de contrôle\n", + /*193*/ "Contrôle Joueur 2\n", + /*194*/ "Style de contrôle\n", + /*195*/ "Visée inversée\n", + /*196*/ "Regard tête\n", + /*197*/ "Vue tête\n", + /*198*/ "Auto-ciblage\n", + /*199*/ "Contrôle cible\n", + /*200*/ "Retour\n", + /*201*/ "Fixe\n", + /*202*/ "Alt.\n", + /*203*/ "Options d'affichage\n", + /*204*/ "Affichage Joueur 2\n", + /*205*/ "Visée sur écran\n", + /*206*/ "Toujours montrer cible\n", + /*207*/ "Montrer portée zoom\n", + /*208*/ "Munitions affichées\n", + /*209*/ "Montrer fonction arme\n", + /*210*/ "Paintball\n", + /*211*/ "Sous-titre\n", + /*212*/ "Afficher temps mission\n", + /*213*/ "Retour\n", + /*214*/ "Options Vidéo\n", + /*215*/ "Taille écran\n", + /*216*/ "Ratio\n", + /*217*/ "Haute-Res\n", + /*218*/ "Split écran 2 joueurs\n", + /*219*/ "Retour\n", + /*220*/ "Plein\n", + /*221*/ "Large\n", + /*222*/ "Cinéma\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Options Audio\n", + /*228*/ "Son\n", + /*229*/ "Musique\n", + /*230*/ "Mode Son\n", + /*231*/ "Retour\n", + /*232*/ "Mono", + /*233*/ "Stéréo", + /*234*/ "Casque", + /*235*/ "Surround", + /*236*/ "Contrôle\n", + /*237*/ "Simple\n", + /*238*/ "Double\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Sélection Difficulté\n", + /*249*/ "Difficulté\n", + /*250*/ "Meilleur Temps\n", + /*251*/ "Agent\n", + /*252*/ "Agent Spécial\n", + /*253*/ "Agent Perfect\n", + /*254*/ "Annuler\n", + /*255*/ "Options Coopératif\n", + /*256*/ "Radar Actif\n", + /*257*/ "Binôme Protégé\n", + /*258*/ "Binôme Perfect\n", + /*259*/ "Continuer\n", + /*260*/ "Annuler\n", + /*261*/ "Humain", + /*262*/ "1 Simulant", + /*263*/ "2 Simulants", + /*264*/ "3 Simulants", + /*265*/ "4 Simulants", + /*266*/ "Options Contre-Opération\n", + /*267*/ "Radar Actif\n", + /*268*/ "Contre-Opération\n", + /*269*/ "Continuer\n", + /*270*/ "Annuler\n", + /*271*/ "Joueur 1", + /*272*/ "Joueur 2", + /*273*/ "Briefing\n", + /*274*/ "Accepter\n", + /*275*/ "Refuser\n", + /*276*/ "Succès\n", + /*277*/ "Echec\n", + /*278*/ "Statut Mission:\n", + /*279*/ "Statut Agent:\n", + /*280*/ "Temps Mission:\n", + /*281*/ "Arme de prédilection:\n", + /*282*/ "Victimes:\n", + /*283*/ "Précision:\n", + /*284*/ "Total de tirs:\n", + /*285*/ " Tirs Tête:\n", + /*286*/ " Tirs Corps:\n", + /*287*/ " Tirs Membres:\n", + /*288*/ " Autres:\n", + /*289*/ "Appuyer sur START\n", + /*290*/ "Décédé\n", + /*291*/ "Actif\n", + /*292*/ "Suspendu\n", + /*293*/ "Echec\n", + /*294*/ "Terminé\n", + /*295*/ "Abandon\n", + /*296*/ "Recommencer", + /*297*/ "Prochaine Mission", + /*298*/ "Accepter\n", + /*299*/ "Refuser\n", + /*300*/ "Objectifs\n", + /*301*/ "Appuyer sur START\n", + /*302*/ "Menu petit mais Perfect\n", + /*303*/ "Simulateur de Combat\n", + /*304*/ "Entraînement\n", + /*305*/ "Audio / Vidéo\n", + /*306*/ "Changer d'Agent\n", + /*307*/ "Audio / Visuel\n", + /*308*/ "Son\n", + /*309*/ "Musique\n", + /*310*/ "Mode Son\n", + /*311*/ "Ratio\n", + /*312*/ "Retour\n", + /*313*/ "< Vide >\n", + /*314*/ "SUP", + /*315*/ "MAJ", + /*316*/ "ANNULER", + /*317*/ "OK", + /*318*/ "Visages de Simulateurs de Combat\n", + /*319*/ "Visages Mission\n", + /*320*/ "Erreur\n", + /*321*/ "Annuler\n", + /*322*/ "Controller Pak\nnon détecté.\n", + /*323*/ "Fichier non sauvegardé.\n", + /*324*/ "Fichier non chargeable.\n", + /*325*/ "Impossible d'effacer le fichier.\n", + /*326*/ "Plus de mémoire.\n", + /*327*/ "Ce joueur est déjà\nchargé pour cette partie.\n", + /*328*/ "a été enlevé.\n", + /*329*/ "Controller Pak est défectueux ou mal inséré.\n", + /*330*/ "Effacement des notes échoué.\n", + /*331*/ "Erreur charg. jeu\n", + /*332*/ "Erreur sauv. jeu\n", + /*333*/ "Erreur charg. joueur\n", + /*334*/ "Erreur sauv. joueur\n", + /*335*/ "Erreur chargement PerfectHead\n", + /*336*/ "Erreur sauvegarde PerfectHead\n", + /*337*/ "Erreur de lecture de fichier\n", + /*338*/ "Erreur d'écriture de fichier\n", + /*339*/ "Erreur\n", + /*340*/ "Echec Effacement\n", + /*341*/ "Impossible d'effacer le fichier.\n", + /*342*/ "- Vérifier que le Controller Pak est\ninséré correctement.\n", + /*343*/ "Annuler\n", + /*344*/ "Il n'y a plus de place.\n", + /*345*/ "Cool!\n", + /*346*/ "Fichier sauvegardé.\n", + /*347*/ "OK\n", + /*348*/ "Une erreur est survenue\npendant la sauvegarde.\n", + /*349*/ "Essayer encore\n", + /*350*/ "Sauver autre emplacement\n", + /*351*/ "Annuler\n", + /*352*/ "Une erreur est survenue\npendant le chargement.\n", + /*353*/ "Essayer encore\n", + /*354*/ "Annuler\n", + /*355*/ "Need Space For Head\n", + /*356*/ "Choose a head to load over:\n", + /*357*/ "OK\n", + /*358*/ "Cancel\n", + /*359*/ "Sauvegarde\n", + /*360*/ "Voulez-vous\nsauvegarder votre\nfichier ailleurs?\n", + /*361*/ "Oui\n", + /*362*/ "Non\n", + /*363*/ "Insérez le\nController Pak\ncontenant: %s dans une manette.\n", + /*364*/ "Insérez le\nController Pak\nde vos sauvegardes\n dans une manette.\n", + /*365*/ "OK\n", + /*366*/ "Annuler\n", + /*367*/ "Choix emplacement\n", + /*368*/ "Lieu\n", + /*369*/ "Dispo\n", + /*370*/ "Effacer Fichiers...\n", + /*371*/ "Annuler\n", + /*372*/ "Saturé", + /*373*/ "Copier fichiers\n", + /*374*/ "Choix fichier à copier:\n", + /*375*/ "Bouton B pour sortir.\n", + /*376*/ "Effacer Fichier\n", + /*377*/ "Choix fichier à effacer:\n", + /*378*/ "Bouton B pour sortir.\n", + /*379*/ "Attention\n", + /*380*/ "Etes-vous sûr de\nvouloir effacer?\n", + /*381*/ "Annuler\n", + /*382*/ "OK\n", + /*383*/ "Effacer Notes\n", + /*384*/ "Etes-vous sûr\nde vouloir effacer\nces notes?\n", + /*385*/ "Non\n", + /*386*/ "Oui\n", + /*387*/ "Notes de jeu\n", + /*388*/ "Effacer notes de jeu:\n", + /*389*/ "Note\n", + /*390*/ "Pages\n", + /*391*/ "Bouton B pour sortir.\n", + /*392*/ "Vide\n", + /*393*/ "--\n", + /*394*/ "Pages Libres: \n", + /*395*/ "Pages libres: %d\n", + /*396*/ "Pages utilisées: \n", + /*397*/ "Pages utilisées: %d\n", + /*398*/ "Déjà un fichier Perfect Dark.\n", + /*399*/ "Assez de place pour sauver Perfect Dark.\n", + /*400*/ "Controller Pak trop plein pour sauver: 1 note\net 28 pages requises.\n", + /*401*/ "Entrer Nom Agent\n", + /*402*/ "Nouveau...\n", + /*403*/ "Nouvel Agent...\n", + /*404*/ "Nouvelle Recrue", + /*405*/ "Temps Mission:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Spécial\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - Centre dataDyne\n", + /*439*/ "Mission 2 - Villa Carrington\n", + /*440*/ "Mission 3 - Immeuble G5\n", + /*441*/ "Mission 4 - Secteur 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Institut Carrington\n", + /*445*/ "Mission 8 - Croiseur Skedar\n", + /*446*/ "Mission 9 - Ruines Skedars\n", + /*447*/ "Finale\n", + /*448*/ "Jouer Tous\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Opération Dark\n", + /*451*/ "1:1 Conclusion - Descente rapide\n", + /*452*/ "1:2 Intro - En bas\n", + /*453*/ "1:2 Conclusion - Bonjour docteur\n", + /*454*/ "1:3 Intro - Bonne nuit\n", + /*455*/ "1:3 Conclusion - Tu vas où, toi?\n", + /*456*/ "2:1 Intro - Négocie-moi ça!\n", + /*457*/ "2:1 Intro 2 - A un fil\n", + /*458*/ "2:1 Conclusion - Carrington sauvé\n", + /*459*/ "3:1 Intro - Sombre allée\n", + /*460*/ "3:1 Conclusion - G5 investi\n", + /*461*/ "3:2 Intro - Guns 'n' Poses\n", + /*462*/ "3:2 Spécial - Conspiration\n", + /*463*/ "3:2 Conclusion - Sortie de secours\n", + /*464*/ "4:1 Intro - Sale vidéo\n", + /*465*/ "4:1 Conclusion - A négliger\n", + /*466*/ "4:2 Intro - Perles de sagesse\n", + /*467*/ "4:2 Conclusion - Sous la lame\n", + /*468*/ "4:3 Intro - Gaz!\n", + /*469*/ "4:3 Spécial - Réveil d'Elvis\n", + /*470*/ "4:3 Conclusion - Fuite\n", + /*471*/ "5:1 Intro - Haute altitude\n", + /*472*/ "5:1 Conclusion - Décollage\n", + /*473*/ "5:2 Intro - Dernière chance\n", + /*474*/ "5:2 Spécial - Arrimage\n", + /*475*/ "5:2 Conclusion - Plus de choix\n", + /*476*/ "5:3 Intro - Horizons rouges\n", + /*477*/ "5:3 Conclusion - Monstre blond\n", + /*478*/ "6:1 Intro - Infiltration\n", + /*479*/ "6:1 Conclusion - Profondeurs\n", + /*480*/ "6:2 Intro - Plus profond\n", + /*481*/ "6:2 Spécial - Virus!\n", + /*482*/ "6:2 Conclusion - En arrière!\n", + /*483*/ "7:1 Intro - Salut de victoire\n", + /*484*/ "7:1 Conclusion - Course liberté\n", + /*485*/ "8:1 Intro - Piqué!\n", + /*486*/ "8:1 Conclusion - Des ennuis\n", + /*487*/ "9:1 Intro - Air calme\n", + /*488*/ "9:1 Conclusion - J'te tiens!\n", + /*489*/ "Fin de séquence\n", + /*490*/ "Cinéma\n", + /*491*/ "Occult. %d\n", + /*492*/ "Choisir Cible\n", + /*493*/ "Score de Frags\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_g.c b/src/files/lang/pal-final/options_str_g.c new file mode 100644 index 000000000..e83caad68 --- /dev/null +++ b/src/files/lang/pal-final/options_str_g.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Komplettiert\n", + /* 1*/ "Nicht komplettiert\n", + /* 2*/ "Fehlgeschlagen\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Die Erde:", + /* 6*/ " ...in prähistorischer Zeit", + /* 7*/ "Rare präsentiert", + /* 8*/ "Rot\n", + /* 9*/ "Gelb\n", + /* 10*/ "Blau\n", + /* 11*/ "Magenta\n", + /* 12*/ "Cyan\n", + /* 13*/ "Orange\n", + /* 14*/ "Pink\n", + /* 15*/ "Braun\n", + /* 16*/ "Joanna im Kampfanzug\n", + /* 17*/ "Joanna im Trenchcoat\n", + /* 18*/ "Joanna im Partykleid\n", + /* 19*/ "Joanna im Kleid (zerrissen)\n", + /* 20*/ "Joanna als Stewardess\n", + /* 21*/ "Joanna im Neoprenanzug\n", + /* 22*/ "Joanna - Tauchgerät\n", + /* 23*/ "Joanna im Polar-Outfit\n", + /* 24*/ "Joanna als Labortechniker\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maianer\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington im Anzug\n", + /* 29*/ "Mr. Blond\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "CI-Labortechniker m.\n", + /* 34*/ "CI-Labortechniker w.\n", + /* 35*/ "CI-Soldat\n", + /* 36*/ "dataDyne Elitesoldat\n", + /* 37*/ "Weibliche dataDyne Wache\n", + /* 38*/ "dataDyne Security-Mann\n", + /* 39*/ "dataDyne Infanterist\n", + /* 40*/ "dataDyne Soldat\n", + /* 41*/ "Sekretärin\n", + /* 42*/ "Bürokleidung\n", + /* 43*/ "lockere Bürokleidung\n", + /* 44*/ "Unterhändlerin\n", + /* 45*/ "dataDyne Scharfschütze\n", + /* 46*/ "G5-Wache\n", + /* 47*/ "G5-SWAT-Wache\n", + /* 48*/ "CIA Agent\n", + /* 49*/ "FBI Agent\n", + /* 50*/ "Area 51 Wache\n", + /* 51*/ "Area 51 Soldat\n", + /* 52*/ "Pilot\n", + /* 53*/ "Overalls\n", + /* 54*/ "NSA Bodyguard\n", + /* 55*/ "Männlicher Labortechniker\n", + /* 56*/ "Weiblicher Labortechniker\n", + /* 57*/ "dataDyne Labortechniker\n", + /* 58*/ "Biotechniker\n", + /* 59*/ "Alaska-Wache\n", + /* 60*/ "Air Force One Pilot\n", + /* 61*/ "Steward\n", + /* 62*/ "Stewardess\n", + /* 63*/ "Chef-Stewardess\n", + /* 64*/ "Der Präsident\n", + /* 65*/ "NSA Lakai\n", + /* 66*/ "Präsidentenwache\n", + /* 67*/ "Präsident\"en Klon\n", + /* 68*/ "Pelagic II Wache\n", + /* 69*/ "Maianischer Soldat\n", + /* 70*/ "Dinner Jacket\n", + /* 71*/ "- Kein Controller in Controller-Port 1 -", + /* 72*/ "Schalten Sie aus und schließen Sie einen Controller an.", + /* 73*/ "GEFUNDEN", + /* 74*/ "NICHT GEFUNDEN", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Wähle deine Wahrheit\n", + /* 97*/ "Neu...\n", + /* 98*/ "Neuer Agent...\n", + /* 99*/ "Speicher\n", + /*100*/ "Kopieren:\n", + /*101*/ "Löschen:\n", + /*102*/ "Spielstand wird gelöscht...\n", + /*103*/ "Solo-Missionen Speicherstände\n", + /*104*/ "Kampfsimulator Einstellung Speicherstände\n", + /*105*/ "Kampfsimulator Spielerdaten\n", + /*106*/ "PerfectHead-Speicherstände\n", + /*107*/ "Controller Pak Menü\n", + /*108*/ "Dieses Menü dient dazu, Speicherstände von den\n Controller Paks zu löschen.\n", + /*109*/ "Wählen Sie das Controller Pak:\n", + /*110*/ "Abbruch\n", + /*111*/ "Spielmodul\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Perfect Menü\n", + /*117*/ "Solo-Missionen\n", + /*118*/ "Multiplayer\n", + /*119*/ "Teamwork\n", + /*120*/ "Counter Operative-Modus\n", + /*121*/ "Filmsequenzen\n", + /*122*/ "Missionsauswahl\n", + /*123*/ "Mission 1\n", + /*124*/ "Mission 2\n", + /*125*/ "Mission 3\n", + /*126*/ "Mission 4\n", + /*127*/ "Mission 5\n", + /*128*/ "Mission 6\n", + /*129*/ "Mission 7\n", + /*130*/ "Mission 8\n", + /*131*/ "Mission 9\n", + /*132*/ "Spezialmissionen\n", + /*133*/ "dataDyne", + /*134*/ "- Abtrünnig", + /*135*/ "dataDyne", + /*136*/ "- Ermittlung", + /*137*/ "dataDyne", + /*138*/ "- Ausbruch", + /*139*/ "Carrington Villa", + /*140*/ "- Geisel Nr. 1", + /*141*/ "Chicago", + /*142*/ "- Unter Tarnung", + /*143*/ "G5-Building", + /*144*/ "- Aufklärung", + /*145*/ "Area 51", + /*146*/ "- Infiltration", + /*147*/ "Area 51", + /*148*/ "- Rettung", + /*149*/ "Area 51", + /*150*/ "- Flucht", + /*151*/ "Stützpunkt", + /*152*/ "- Spionage", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismus", + /*155*/ "Absturzstelle", + /*156*/ "- Konfrontation", + /*157*/ "Pelagic II", + /*158*/ "- Erforschung", + /*159*/ "Tiefsee", + /*160*/ "- Abwendung", + /*161*/ "Carrington Institut", + /*162*/ "- Verteidigung", + /*163*/ "Das Schiff", + /*164*/ "- Verdeckter Angriff", + /*165*/ "Skedar-Ruinen", + /*166*/ "- Der Schrein", + /*167*/ "Mr. Blonds Rache", + /*168*/ "Maianisches SOS", + /*169*/ "Die Übernahme", + /*170*/ "KRIEG!", + /*171*/ "Das Duell", + /*172*/ "Status\n", + /*173*/ "Abbruch!\n", + /*174*/ "ACHTUNG!\n", + /*175*/ "Möchten Sie die Mission wirklich abbrechen?\n", + /*176*/ "NEIN\n", + /*177*/ "JA\n", + /*178*/ "Inventar\n", + /*179*/ "Verfügbare Waffen\n", + /*180*/ "Optionen\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Steuerung\n", + /*184*/ "Display\n", + /*185*/ "Cheats\n", + /*186*/ "Spiel speichern\n", + /*187*/ "Agent wechseln...\n", + /*188*/ "ACHTUNG!\n", + /*189*/ "Möchten Sie wirklich andere Agenten-Daten laden?\n", + /*190*/ "Ja\n", + /*191*/ "Nein\n", + /*192*/ "Steuerungsoptionen\n", + /*193*/ "Steuerung Spieler 2\n", + /*194*/ "Art der Steuerung\n", + /*195*/ "Blick nach oben/unten\n", + /*196*/ "Geradeausschauen\n", + /*197*/ "Kopfbewegung\n", + /*198*/ "Auto-Visier\n", + /*199*/ "Fadenkreuz-Ausricht.\n", + /*200*/ "Zurück\n", + /*201*/ "Halten\n", + /*202*/ "Umschalten\n", + /*203*/ "Display-Optionen\n", + /*204*/ "Spieler 2 anzeigen\n", + /*205*/ "Sicht on-screen\n", + /*206*/ "Ziel immer anzeigen\n", + /*207*/ "Zoom-Bereich anzeigen\n", + /*208*/ "Munition on-screen\n", + /*209*/ "Waffenfunktion anzeigen\n", + /*210*/ "Farbklecks\n", + /*211*/ "Untertitel\n", + /*212*/ "Missionszeit anzeigen\n", + /*213*/ "Zurück\n", + /*214*/ "Video-Optionen\n", + /*215*/ "Screen-Größe\n", + /*216*/ "Verhältnis\n", + /*217*/ "Hi-Res\n", + /*218*/ "2-Spieler Splitscreen\n", + /*219*/ "Zurück\n", + /*220*/ "Vollbild\n", + /*221*/ "Breitbild\n", + /*222*/ "Cinema\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertikal\n", + /*227*/ "Audio-Optionen\n", + /*228*/ "Soundeffekte\n", + /*229*/ "Musik\n", + /*230*/ "Sound\n", + /*231*/ "Zurück\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Kopfhörer", + /*235*/ "Surround", + /*236*/ "Steuerung\n", + /*237*/ "Einh.\n", + /*238*/ "Beidh.\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Briefing\n", + /*248*/ "Wähle den Schwierigkeitsgrad\n", + /*249*/ "Schwierigkeitsgrad\n", + /*250*/ "Beste Zeit\n", + /*251*/ "Agent\n", + /*252*/ "Spezialagent\n", + /*253*/ "Perfekter Agent\n", + /*254*/ "Cancel\n", + /*255*/ "Teamwork-Optionen\n", + /*256*/ "Radar Ein\n", + /*257*/ "Teamspieler verletzbar\n", + /*258*/ "Perfekter Kumpel\n", + /*259*/ "Weiter\n", + /*260*/ "Abbrechen\n", + /*261*/ "Menschlich", + /*262*/ "1 Simulant", + /*263*/ "2 Simulanten", + /*264*/ "3 Simulanten", + /*265*/ "4 Simulanten", + /*266*/ "Counter Operative-Optionen\n", + /*267*/ "Radar Ein\n", + /*268*/ "Counter Operative\n", + /*269*/ "Weiter\n", + /*270*/ "Abbrechen\n", + /*271*/ "Spieler 1", + /*272*/ "Spieler 2", + /*273*/ "Überblick\n", + /*274*/ "Annehmen\n", + /*275*/ "Ablehnen\n", + /*276*/ "Komplettiert\n", + /*277*/ "Fehlgeschlagen\n", + /*278*/ "Missions-Status:\n", + /*279*/ "Status der Agentin:\n", + /*280*/ "Missions-Zeit:\n", + /*281*/ "Bevorzugte Waffe:\n", + /*282*/ "Hits:\n", + /*283*/ "Präz.:\n", + /*284*/ "Schüsse:\n", + /*285*/ " Kopf:\n", + /*286*/ " Rumpf:\n", + /*287*/ " Gliedm.:\n", + /*288*/ " Andere:\n", + /*289*/ "Drücke START\n", + /*290*/ "Gefallen\n", + /*291*/ "Überlebt\n", + /*292*/ "Abgebrochen\n", + /*293*/ "Fehlgeschlagen\n", + /*294*/ "Komplettiert\n", + /*295*/ "Abgebrochen\n", + /*296*/ "Neuer Versuch", + /*297*/ "Nächste Mission", + /*298*/ "Akzeptieren\n", + /*299*/ "Ablehnen\n", + /*300*/ "Ziele\n", + /*301*/ "Drücke START\n", + /*302*/ "Kleines aber feines Menü\n", + /*303*/ "Kampfsimulator\n", + /*304*/ "Training\n", + /*305*/ "Audio/Video\n", + /*306*/ "Agent wechseln\n", + /*307*/ "Audio/Video\n", + /*308*/ "Sound\n", + /*309*/ "Musik\n", + /*310*/ "Sound\n", + /*311*/ "Verhältnis\n", + /*312*/ "Zurück\n", + /*313*/ "< Leer >\n", + /*314*/ "ENTF", + /*315*/ "SHIFT", + /*316*/ "ABBR", + /*317*/ "OK", + /*318*/ "Kampfsimulator-Köpfe\n", + /*319*/ "Köpfe in den Missionen\n", + /*320*/ "Fehler\n", + /*321*/ "Abbruch\n", + /*322*/ "Es wurde kein\nController Pak in den\nControllern gefunden.\n", + /*323*/ "Spielstand wurde nicht gespeichert.\n", + /*324*/ "Spielstand wurde nicht geladen.\n", + /*325*/ "Spielstand konnte nicht gelöscht werden.\n", + /*326*/ "Zu wenig Speicherplatz.\n", + /*327*/ "Diese Daten sind bereits\ngeladen worden.\n", + /*328*/ "wurde entfernt.\n", + /*329*/ "Controller Pak ist beschädigt oder nicht richtig eingelegt.\n", + /*330*/ "Löschvorgang konnte nicht durchgeführt werden.\n", + /*331*/ "Ladefehler\n", + /*332*/ "Speicherfehler\n", + /*333*/ "Ladefehler Spieler\n", + /*334*/ "Speicherfehler Spieler\n", + /*335*/ "Fehler während des Ladens von PerfectHead.\n", + /*336*/ "Fehler während des Speicherns von PerfectHead.\n", + /*337*/ "Fehler während des Lesevorgangs.\n", + /*338*/ "Fehler während des Schreibvorgangs.\n", + /*339*/ "Fehler\n", + /*340*/ "Löschvorgang nicht erfolgreich.\n", + /*341*/ "Spielstand konnte nicht gelöscht werden.\n", + /*342*/ "- Überprüfen Sie, ob das Controller Pak is\nkorrekt eingelegt ist.\n", + /*343*/ "Abbrechen\n", + /*344*/ "Es ist nicht genug Platz vorhanden.\n", + /*345*/ "Cool!\n", + /*346*/ "Spiel gespeichert.\n", + /*347*/ "OK\n", + /*348*/ "Während des Speicherns ereignete\nsich ein Fehler.\n", + /*349*/ "Versuche es nochmals.\n", + /*350*/ "Anderen Speicherplatz wählen\n", + /*351*/ "Abbrechen\n", + /*352*/ "Während des Ladens ereignete\nsich ein Fehler.\n", + /*353*/ "Wiederholen\n", + /*354*/ "Abbrechen\n", + /*355*/ "Es wird Platz für den Kopf benötigt.\n", + /*356*/ "Wählen Sie einen Kopf, der überschrieben werden soll:\n", + /*357*/ "OK\n", + /*358*/ "Abbrechen\n", + /*359*/ "Speichern\n", + /*360*/ "Möchten Sie die Daten\nwoanders speichern?\n", + /*361*/ "Ja\n", + /*362*/ "Nein\n", + /*363*/ "Bitte legen Sie das\nController Pak\nmit den %s ein.\n", + /*364*/ "Bitte legen Sie das\nController Pak ein,\nauf dem Sie speichern möchten.\n", + /*365*/ "OK\n", + /*366*/ "Abbrechen\n", + /*367*/ "Speicherplatz wählen\n", + /*368*/ "Wo!\n", + /*369*/ "Plätze\n", + /*370*/ "Löschen...\n", + /*371*/ "Abbrechen\n", + /*372*/ "Voll", + /*373*/ "Spielstand kopieren\n", + /*374*/ "Wählen Sie den zu kopierenden Spielstand:\n", + /*375*/ "Abbruch\n", + /*376*/ "Spielstand löschen\n", + /*377*/ "Welchen Spielstand:\n", + /*378*/ "Abbruch\n", + /*379*/ "ACHTUNG!\n", + /*380*/ "Möchten Sie diesen Spielstand\nwirklich löschen?\n", + /*381*/ "Abbrechen\n", + /*382*/ "OK\n", + /*383*/ "Spielerdaten löschen\n", + /*384*/ "Möchten Sie diese Spielerdaten\nwirklich löschen?\n", + /*385*/ "Nein\n", + /*386*/ "Ja\n", + /*387*/ "Spielerdaten\n", + /*388*/ "Spielerdaten löschen:\n", + /*389*/ "Daten\n", + /*390*/ "Seiten\n", + /*391*/ "Abbruch\n", + /*392*/ "Frei\n", + /*393*/ "--\n", + /*394*/ "Freie Plätze: \n", + /*395*/ "Freie Plätze: %d\n", + /*396*/ "Belegte Plätze: \n", + /*397*/ "Belegte Plätze: %d\n", + /*398*/ "Es existiert bereits ein Speicherstand.\n", + /*399*/ "Es steht ausreichend freier\nSpeicher zur Verfügung.\n", + /*400*/ "Das Controller Pak ist zu voll, um das Spiel zu\nspeichern. Es werden 28 freie Plätze benötigt.\n", + /*401*/ "Geben Sie den Namen des Agenten ein!\n", + /*402*/ "Neu...\n", + /*403*/ "Neuer Agent...\n", + /*404*/ "Neuer Rekrut", + /*405*/ "Missionszeit:", + /*406*/ "Challenge 1", + /*407*/ "Challenge 2", + /*408*/ "Challenge 3", + /*409*/ "Challenge 4", + /*410*/ "Challenge 5", + /*411*/ "Challenge 6", + /*412*/ "Challenge 7", + /*413*/ "Challenge 8", + /*414*/ "Challenge 9", + /*415*/ "Challenge 10", + /*416*/ "Challenge 11", + /*417*/ "Challenge 12", + /*418*/ "Challenge 13", + /*419*/ "Challenge 14", + /*420*/ "Challenge 15", + /*421*/ "Challenge 16", + /*422*/ "Challenge 17", + /*423*/ "Challenge 18", + /*424*/ "Challenge 19", + /*425*/ "Challenge 20", + /*426*/ "Challenge 21", + /*427*/ "Challenge 22", + /*428*/ "Challenge 23", + /*429*/ "Challenge 24", + /*430*/ "Challenge 25", + /*431*/ "Challenge 26", + /*432*/ "Challenge 27", + /*433*/ "Challenge 28", + /*434*/ "Challenge 29", + /*435*/ "Challenge 30", + /*436*/ "Special\n", + /*437*/ "Intro\n", + /*438*/ "Mission 1 - dataDyne Zentrale\n", + /*439*/ "Mission 2 - Carrington Villa\n", + /*440*/ "Mission 3 - G5-Building\n", + /*441*/ "Mission 4 - Area 51\n", + /*442*/ "Mission 5 - Air Force One\n", + /*443*/ "Mission 6 - Pelagic II\n", + /*444*/ "Mission 7 - Carrington Institut\n", + /*445*/ "Mission 8 - Skedar Schiff\n", + /*446*/ "Mission 9 - Skedar Ruinen\n", + /*447*/ "Finale\n", + /*448*/ "Zeig mir alles!\n", + /*449*/ "Intro\n", + /*450*/ "1:1 Intro - Die Dunkelheit\n", + /*451*/ "1:1 Outro - Ein rascher Abstieg\n", + /*452*/ "1:2 Intro - Abwärts!\n", + /*453*/ "1:2 Outro - Das Treffen\n", + /*454*/ "1:3 Intro - Licht aus\n", + /*455*/ "1:3 Outro - Wohin geht's?\n", + /*456*/ "2:1 Intro - Verhandle DARÜBER!\n", + /*457*/ "2:1 Intro 2 - Am seidenen Faden\n", + /*458*/ "2:1 Outro - Carringtons Rettung\n", + /*459*/ "3:1 Intro - Dunkle Gassen\n", + /*460*/ "3:1 Outro - Das Eindringen\n", + /*461*/ "3:2 Intro - Die Perfektion\n", + /*462*/ "3:2 Special - Die Verschwörung\n", + /*463*/ "3:2 Outro - Über die Feuerleiter\n", + /*464*/ "4:1 Intro - Video-Gemeinheiten\n", + /*465*/ "4:1 Outro - Lose Enden\n", + /*466*/ "4:2 Intro - Perlen der Weisheit\n", + /*467*/ "4:2 Outro - Unterm Messer\n", + /*468*/ "4:3 Intro - Gas!\n", + /*469*/ "4:3 Special - Das Erwachen\n", + /*470*/ "4:3 Outro - Die Flucht\n", + /*471*/ "5:1 Intro - Über den Wolken\n", + /*472*/ "5:1 Outro - Der Abflug\n", + /*473*/ "5:2 Intro - Die letzte Chance\n", + /*474*/ "5:2 Special - Das Andockmanöver\n", + /*475*/ "5:2 Outro - Keine Wahl\n", + /*476*/ "5:3 Intro - Roter Horizont\n", + /*477*/ "5:3 Outro - Der blonde Freak\n", + /*478*/ "6:1 Intro - Wer schleicht da?\n", + /*479*/ "6:1 Outro - In der Tiefe\n", + /*480*/ "6:2 Intro - Noch tiefer\n", + /*481*/ "6:2 Special - Virus!\n", + /*482*/ "6:2 Outro - Der Weg nach oben\n", + /*483*/ "7:1 Intro - Salut\n", + /*484*/ "7:1 Outro - In die Freiheit\n", + /*485*/ "8:1 Intro - Entführt\n", + /*486*/ "8:1 Outro - Ärger voraus\n", + /*487*/ "9:1 Intro - Ruhe vor dem Sturm\n", + /*488*/ "9:1 Outro - Hab dich!\n", + /*489*/ "Endsequenz\n", + /*490*/ "Cinema\n", + /*491*/ "Tarnung %d\n", + /*492*/ "Zielauswahl\n", + /*493*/ "Hits\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_i.c b/src/files/lang/pal-final/options_str_i.c new file mode 100644 index 000000000..ad87b6209 --- /dev/null +++ b/src/files/lang/pal-final/options_str_i.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Compiuto\n", + /* 1*/ "Incompleto\n", + /* 2*/ "Fallito\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "Terra:", + /* 6*/ " nella preistoria", + /* 7*/ "Rare presenta", + /* 8*/ "Rosso\n", + /* 9*/ "Giallo\n", + /* 10*/ "Blu\n", + /* 11*/ "Magenta\n", + /* 12*/ "Azzurro\n", + /* 13*/ "Arancio\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrone\n", + /* 16*/ "Jo in tuta da lotta\n", + /* 17*/ "Jo in impermeabile\n", + /* 18*/ "Jo in abito da sera\n", + /* 19*/ "Jo in abito strappato\n", + /* 20*/ "Jo come hostess\n", + /* 21*/ "Jo in muta da sub\n", + /* 22*/ "Jo con bombole da sub\n", + /* 23*/ "Jo in tenuta polare\n", + /* 24*/ "Jo in camice\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington in smoking\n", + /* 29*/ "Mr Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Tecnico di lab. CI (uomo)\n", + /* 34*/ "Tecnico di lab. CI (donna)\n", + /* 35*/ "Soldato CI\n", + /* 36*/ "Soldato d'assalto dD\n", + /* 37*/ "Guardia (donna) dD\n", + /* 38*/ "Sicurezza dataDyne\n", + /* 39*/ "Fanteria dataDyne\n", + /* 40*/ "Soldato dataDyne\n", + /* 41*/ "Segretaria\n", + /* 42*/ "Vestito da ufficio\n", + /* 43*/ "Vestito casual\n", + /* 44*/ "Negoziatore\n", + /* 45*/ "Cecchino dataDyne\n", + /* 46*/ "Guardia G5\n", + /* 47*/ "Guardia SWAT G5\n", + /* 48*/ "Agente CIA\n", + /* 49*/ "Agente FBI\n", + /* 50*/ "Guardia Area 51\n", + /* 51*/ "Soldato Area 51\n", + /* 52*/ "Pilota\n", + /* 53*/ "Tute\n", + /* 54*/ "Guardia del corpo NSA\n", + /* 55*/ "Tecnico di lab. (uomo)\n", + /* 56*/ "Tecnico di lab. (donna)\n", + /* 57*/ "Tecnico di lab. dD\n", + /* 58*/ "Tecnico biologico\n", + /* 59*/ "Guardia dell'Alaska\n", + /* 60*/ "Pilota Air Force One\n", + /* 61*/ "Steward\n", + /* 62*/ "Hostess\n", + /* 63*/ "Hostess capo\n", + /* 64*/ "Presidente\n", + /* 65*/ "Lacchè NSA\n", + /* 66*/ "Sicurezza presidenziale\n", + /* 67*/ "Clone del Presidente\n", + /* 68*/ "Guardia Pelagic II\n", + /* 69*/ "Soldato Maian\n", + /* 70*/ "Giacca elegante\n", + /* 71*/ "nessun Controller nella presa 1", + /* 72*/ "spegni la console e collega un Controller", + /* 73*/ "PRESENTE", + /* 74*/ "ASSENTE", + /* 75*/ "tm", + /* 76*/ "EXPANSION PAK N64", + /* 77*/ "Identificazione prodotto Nintendo 64\n", + /* 78*/ "ID prodotto:\n", + /* 79*/ "Codice prodotto:\n", + /* 80*/ "Variante:\n", + /* 81*/ "Ideatore:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "Versione PAL 8.7 finale\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "I logo Rareware e Perfect Dark sono trademark di Rare Ltd.\n", + /* 88*/ "Presentato in Dolby Surround. Dolby e il simbolo\ndoppia D sono trademark di Dolby Laboratories.", + /* 89*/ "Usa Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback fornito con Miles Sound System da\nRAD Game Tools, Inc. tecnologia di compressione audio MPEG Layer-3\nsu licenza di Fraunhofer IIS e THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "Design Rare nel futuro <<<\n", + /* 94*/ "Edito da Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Scegli la tua realtà\n", + /* 97*/ "Nuovo...\n", + /* 98*/ "Nuovo agente...\n", + /* 99*/ "File di gioco\n", + /*100*/ "Copia:\n", + /*101*/ "Cancella:\n", + /*102*/ "Cancella dati gioco...\n", + /*103*/ "File missioni individuali\n", + /*104*/ "File impostaz. simulatore lotta\n", + /*105*/ "File giocatore simulatore lotta\n", + /*106*/ "File testaPerfect\n", + /*107*/ "Menu Controller Pak\n", + /*108*/ "Usalo per cancellare i dati di gioco\ndai Controller Pak.\n", + /*109*/ "Scegli Controller Pak:\n", + /*110*/ "Esci\n", + /*111*/ "Cassetta gioco\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menu Perfect\n", + /*117*/ "Missioni individuali\n", + /*118*/ "Simulatore lotta\n", + /*119*/ "Collaborazione\n", + /*120*/ "Tutti contro tutti!\n", + /*121*/ "Cinema\n", + /*122*/ "Seleziona Missione\n", + /*123*/ "Missione 1\n", + /*124*/ "Missione 2\n", + /*125*/ "Missione 3\n", + /*126*/ "Missione 4\n", + /*127*/ "Missione 5\n", + /*128*/ "Missione 6\n", + /*129*/ "Missione 7\n", + /*130*/ "Missione 8\n", + /*131*/ "Missione 9\n", + /*132*/ "Missioni speciali\n", + /*133*/ "QG dataDyne", + /*134*/ "- Ribellione", + /*135*/ "Ricerca dataDyne", + /*136*/ "- L'indagine", + /*137*/ "QG dataDyne", + /*138*/ "- Salvataggio", + /*139*/ "Villa Carrington", + /*140*/ "- L'ostaggio n°1", + /*141*/ "Chicago", + /*142*/ "- In incognito", + /*143*/ "Edificio G5", + /*144*/ "- Ricognizione", + /*145*/ "Area 51", + /*146*/ "- L'infiltrazione", + /*147*/ "Area 51", + /*148*/ "- Salvataggio", + /*149*/ "Area 51", + /*150*/ "- La fuga", + /*151*/ "Base aerea", + /*152*/ "- Lo spionaggio", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Luogo del disastro", + /*156*/ "- Lo scontro", + /*157*/ "Pelagic II", + /*158*/ "- L'esplorazione", + /*159*/ "Negli abissi", + /*160*/ "- La minaccia", + /*161*/ "Carrington Institute", + /*162*/ "- La difesa", + /*163*/ "Astronave d'assalto", + /*164*/ "- Attacco", + /*165*/ "Rovine Skedar", + /*166*/ "- Tempio di guerra", + /*167*/ "La vendetta di Mr Blonde", + /*168*/ "L'SOS Maian", + /*169*/ "Il riscatto dell'istituto", + /*170*/ "GUERRA!", + /*171*/ "Il duello", + /*172*/ "Situazione\n", + /*173*/ "Interruzione!\n", + /*174*/ "Attenzione!\n", + /*175*/ "Vuoi interrompere la missione?\n", + /*176*/ "Annulla\n", + /*177*/ "Interrompi\n", + /*178*/ "Inventario\n", + /*179*/ "Armi disponibili\n", + /*180*/ "Opzioni\n", + /*181*/ "Audio\n", + /*182*/ "Video\n", + /*183*/ "Comandi\n", + /*184*/ "Visualizza\n", + /*185*/ "Trucchi\n", + /*186*/ "Salva gioco\n", + /*187*/ "Cambia agente...\n", + /*188*/ "Attenzione!\n", + /*189*/ "Vuoi caricare un altro agente?\n", + /*190*/ "Sì\n", + /*191*/ "No\n", + /*192*/ "Opzioni comandi\n", + /*193*/ "Comandi giocatore 2\n", + /*194*/ "Modalità comandi\n", + /*195*/ "Inv. punto vista\n", + /*196*/ "Vista in avanti\n", + /*197*/ "Rotazione testa\n", + /*198*/ "Mira automatica\n", + /*199*/ "Mirino\n", + /*200*/ "Esci\n", + /*201*/ "Tieni premuto\n", + /*202*/ "Attiva/Disattiva\n", + /*203*/ "Visualizza opzioni\n", + /*204*/ "Comandi giocatore 2\n", + /*205*/ "Vista su schermo\n", + /*206*/ "Obiettivo sempre\n", + /*207*/ "Area zoom\n", + /*208*/ "Munizioni\n", + /*209*/ "Funzioni arma\n", + /*210*/ "Macchia colorata\n", + /*211*/ "Didascalia\n", + /*212*/ "Tempo missione\n", + /*213*/ "Esci\n", + /*214*/ "Opzioni video\n", + /*215*/ "Dimensioni schermo\n", + /*216*/ "Rapporto\n", + /*217*/ "Alta risoluzione\n", + /*218*/ "Diviso per 2 giocatori\n", + /*219*/ "Esci\n", + /*220*/ "Intero\n", + /*221*/ "Allargato\n", + /*222*/ "Cinema\n", + /*223*/ "Normale\n", + /*224*/ "16:9\n", + /*225*/ "Orizzontale\n", + /*226*/ "Verticale\n", + /*227*/ "Opzioni audio\n", + /*228*/ "Suono\n", + /*229*/ "Musica\n", + /*230*/ "Modalità suono\n", + /*231*/ "Esci\n", + /*232*/ "Mono", + /*233*/ "Stereo", + /*234*/ "Cuffie", + /*235*/ "Surround", + /*236*/ "Comandi\n", + /*237*/ "Singolo\n", + /*238*/ "Doppio\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Istruzioni\n", + /*248*/ "Seleziona difficoltà\n", + /*249*/ "Difficoltà\n", + /*250*/ "Tempo migliore\n", + /*251*/ "Agente\n", + /*252*/ "Agente speciale\n", + /*253*/ "Agente Perfect\n", + /*254*/ "Annulla\n", + /*255*/ "Opzioni collaborazione\n", + /*256*/ "Radar acceso\n", + /*257*/ "Fuoco sugli amici\n", + /*258*/ "AmicoPerfect\n", + /*259*/ "Continua\n", + /*260*/ "Annulla\n", + /*261*/ "Umano", + /*262*/ "Un replicante", + /*263*/ "2 replicanti", + /*264*/ "3 replicanti", + /*265*/ "4 replicanti", + /*266*/ "Tutti contro tutti!\n", + /*267*/ "Radar acceso\n", + /*268*/ "Tutti contro tutti!\n", + /*269*/ "Continua\n", + /*270*/ "Annulla\n", + /*271*/ "Giocat. 1", + /*272*/ "Giocat. 2", + /*273*/ "Panoramica\n", + /*274*/ "Accetta\n", + /*275*/ "Rifiuta\n", + /*276*/ "Compiuto\n", + /*277*/ "Fallito\n", + /*278*/ "Risultati missione:\n", + /*279*/ "Stato agente:\n", + /*280*/ "Tempo missione:\n", + /*281*/ "Arma più usata:\n", + /*282*/ "Vittime:\n", + /*283*/ "Accuratezza:\n", + /*284*/ "Colpi totali:\n", + /*285*/ " Colpi al capo:\n", + /*286*/ " Colpi al corpo:\n", + /*287*/ " Colpi agli arti:\n", + /*288*/ " Altro:\n", + /*289*/ "Premi START\n", + /*290*/ "Deceduto\n", + /*291*/ "Attivo\n", + /*292*/ "Fuggito\n", + /*293*/ "Fallito\n", + /*294*/ "Compiuto\n", + /*295*/ "Interrotto\n", + /*296*/ "Riprova", + /*297*/ "Missione seguente", + /*298*/ "Accetta\n", + /*299*/ "Rifiuta\n", + /*300*/ "Obiettivi\n", + /*301*/ "Premi START\n", + /*302*/ "Menu breve e conciso\n", + /*303*/ "Simulatore\n", + /*304*/ "Addestramento\n", + /*305*/ "Audio/Video\n", + /*306*/ "Cambia agente\n", + /*307*/ "Audio/Video\n", + /*308*/ "Suono\n", + /*309*/ "Musica\n", + /*310*/ "Modalità suono\n", + /*311*/ "Rapporto\n", + /*312*/ "Esci\n", + /*313*/ "< Vuoto >\n", + /*314*/ "CANC", + /*315*/ "MAIU", + /*316*/ "ANNULLA", + /*317*/ "OK", + /*318*/ "Testi simulatore\n", + /*319*/ "Teste missione\n", + /*320*/ "Errore\n", + /*321*/ "Annulla\n", + /*322*/ "Controller Pak assente\nda tutti i Controller.\n", + /*323*/ "File non salvato.\n", + /*324*/ "File non caricato.\n", + /*325*/ "Impossibile cancellare file.\n", + /*326*/ "Memoria esaurita.\n", + /*327*/ "Giocatore già caricato\nnel gioco.\n", + /*328*/ "rimosso.\n", + /*329*/ "Controller Pak danneggiato o in posizione errata.\n", + /*330*/ "Impossibile cancellare dati gioco.\n", + /*331*/ "Errore caric. gioco\n", + /*332*/ "Errore salv. gioco\n", + /*333*/ "Errore caric. giocat.\n", + /*334*/ "Errore salv. giocat.\n", + /*335*/ "Errore caric. testaPerfect\n", + /*336*/ "Errore salv. testaPerfect\n", + /*337*/ "Errore lettura file\n", + /*338*/ "Errore scrittura file\n", + /*339*/ "Errore\n", + /*340*/ "Non cancellato\n", + /*341*/ "Impossibile cancellare.\n", + /*342*/ "- Controlla che il Controller Pak \nsia inserito correttamente.\n", + /*343*/ "Annulla\n", + /*344*/ "Spazio esaurito.\n", + /*345*/ "Perfetto!\n", + /*346*/ "File salvato.\n", + /*347*/ "OK\n", + /*348*/ "Errore durante il \nsalvataggio!\n", + /*349*/ "Riprova\n", + /*350*/ "Salva altrove\n", + /*351*/ "Annulla\n", + /*352*/ "Errore durante il \ncaricamento!\n", + /*353*/ "Riprova\n", + /*354*/ "Annulla\n", + /*355*/ "Serve spazio per la testa\n", + /*356*/ "Scegli una testa da caricare:\n", + /*357*/ "OK\n", + /*358*/ "Annulla\n", + /*359*/ "Salva\n", + /*360*/ "Vuoi salvare il file\naltrove?\n", + /*361*/ "Sì\n", + /*362*/ "No\n", + /*363*/ "Inserisci il Controller Pak con il tuo %s in un Controller.\n", + /*364*/ "Inserisci il\nController Pak\ndove vuoi salvare in un Controller.\n", + /*365*/ "OK\n", + /*366*/ "Annulla\n", + /*367*/ "Scegli dove!\n", + /*368*/ "Dove?\n", + /*369*/ "Spazi\n", + /*370*/ "Cancella file...\n", + /*371*/ "Annulla\n", + /*372*/ "Pieno", + /*373*/ "Copia file\n", + /*374*/ "Scegli un file da copiare:\n", + /*375*/ "Premi B per uscire.\n", + /*376*/ "Cancella file\n", + /*377*/ "Che file cancellare?\n", + /*378*/ "Premi B per uscire.\n", + /*379*/ "Attenzione!\n", + /*380*/ "Sicuro di voler\ncancellare il file?\n", + /*381*/ "Annulla\n", + /*382*/ "OK\n", + /*383*/ "Cancella dati gioco\n", + /*384*/ "Sicuro di voler\ncancellare\nquesti dati?\n", + /*385*/ "No\n", + /*386*/ "Sì\n", + /*387*/ "Dati gioco\n", + /*388*/ "Cancella dati:\n", + /*389*/ "Dati\n", + /*390*/ "Spazi\n", + /*391*/ "Premi B per uscire.\n", + /*392*/ "Vuoto\n", + /*393*/ "--\n", + /*394*/ "Spazi vuoti: \n", + /*395*/ "Spazi vuoti: %d\n", + /*396*/ "Spazi pieni: \n", + /*397*/ "Spazi pieni: %d\n", + /*398*/ "Questo Controller Pak contiene già\nun gioco in memoria.\n", + /*399*/ "Spazio sufficiente per\ni dati di Perfect Dark.\n", + /*400*/ "Controller Pak pieno: impossibile salvare dati.\nServono 28 spazi per salvare sul Controller Pak.\n", + /*401*/ "Digita nome agente\n", + /*402*/ "Nuovo...\n", + /*403*/ "Nuovo agente...\n", + /*404*/ "Nuova recluta", + /*405*/ "Tempo missione:", + /*406*/ "Sfida 1", + /*407*/ "Sfida 2", + /*408*/ "Sfida 3", + /*409*/ "Sfida 4", + /*410*/ "Sfida 5", + /*411*/ "Sfida 6", + /*412*/ "Sfida 7", + /*413*/ "Sfida 8", + /*414*/ "Sfida 9", + /*415*/ "Sfida 10", + /*416*/ "Sfida 11", + /*417*/ "Sfida 12", + /*418*/ "Sfida 13", + /*419*/ "Sfida 14", + /*420*/ "Sfida 15", + /*421*/ "Sfida 16", + /*422*/ "Sfida 17", + /*423*/ "Sfida 18", + /*424*/ "Sfida 19", + /*425*/ "Sfida 20", + /*426*/ "Sfida 21", + /*427*/ "Sfida 22", + /*428*/ "Sfida 23", + /*429*/ "Sfida 24", + /*430*/ "Sfida 25", + /*431*/ "Sfida 26", + /*432*/ "Sfida 27", + /*433*/ "Sfida 28", + /*434*/ "Sfida 29", + /*435*/ "Sfida 30", + /*436*/ "Speciale\n", + /*437*/ "Prologo\n", + /*438*/ "Missione 1 - QG dataDyne\n", + /*439*/ "Missione 2 - Villa Carrington\n", + /*440*/ "Missione 3 - Edificio G5\n", + /*441*/ "Missione 4 - Area 51\n", + /*442*/ "Missione 5 - Air Force One\n", + /*443*/ "Missione 6 - Pelagic II\n", + /*444*/ "Missione 7 - Carrington Institute\n", + /*445*/ "Missione 8 - Astronave d'assalto Skedar\n", + /*446*/ "Missione 9 - Rovine Skedar\n", + /*447*/ "Finale\n", + /*448*/ "Mostra tutto!\n", + /*449*/ "Prologo\n", + /*450*/ "1:1 Prologo - Al buio\n", + /*451*/ "1:1 Epilogo - Discesa rapida\n", + /*452*/ "1:2 Prologo - Avanti!\n", + /*453*/ "1:2 Epilogo - L'incontro\n", + /*454*/ "1:3 Prologo - A luci spente\n", + /*455*/ "1:3 Epilogo - Dove si va?\n", + /*456*/ "2:1 Prologo - Il negoziato\n", + /*457*/ "2:1 Prologo 2 - Sul filo del rasoio\n", + /*458*/ "2:1 Epilogo - Il salvataggio\n", + /*459*/ "3:1 Prologo - Vicoli bui\n", + /*460*/ "3:1 Epilogo - Irruzione G5\n", + /*461*/ "3:2 Prologo - La perfezione\n", + /*462*/ "3:2 Speciale - La cospirazione\n", + /*463*/ "3:2 Epilogo - Uscita antincendio\n", + /*464*/ "4:1 Prologo - Interferenze\n", + /*465*/ "4:1 Epilogo - Lasciamo perdere...\n", + /*466*/ "4:2 Prologo - Perle di saggezza\n", + /*467*/ "4:2 Epilogo - Sotto i ferri\n", + /*468*/ "4:3 Prologo - Gas!\n", + /*469*/ "4:3 Speciale - Il risveglio\n", + /*470*/ "4:3 Epilogo - La fuga\n", + /*471*/ "5:1 Prologo - Ad alta quota\n", + /*472*/ "5:1 Epilogo - Il decollo\n", + /*473*/ "5:2 Prologo - L'ultima possibilità\n", + /*474*/ "5:2 Speciale - L'attracco\n", + /*475*/ "5:2 Epilogo - L'inevitabile\n", + /*476*/ "5:3 Prologo - Orizzonte rosso\n", + /*477*/ "5:3 Epilogo - Il fanatico biondo\n", + /*478*/ "6:1 Prologo - Chi va là?\n", + /*479*/ "6:1 Epilogo - Negli abissi\n", + /*480*/ "6:2 Prologo - Ancora più giù\n", + /*481*/ "6:2 Speciale - Virus!\n", + /*482*/ "6:2 Epilogo - La risalita\n", + /*483*/ "7:1 Prologo - L'ambasciata\n", + /*484*/ "7:1 Epilogo - Fuga per la libertà\n", + /*485*/ "8:1 Prologo - Prigioniera\n", + /*486*/ "8:1 Epilogo - Guai in vista\n", + /*487*/ "9:1 Prologo - Venti di guerra\n", + /*488*/ "9:1 Epilogo - Fatto!\n", + /*489*/ "Fine sequenza\n", + /*490*/ "Cinema\n", + /*491*/ "Mimesi %d\n", + /*492*/ "Scegli obiettivo\n", + /*493*/ "Uccisioni\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/options_str_s.c b/src/files/lang/pal-final/options_str_s.c new file mode 100644 index 000000000..487d1222e --- /dev/null +++ b/src/files/lang/pal-final/options_str_s.c @@ -0,0 +1,500 @@ +#include + +char *lang[] = { + /* 0*/ "Completado\n", + /* 1*/ "No completado\n", + /* 2*/ "Fallado\n", + /* 3*/ "\n", + /* 4*/ "", + /* 5*/ "tierra:", + /* 6*/ " prehistoria", + /* 7*/ "rare presenta", + /* 8*/ "Rojo\n", + /* 9*/ "Amarillo\n", + /* 10*/ "Azul\n", + /* 11*/ "Magenta\n", + /* 12*/ "Az. Claro\n", + /* 13*/ "Naranja\n", + /* 14*/ "Rosa\n", + /* 15*/ "Marrón\n", + /* 16*/ "Joanna de Combate\n", + /* 17*/ "Joanna con Gabardina\n", + /* 18*/ "Joanna de Gala\n", + /* 19*/ "Joanna de Fiesta\n", + /* 20*/ "Joanna Azafata\n", + /* 21*/ "Joanna Traje Isotérmico\n", + /* 22*/ "Joanna con Escafandra\n", + /* 23*/ "Joanna con Traje Polar\n", + /* 24*/ "Joanna Científica\n", + /* 25*/ "Elvis\n", + /* 26*/ "Maian\n", + /* 27*/ "Daniel Carrington\n", + /* 28*/ "Carrington de Gala\n", + /* 29*/ "Mr. Blonde\n", + /* 30*/ "Cassandra De Vries\n", + /* 31*/ "Trent Easton\n", + /* 32*/ "Jonathan\n", + /* 33*/ "Técnico Masculino del IC\n", + /* 34*/ "Técnico Femenino del IC\n", + /* 35*/ "Soldado del IC\n", + /* 36*/ "Tropa Asalto dataDyne\n", + /* 37*/ "Guarda de dataDyne\n", + /* 38*/ "Seguridad de dataDyne\n", + /* 39*/ "Infantería de dataDyne\n", + /* 40*/ "Soldado de dataDyne\n", + /* 41*/ "Secretaria\n", + /* 42*/ "Ropa de Oficina\n", + /* 43*/ "Ropa Normal\n", + /* 44*/ "Negociadora\n", + /* 45*/ "Francotirador dataDyne\n", + /* 46*/ "Guarda del G5\n", + /* 47*/ "Guarda SWAT del G5\n", + /* 48*/ "Agente de la CIA\n", + /* 49*/ "Agente del FBI\n", + /* 50*/ "Guarda del Área 51\n", + /* 51*/ "Soldado del Área 51\n", + /* 52*/ "Piloto\n", + /* 53*/ "Mono de Trabajo\n", + /* 54*/ "Guardaespaldas de la ANS\n", + /* 55*/ "Técnico Masculino Lab.\n", + /* 56*/ "Técnico Femenino Lab.\n", + /* 57*/ "Técnico del Lab. dataDyne\n", + /* 58*/ "Biotécnico\n", + /* 59*/ "Guarda de Alaska\n", + /* 60*/ "Piloto del Air Force One\n", + /* 61*/ "Auxiliar\n", + /* 62*/ "Azafata\n", + /* 63*/ "Azafata Jefe\n", + /* 64*/ "El Presidente\n", + /* 65*/ "Lacayo de la ANS\n", + /* 66*/ "Seguridad Presidencial\n", + /* 67*/ "Clon del Presidente\n", + /* 68*/ "Guarda del Pelagic II\n", + /* 69*/ "Soldado Maian\n", + /* 70*/ "Esmoquin\n", + /* 71*/ "- no hay mando conectado a la ranura 1 -", + /* 72*/ "por favor, apaga la consola y conecta un mando", + /* 73*/ "DETECTADO", + /* 74*/ "NO DETECTADO", + /* 75*/ "tm", + /* 76*/ "N64 EXPANSION PAK", + /* 77*/ "Nintendo 64 Product Identification\n", + /* 78*/ "Product ID:\n", + /* 79*/ "Product Code:\n", + /* 80*/ "Variant:\n", + /* 81*/ "Developer:\n", + /* 82*/ "Perfect Dark\n", + /* 83*/ "NUS-NPDE-USA\n", + /* 84*/ "PAL version 8.7 final\n", + /* 85*/ "Rare Ltd. (twycross)\n", + /* 86*/ "Copyright Rare Ltd. 2000\n", + /* 87*/ "The Rareware Logo and Perfect Dark are trademarks of Rare Ltd.\n", + /* 88*/ "Presented in Dolby Surround. Dolby and the double-D\nsymbol are trademarks of Dolby Laboratories.", + /* 89*/ "Uses Miles Sound System Copyright 1991-1999 RAD Game Tools Inc.\nMPEG Layer-3 playback supplied with the Miles Sound System from\nRAD Game Tools, Inc. MPEG Layer-3 audio compression technology\nlicensed by Fraunhofer IIS and THOMSON multimedia\n", + /* 90*/ "", + /* 91*/ "", + /* 92*/ "", + /* 93*/ "rare designs on the future <<<\n", + /* 94*/ "Published by Rareware.\n", + /* 95*/ "Perfect Dark\n", + /* 96*/ "Elige Tu Realidad\n", + /* 97*/ "Nuevo...\n", + /* 98*/ "Nuevo Agente...\n", + /* 99*/ "Ficheros de Juego\n", + /*100*/ "Copiar:\n", + /*101*/ "Borrar:\n", + /*102*/ "Borrar Notas de Juego...\n", + /*103*/ "Fichero de Agente Un Jugador\n", + /*104*/ "Fichero de Opciones del Simulador\n", + /*105*/ "Ficheros de Jugador del Simulador\n", + /*106*/ "Ficheros PerfectHead\n", + /*107*/ "Menú Controller Pak\n", + /*108*/ "Usa este menú para borrar notas de juego\nde tus Controller Pak.\n", + /*109*/ "Elige Controller Pak a Editar:\n", + /*110*/ "Salir\n", + /*111*/ "Cartucho\n", + /*112*/ "Controller Pak 1\n", + /*113*/ "Controller Pak 2\n", + /*114*/ "Controller Pak 3\n", + /*115*/ "Controller Pak 4\n", + /*116*/ "Menú Perfecto\n", + /*117*/ "Misiones Solo\n", + /*118*/ "Simulador de Combate\n", + /*119*/ "Co-Operativo\n", + /*120*/ "Contra-Operativa\n", + /*121*/ "Películas\n", + /*122*/ "Selecciona Misión\n", + /*123*/ "Misión 1\n", + /*124*/ "Misión 2\n", + /*125*/ "Misión 3\n", + /*126*/ "Misión 4\n", + /*127*/ "Misión 5\n", + /*128*/ "Misión 6\n", + /*129*/ "Misión 7\n", + /*130*/ "Misión 8\n", + /*131*/ "Misión 9\n", + /*132*/ "Asignaciones Especiales\n", + /*133*/ "Central dataDyne", + /*134*/ "- Comienzo", + /*135*/ "Lab. dataDyne", + /*136*/ "- Investigación", + /*137*/ "Central dataDyne", + /*138*/ "- Extracción", + /*139*/ "Villa Carrington", + /*140*/ "- Rehén Uno", + /*141*/ "Chicago", + /*142*/ "- Sigilo", + /*143*/ "Edificio G5", + /*144*/ "- Reconocimiento", + /*145*/ "Área 51", + /*146*/ "- Infiltración", + /*147*/ "Área 51", + /*148*/ "- Rescate", + /*149*/ "Área 51", + /*150*/ "- Escape", + /*151*/ "Base Aérea", + /*152*/ "- Espionaje", + /*153*/ "Air Force One", + /*154*/ "- Antiterrorismo", + /*155*/ "Lugar del Impacto", + /*156*/ "- Confrontación", + /*157*/ "Pelagic II", + /*158*/ "- Exploración", + /*159*/ "Mar Profundo", + /*160*/ "- Anular Amenaza", + /*161*/ "Instituto Carrington", + /*162*/ "- Defensa", + /*163*/ "Nave de Ataque", + /*164*/ "- Asalto", + /*165*/ "Ruinas Skedar", + /*166*/ "- Templo", + /*167*/ "Venganza de Mr. Blonde", + /*168*/ "SOS Maian", + /*169*/ "Retomando el Instituto", + /*170*/ "¡GUERRA!", + /*171*/ "El Duelo", + /*172*/ "Estatus\n", + /*173*/ "¡Abortar!\n", + /*174*/ "Cuidado\n", + /*175*/ "¿Quieres abortar la misión?\n", + /*176*/ "Cancelar\n", + /*177*/ "Abortar\n", + /*178*/ "Inventario\n", + /*179*/ "Armas Disponibles\n", + /*180*/ "Opciones\n", + /*181*/ "Audio\n", + /*182*/ "Vídeo\n", + /*183*/ "Controles\n", + /*184*/ "Pantalla\n", + /*185*/ "Trucos\n", + /*186*/ "Guardar Juego\n", + /*187*/ "Cambiar Agente...\n", + /*188*/ "Cuidado\n", + /*189*/ "¿Quieres cargar otro agente?\n", + /*190*/ "Sí\n", + /*191*/ "No\n", + /*192*/ "Opciones de Control\n", + /*193*/ "Controles Jugador 2\n", + /*194*/ "Estilo de Control\n", + /*195*/ "Control Opuesto\n", + /*196*/ "Mirar al Frente\n", + /*197*/ "Giro de Cabeza\n", + /*198*/ "Auto-Apuntar\n", + /*199*/ "Control Apuntar\n", + /*200*/ "Volver\n", + /*201*/ "Mantener\n", + /*202*/ "Cambiar\n", + /*203*/ "Opciones de Pantalla\n", + /*204*/ "Pantalla Jugador 2\n", + /*205*/ "Mirilla en Pantalla\n", + /*206*/ "Siempre Muestra Objetivo\n", + /*207*/ "Mostrar Alcance del Zoom\n", + /*208*/ "Munición en Pantalla\n", + /*209*/ "Mostrar Función del Arma\n", + /*210*/ "Bolas de Pintura\n", + /*211*/ "Subtítulos\n", + /*212*/ "Mostrar Tiempo de Misión\n", + /*213*/ "Volver\n", + /*214*/ "Opciones de Vídeo\n", + /*215*/ "Tamaño de Pantalla\n", + /*216*/ "Ratio\n", + /*217*/ "Alta Resolución\n", + /*218*/ "Pantalla Partida 2 Jugadores\n", + /*219*/ "Volver\n", + /*220*/ "Completa\n", + /*221*/ "Panorámica\n", + /*222*/ "Cine\n", + /*223*/ "Normal\n", + /*224*/ "16:9\n", + /*225*/ "Horizontal\n", + /*226*/ "Vertical\n", + /*227*/ "Opciones de Audio\n", + /*228*/ "Sonido\n", + /*229*/ "Música\n", + /*230*/ "Modo de Sonido\n", + /*231*/ "Volver\n", + /*232*/ "Mono", + /*233*/ "Estéreo", + /*234*/ "Cascos", + /*235*/ "Surround", + /*236*/ "Controles\n", + /*237*/ "Simple\n", + /*238*/ "Doble\n", + /*239*/ "1.1", + /*240*/ "1.2", + /*241*/ "1.3", + /*242*/ "1.4", + /*243*/ "2.1", + /*244*/ "2.2", + /*245*/ "2.3", + /*246*/ "2.4", + /*247*/ "Informe\n", + /*248*/ "Elegir Dificultad\n", + /*249*/ "Dificultad\n", + /*250*/ "Mejor Tiempo\n", + /*251*/ "Agente\n", + /*252*/ "Agente Especial\n", + /*253*/ "Agente Perfecto\n", + /*254*/ "Cancelar\n", + /*255*/ "Opciones Modo Cooperativo\n", + /*256*/ "Radar Sí\n", + /*257*/ "Fuego Amigo\n", + /*258*/ "Compañero Perfecto\n", + /*259*/ "Continuar\n", + /*260*/ "Cancelar\n", + /*261*/ "Humano", + /*262*/ "1 Simulante", + /*263*/ "2 Simulantes", + /*264*/ "3 Simulantes", + /*265*/ "4 Simulantes", + /*266*/ "Opciones Contra-Operativa\n", + /*267*/ "Radar Sí\n", + /*268*/ "Contra-Operativa\n", + /*269*/ "Continuar\n", + /*270*/ "Cancelar\n", + /*271*/ "Jugador 1", + /*272*/ "Jugador 2", + /*273*/ "Visión General\n", + /*274*/ "Aceptar\n", + /*275*/ "Declinar\n", + /*276*/ "Completado\n", + /*277*/ "Fallado\n", + /*278*/ "Estatus de Misión:\n", + /*279*/ "Estatus de Agente:\n", + /*280*/ "Tiempo de Misión:\n", + /*281*/ "Arma Preferida:\n", + /*282*/ "Muertos:\n", + /*283*/ "Precisión:\n", + /*284*/ "Total Disparos:\n", + /*285*/ " Disp. Cabeza:\n", + /*286*/ " Disp. Cuerpo:\n", + /*287*/ " Disp. Miembros:\n", + /*288*/ " Otros:\n", + /*289*/ "Pulsa START\n", + /*290*/ "Difunto\n", + /*291*/ "Activo\n", + /*292*/ "Anulado\n", + /*293*/ "Fallada\n", + /*294*/ "Completada\n", + /*295*/ "Abortada\n", + /*296*/ "Reintentar", + /*297*/ "Sig. Misión", + /*298*/ "Aceptar\n", + /*299*/ "Declinar\n", + /*300*/ "Objetivos\n", + /*301*/ "Pulsa START\n", + /*302*/ "Menú Pequeño pero Perfecto\n", + /*303*/ "Simulador de Combate\n", + /*304*/ "Entrenamiento\n", + /*305*/ "Audio/Vídeo\n", + /*306*/ "Cambiar Agente\n", + /*307*/ "Audio/Visual\n", + /*308*/ "Sonido\n", + /*309*/ "Música\n", + /*310*/ "Modo de Sonido\n", + /*311*/ "Ratio\n", + /*312*/ "Volver\n", + /*313*/ "< Vacío >\n", + /*314*/ "SUPR", + /*315*/ "MAY.", + /*316*/ "SALIR", + /*317*/ "OK", + /*318*/ "Cabezas Simulador Combate\n", + /*319*/ "Cabezas de Misiones\n", + /*320*/ "Error\n", + /*321*/ "Cancelar\n", + /*322*/ "El Controller Pak\nno se encontró\nen ningún mando.\n", + /*323*/ "El fichero no ha sido salvado.\n", + /*324*/ "El fichero no se cargará.\n", + /*325*/ "No se puede borrar el fichero.\n", + /*326*/ "Sin memoria.\n", + /*327*/ "Este jugador ya ha sido\ncargado en este juego.\n", + /*328*/ "ha sido quitado.\n", + /*329*/ "El Controller Pak está dañado o mal insertado.\n", + /*330*/ "Falló el borrado de la Nota de Juego.\n", + /*331*/ "Error Cargando\n", + /*332*/ "Error Guardando\n", + /*333*/ "Error Cargando\n", + /*334*/ "Error Guardando\n", + /*335*/ "Error Cargando\n", + /*336*/ "Error Guardando\n", + /*337*/ "Error Leyendo\n", + /*338*/ "Error Escribiendo\n", + /*339*/ "Error\n", + /*340*/ "Borrar Fallado\n", + /*341*/ "No se puede borrar el fichero.\n", + /*342*/ "- Comprueba que el Controller Pak\nestá insertado correctamente.\n", + /*343*/ "Cancelar\n", + /*344*/ "No hay espacio.\n", + /*345*/ "¡Bien!\n", + /*346*/ "Fichero Guardado.\n", + /*347*/ "Aceptar\n", + /*348*/ "Ha aparecido un error\nal intentar guardar.\n", + /*349*/ "Reintentar\n", + /*350*/ "Guardar en otro Sitio\n", + /*351*/ "Cancelar\n", + /*352*/ "Ha aparecido un error\nal intentar cargar.\n", + /*353*/ "Reintentar\n", + /*354*/ "Cancelar\n", + /*355*/ "Necesitas Espacio para la Cabeza\n", + /*356*/ "Elige una cabeza para cargar encima:\n", + /*357*/ "Aceptar\n", + /*358*/ "Cancelar\n", + /*359*/ "Guardar\n", + /*360*/ "¿Quieres guardar tu\nfichero en otro sitio?\n", + /*361*/ "Sí\n", + /*362*/ "No\n", + /*363*/ "Por favor, inserta el Controller Pak que contiene tu %s en cualquier mando.\n", + /*364*/ "Por favor, inserta el\nController Pak\ndonde estés salvando\nen cualquier mando.\n", + /*365*/ "Aceptar\n", + /*366*/ "Cancelar\n", + /*367*/ "Elige Lugar\n", + /*368*/ "Dónde\n", + /*369*/ "Espacios\n", + /*370*/ "Borrar Ficheros...\n", + /*371*/ "Cancelar\n", + /*372*/ "Completo", + /*373*/ "Copiar Fichero\n", + /*374*/ "Elige fichero a copiar:\n", + /*375*/ "Pulsa B para salir.\n", + /*376*/ "Borrar Fichero\n", + /*377*/ "Elige fichero a borrar:\n", + /*378*/ "Pulsa B para salir.\n", + /*379*/ "Cuidado\n", + /*380*/ "¿Seguro que quieres\nborrar este fichero?\n", + /*381*/ "Cancelar\n", + /*382*/ "Aceptar\n", + /*383*/ "Borrar Nota de Juego\n", + /*384*/ "¿Estás seguro de\nque quieres borrar\nesta nota de juego?\n", + /*385*/ "No\n", + /*386*/ "Sí\n", + /*387*/ "Notas de Juego\n", + /*388*/ "Borra Notas de Juego:\n", + /*389*/ "Nota\n", + /*390*/ "Páginas\n", + /*391*/ "Pulsa B para salir.\n", + /*392*/ "Vacío\n", + /*393*/ "--\n", + /*394*/ "Páginas Libres: \n", + /*395*/ "Páginas Libres: %d\n", + /*396*/ "Páginas Usadas: \n", + /*397*/ "Páginas Usadas: %d\n", + /*398*/ "Ya existe información de Perfect Dark\nen este Controller Pak.\n", + /*399*/ "Hay espacio suficiente para\nnotas de Perfect Dark.\n", + /*400*/ "El Controller Pak está demasiado lleno - 1 nota\ny 28 páginas son necesarias para guardar.\n", + /*401*/ "Introduce Nombre del Agente\n", + /*402*/ "Nuevo...\n", + /*403*/ "Nuevo Agente...\n", + /*404*/ "Nuevo Recluta", + /*405*/ "Tiempo de Misión:", + /*406*/ "Desafío 1", + /*407*/ "Desafío 2", + /*408*/ "Desafío 3", + /*409*/ "Desafío 4", + /*410*/ "Desafío 5", + /*411*/ "Desafío 6", + /*412*/ "Desafío 7", + /*413*/ "Desafío 8", + /*414*/ "Desafío 9", + /*415*/ "Desafío 10", + /*416*/ "Desafío 11", + /*417*/ "Desafío 12", + /*418*/ "Desafío 13", + /*419*/ "Desafío 14", + /*420*/ "Desafío 15", + /*421*/ "Desafío 16", + /*422*/ "Desafío 17", + /*423*/ "Desafío 18", + /*424*/ "Desafío 19", + /*425*/ "Desafío 20", + /*426*/ "Desafío 21", + /*427*/ "Desafío 22", + /*428*/ "Desafío 23", + /*429*/ "Desafío 24", + /*430*/ "Desafío 25", + /*431*/ "Desafío 26", + /*432*/ "Desafío 27", + /*433*/ "Desafío 28", + /*434*/ "Desafío 29", + /*435*/ "Desafío 30", + /*436*/ "Especial\n", + /*437*/ "Introducción\n", + /*438*/ "Misión 1 - Central dataDyne\n", + /*439*/ "Misión 2 - Villa Carrington\n", + /*440*/ "Misión 3 - Edificio G5\n", + /*441*/ "Misión 4 - Área 51\n", + /*442*/ "Misión 5 - Air Force One\n", + /*443*/ "Misión 6 - Pelagic II\n", + /*444*/ "Misión 7 - Instituto Carrington\n", + /*445*/ "Misión 8 - Nave de Ataque Skedar\n", + /*446*/ "Misión 9 - Ruinas Skedar\n", + /*447*/ "Final\n", + /*448*/ "Mostrar Todo\n", + /*449*/ "Introducción\n", + /*450*/ "Intro 1:1 - En la Oscuridad\n", + /*451*/ "Final 1:1 - Descenso Rápido\n", + /*452*/ "Intro 1:2 - Bajando\n", + /*453*/ "Final 1:2 - El Doctor\n", + /*454*/ "Intro 1:3 - Luces Fuera\n", + /*455*/ "Final 1:3 - ¿Dónde vas?\n", + /*456*/ "Intro 2:1 - ¡Negocia esto!\n", + /*457*/ "Intro 2 2:1 - Vida en Línea\n", + /*458*/ "Final 2:1 - Carrington Rescatado\n", + /*459*/ "Intro 3:1 - Callejón Oscuro\n", + /*460*/ "Final 3:1 - Entrando al G5\n", + /*461*/ "Intro 3:2 - Armas y Poses\n", + /*462*/ "Especial 3:2 - Conspiración\n", + /*463*/ "Final 3:2 - Salida de Incendios\n", + /*464*/ "Intro 4:1 - Vídeos\n", + /*465*/ "Final 4:1 - Sin Salida\n", + /*466*/ "Intro 4:2 - Perlas de Sabiduría\n", + /*467*/ "Final 4:2 - A Cuchillo\n", + /*468*/ "Intro 4:3 - ¡Gas!\n", + /*469*/ "Especial 4:3 - Elvis Despierta\n", + /*470*/ "Final 4:3 - Escape\n", + /*471*/ "Intro 5:1 - Gran Altitud\n", + /*472*/ "Final 5:1 - Despegue\n", + /*473*/ "Intro 5:2 - Última Oportunidad\n", + /*474*/ "Especial 5:2 - Atraque\n", + /*475*/ "Final 5:2 - Sin Opciones\n", + /*476*/ "Intro 5:3 - Horizontes Rojos\n", + /*477*/ "Final 5:3 - Maníaco Rubio\n", + /*478*/ "Intro 6:1 - Sube a Bordo\n", + /*479*/ "Final 6:1 - Descendiendo\n", + /*480*/ "Intro 6:2 - Más Profundo\n", + /*481*/ "Especial 6:2 - ¡Virus!\n", + /*482*/ "Final 6:2 - Saliendo\n", + /*483*/ "Intro 7:1 - Saludo Victorioso\n", + /*484*/ "Final 7:1 - Ayudando a Escapar\n", + /*485*/ "Intro 8:1 - ¡Atrapada!\n", + /*486*/ "Final 8:1 - Buscando Problemas\n", + /*487*/ "Intro 9:1 - Aire en Calma\n", + /*488*/ "Final 9:1 - ¡Te pillé!\n", + /*489*/ "Secuencia Final\n", + /*490*/ "Películas\n", + /*491*/ "Oculto %d\n", + /*492*/ "Escoge Objetivo\n", + /*493*/ "Puntuación\n", + /*494*/ NULL, + /*495*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamE.c b/src/files/lang/pal-final/pamE.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-final/pamE.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamJ.c b/src/files/lang/pal-final/pamJ.c new file mode 100644 index 000000000..0db883d61 --- /dev/null +++ b/src/files/lang/pal-final/pamJ.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the codebreaker construct will reassert his control over the both the sapient shell and such parts of the Cetan ship as the codebreaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne corporation.\n\n|Carrington - \n\nOur cursory examination of the research data is astounding. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the control room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate Teleportals\n", + /* 6*/ "Disable Cetan Megaweapon\n", + /* 7*/ "Secure Control Room\n", + /* 8*/ "Restore Dr Caroll's Personality\n", + /* 9*/ "Escape From Cetan Ship\n", + /* 10*/ "This will help us to get us round the\nship quicker.\n", + /* 11*/ "This antibody masking will protect us from\nthe automatic defences.\n", + /* 12*/ "There's Dr Caroll. Let's see if we can\nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis Has Been Killed\n", + /* 15*/ "Dr Caroll Has Been Killed\n", + /* 16*/ "Cetan Ship Evacuation Successful\n", + /* 17*/ "Elvis Has Unlocked The Door\n", + /* 18*/ "Here, take this gun and keep those skedar\noff my back while i'm working\n", + /* 19*/ "Antibody Masking Has Been Obtained.\n", + /* 20*/ "Cetan Megaweapon Has Been Disabled.\n", + /* 21*/ "Control Room Has Been Secured.\n", + /* 22*/ "Dr Carolls Personality Has Been Restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup Disk\n", + /* 26*/ "A Backup Disk\n", + /* 27*/ "\n", + /* 28*/ "Cover Me Jo, I'll Unlock Those Doors.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No-one's around.", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.", + /* 34*/ "There has to be someone further inside. Cover me.", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...", + /* 36*/ "Virus detected.", + /* 37*/ "Me and my big mouth.", + /* 38*/ "Commencing countermeasures. Commenc....***(gibberish.. squalk.. squalk.. etc..)*** I don't believe it, those vandals have been rearranging my circuitry. I feel cheapened... used! I'm a tart!", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.", + /* 41*/ "What do you mean?", + /* 42*/ "When the program has run I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and unfortunately myself along with it. I'm sorry, Joanna: there is no other way, and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honour to work with you. Goodbye, Joanna Dark.", + /* 43*/ NULL, + /* 44*/ NULL, + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pamP.c b/src/files/lang/pal-final/pamP.c new file mode 100644 index 000000000..a008fec62 --- /dev/null +++ b/src/files/lang/pal-final/pamP.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. It's up to you - destroy the power nodes throughout the ship, and the weapon will be inoperable. Some may be beyond the reach of normal weapons.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Restore Dr. Caroll's Personality\n\nThis is the last stage of the contingency plan Dr. Caroll put forward during his debriefing at the villa. Restoring his personality to the code breaker construct will reassert his control over both the sapient shell and such parts of the Cetan ship as the code breaker has been able to take over.\n\n|Objective Five: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 1*/ "CETAN SHIP\n", + /* 2*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Secure Control Room\n\nMake sure that Skedar are cleared from the Control Room to enable you to restore Dr. Caroll's personality backup without interruption. We have no idea what safeguards might have been put in place to prevent anyone attempting this, so be careful.\n\n|Objective Four: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 3*/ "|Background - \n\nThe goal of the conspiracy is revealed at last - a massive alien ship lies on the floor of the Pacific. At least partially sentient, though sleeping, the Cetan ship is even now being overrun by the Skedar and their unwitting minions, the dataDyne Corporation.\n\n|Carrington - \n\nOur cursory examination of the research data astounds us. We've put together as many objectives as we can based on our interpretation of this data. The massive structure on the sea floor is a spacecraft of alien origin. It is apparently a sentient craft, of a race called the Cetans, though it is currently dormant. However, it houses the most dangerous weapon you could imagine.\n\n|Objective One: - Reactivate Teleportals\n\nReturning the teleportals to active status will mean you are able to access regions of the Cetan ship that would otherwise be inaccessible; if the Skedar have managed to block off entry to the Control Room, then the long way round might be your only other way in.\n\n|Objective Two: - Disable Cetan Megaweapon\n\nThis is what it is all about - a weapon of fantastic magnitude. According to the deciphered research notes, it is capable of reversing the weak nuclear forces that hold molecules together. If the Skedar get their hands on this, Earth will be an expanding cloud of dust within the hour. Elvis will sabotage the weapon's systems if you can get him to a terminal.\n\n|Objective Three: - Escape From Cetan Ship\n\nEscape with Elvis and Dr. Caroll to the docking bay after ensuring the destruction of the vessel by any means necessary. Use the submersible to return to the surface, where you will be collected by the cruiser HMAS Newcastle.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Reactivate teleportals\n", + /* 6*/ "Disable Cetan megaweapon\n", + /* 7*/ "Secure control room\n", + /* 8*/ "Restore Dr. Caroll's personality\n", + /* 9*/ "Escape from Cetan ship\n", + /* 10*/ "This will help us to get round the \nship quicker.\n", + /* 11*/ "This antibody masking will protect us from \nthe automatic defenses.\n", + /* 12*/ "There's Dr. Caroll. Let's see if we can \nreverse what was done to him.\n", + /* 13*/ "We have to get out of here!\n", + /* 14*/ "Elvis has been killed.\n", + /* 15*/ "Dr. Caroll has been killed.\n", + /* 16*/ "Cetan ship evacuation successful.\n", + /* 17*/ "Elvis has unlocked the door.\n", + /* 18*/ "Here, take this gun and keep those Skedar \noff my back while I'm working.\n", + /* 19*/ "Antibody masking has been obtained.\n", + /* 20*/ "Cetan megaweapon has been disabled.\n", + /* 21*/ "Control Room has been secured.\n", + /* 22*/ "Dr. Caroll's personality has been restored.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Backup disk\n", + /* 26*/ "A backup disk\n", + /* 27*/ "\n", + /* 28*/ "It looks like this could benefit from \na little bit of sabotage.\n", + /* 29*/ "Time to reactivate those teleportals.\n", + /* 30*/ "Teleportals have been reactivated.\n", + /* 31*/ "This doesn't seem normal. No one's around.\n", + /* 32*/ "No signs of conflict. No spent ammo cases or bullet holes.\n", + /* 33*/ "But there ought to be a rear guard at least. It makes no sense.\n", + /* 34*/ "There has to be someone farther inside. Cover me.\n", + /* 35*/ "Here goes. I just hope dataDyne haven't done anything to prevent this...\n", + /* 36*/ "Virus detected.\n", + /* 37*/ "Me and my big mouth.\n", + /* 38*/ "Commencing countermeasures. Commenc..... *** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Are you in control again? Can you stop the program?\n", + /* 40*/ "Yes, I'm back again, my dear. But the program has run far too long for me to prevent it from completing. There is only one way out now.\n", + /* 41*/ "What do you mean?\n", + /* 42*/ "When the program has run, I will have control of a vastly powerful weapon. It cannot be allowed to exist. So I must destroy the Cetan and, unfortunately, myself along with it. I'm sorry, Joanna... There is no other way and no time to discuss this. Go now - avoid the Skedar and you will have time to escape. It has been an honor to work with you. Goodbye, Joanna Dark.\n", + /* 43*/ "Cetan megaweapon has been disabled.\n", + /* 44*/ "Ammo wasted - unable to disable megaweapon.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_f.c b/src/files/lang/pal-final/pam_str_f.c new file mode 100644 index 000000000..f6ce2d90c --- /dev/null +++ b/src/files/lang/pal-final/pam_str_f.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Sécuriser la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif 4: - Restaurer la personnalité du Dr. Caroll\n\nC'est la dernière étape du plan d'urgence mis en place par le Dr. Caroll durant le debriefing à la villa. Restaurer sa personnalité à l'I.A. lui permettra de reprendre le contrôle de l'enveloppe douée de raison et d'autres parties du vaisseau.\n\n|Objectif 5: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 1*/ "VAISSEAU CETAN\n", + /* 2*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existé.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Sécuriser la Salle de Contrôle\n\nAssurez-vous qu'il ne reste plus aucun Skedar dans la Salle de Contrôle afin de pouvoir restaurer la personnalité du Dr. Caroll sans interruption. Nous ne savons pas quelles sécurités ont été mises en place pour empêcher cette opération, alors soyez prudente.\n\n|Objectif 4: - Evasion du vaisseau cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin découvert le but de la conspiration : un gigantesque vaisseau extraterrestre repose au fond de l'océan Pacifique. Bien qu'inactif, le vaisseau cetan est maintenant pris d'assaut par les Skedars et leur alliée forcée: la dataDyne Corporation.\n\n|Carrington - \n\nLa première analyse des données révèle des informations incroyables. Nous avons déterminé autant d'objectifs que possible à partir de ces informations. La gigantesque structure au fond de l'océan est un vaisseau d'origine extraterrestre. C'est apparemment un vaisseau doué de raison - produit par une race extraterrestre, les Cetans - bien qu'il soit pour l'instant endormi. Cependant, il abrite l'arme la plus puissante qui ait jamais existée.\n\n|Objectif 1: - Réactiver les téléporteurs\n\nRéactiver les téléporteurs vous permet d'accéder à des parties du vaisseau qui étaient normalement inaccessibles. Si les Skedars ont réussi à bloquer l'accès à la Salle de Contrôle, le chemin le plus long sera sûrement le seul et unique possible.\n\n|Objectif 2: - Neutraliser la Super-Arme cetan\n\nC'est une arme d'une puissance fantastique. Selon les notes analysées, elle est capable de disloquer le faible lien qui maintient les molécules entre elles. Si les Skedars mettent la main dessus, la Terre se transformera dans l'heure en un vaste nuage de poussière. A vous donc de jouer: détruisez les modules dans le vaisseau et l'arme ne fonctionnera plus. Certains seront peut-être hors de portée des armes normales.\n\n|Objectif 3: - Evasion du vaisseau Cetan\n\nEchappez-vous avec Elvis et le Dr. Caroll par les soutes, après vous être assurés de la destruction du vaisseau par n'importe quel moyen. Utilisez le sous-marin pour gagner la surface, où le croiseur HMAS Newcastle vous récupérera.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Réactiver téléporteurs\n", + /* 6*/ "Neutraliser Super-Arme Cetan\n", + /* 7*/ "Sécuriser la Salle de Contrôle\n", + /* 8*/ "Restaurer la personnalité du Dr. Caroll\n", + /* 9*/ "S'échapper du vaisseau cetan\n", + /* 10*/ "Cela nous aidera à nous déplacer plus\n vite dans ce vaisseau.\n", + /* 11*/ "Ce camouflage corporel nous aidera à nous \nprotéger des défenses automatiques.\n", + /* 12*/ "Voilà le Dr. Caroll. Voyons voir si nous \npouvons inverser le processus.\n", + /* 13*/ "On doit se barrer d'ici!\n", + /* 14*/ "Elvis a été tué.\n", + /* 15*/ "Dr. Caroll a été tué.\n", + /* 16*/ "Evacuation du vaisseau Cetan réussie.\n", + /* 17*/ "Elvis a déverrouillé la porte.\n", + /* 18*/ "Tiens, prends cette arme et tiens ces Skedars à distance pendant que je travaille.\n", + /* 19*/ "Camouflage corporel obtenu.\n", + /* 20*/ "Super-Arme Cetan neutralisée.\n", + /* 21*/ "Salle de Contrôle sécurisée.\n", + /* 22*/ " Personnalité du Dr. Caroll restaurée.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disque sauvegarde\n", + /* 26*/ "Un disque sauvegarde \n", + /* 27*/ "\n", + /* 28*/ "Un peu de sabotage ne ferait pas de mal\n à ce truc.\n", + /* 29*/ "Il est temps de réactiver ces téléporteurs.\n", + /* 30*/ "Téléporteurs réactivés.\n", + /* 31*/ "C'est bizarre, il n'y a personne dans le coin.\n", + /* 32*/ "Pas de traces de combat. Pas de douilles ou d'impacts d'armes à feu.\n", + /* 33*/ "Ca n'a pas de sens. Il devrait au moins y avoir une arrière-garde.\n", + /* 34*/ "Il doit y avoir quelqu'un plus loin. Couvre-moi.\n", + /* 35*/ "C'est parti... J'espère que la dataDyne n'a rien prévu pour empêcher ça...\n", + /* 36*/ "Virus détecté.\n", + /* 37*/ "Ca m'apprendra, tiens...\n", + /* 38*/ "Lancement des contre-mesures. Lancem...***ooOOoh!!***aaAAh!!***aaAAAhh!! ***ooOOoh!!***YaaAAAhh!!***YEEAaAaAaAAAaAAaAHHH!!***\n", + /* 39*/ "Dr. Caroll? Avez-vous repris le contrôle? Pouvez-vous arrêter le programme?\n", + /* 40*/ "En effet, me voilà de retour, très chère. Le programme est lancé depuis trop longtemps pour que je puisse l'arrêter. Il n'y a qu'une seule issue maintenant.\n", + /* 41*/ "Que voulez-vous dire?\n", + /* 42*/ "Quand le programme sera terminé, j'aurai le contrôle d'une arme extrêmement puissante. Cette arme ne doit pas exister. Je dois par conséquent détruire le vaisseau cetan et moi avec, malheureusement. Joanna... Nous n'avons ni le choix ni le temps d'en discuter. Allez-y! Evitez les Skedars et vous aurez le temps de vous échapper. Ce fut un honneur de travailler avec vous. Adieu, Joanna Dark.\n", + /* 43*/ "La Super-Arme Cetan a été neutralisée.\n", + /* 44*/ "Munitions épuisées - arme ennemie ne peut être détruite.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_g.c b/src/files/lang/pal-final/pam_str_g.c new file mode 100644 index 000000000..ce54ba24b --- /dev/null +++ b/src/files/lang/pal-final/pam_str_g.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Zerstören Sie alle Kraftknoten innerhalb des Schiffes. Nur so können Sie die Waffe außer Kraft setzen. Einige dieser Knoten könnten sich aber außerhalb menschlicher Reichweite befinden.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persönlichkeit ungestört restaurieren können. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Restaurieren Sie Dr. Carolls Persönlichkeitsprofil!\n\nDies ist die letzte Stufe des Notfallplans, über den uns Dr. Caroll bei seinem Aufenthalt in der Villa informiert hat. Wenn seine Persönlichkeit mit der Codeknacker-Einheit verbunden ist, erlangt er nicht nur wieder die Kontrolle über den Sapienten, sondern auch über manche Teile des Cetanischen Schiffs.\n\n|5. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 1*/ "CETANISCHES SCHIFF\n", + /* 2*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben,besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Sichern Sie den Kontrollraum!\n\nDer Kontrollraum muss von allen anwesenden Skedar befreit werden, damit Sie Dr. Carolls Persönlichkeit ungestört restaurieren können. Wir wissen nicht, welche Vorkehrungen von den Skedar getroffen wurden, um gerade dies zu verhindern. Seien Sie vorsichtig!\n\n|4. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Ziel der Verschwörung wurde endlich aufgedeckt. Am Grunde des Pazifischen Ozeans liegt ein Schiff außerirdischen Ursprungs. Zwar scheint das Schiff zu schlafen, doch ist es partiell empfindungsfähig. Leider wird es derzeit von den Skedar und ihrem ahnungslosen Günstling, der dataDyne Corporation, überrannt.\n\n|Carrington - \n\nBereits die oberflächliche Auswertung der Forschungsdaten hat uns in Erstaunen versetzt. Basierend auf unserer Interpretation dieser Daten ergibt sich eine Reihe von Missionen. Bei dieser gewaltigen Konstruktion auf dem Grund des Meeres handelt es sich um ein außerirdisches Raumschiff. Es ist ein lebender Organismus, kreiert von einer Rasse namens Cetaner. Derzeit scheint es sich in Stasis zu befinden. Auf jeden Fall trägt es die gefährlichste Waffe, die Sie sich vorstellen können, in sich!\n\n|1. Ziel: - Reaktivieren Sie die Teleporter!\n\nDurch das Reaktivieren der Teleporter erhalten Sie Zugang zu Bereichen des Cetanischen Schiffs, die andernfalls unerreichbar wären. Für den Fall, dass die Skedar den Zugang zum Kontrollraum blockiert haben, besteht für Sie zwar die Möglichkeit, eine alternative Route zu wählen, diese ist allerdings wesentlich länger.\n\n|2. Ziel: - Machen Sie die Cetanische Waffe funktionsunfähig!\n\nHierbei handelt es sich um das Hauptziel. Diese Waffe verfügt über unvorstellbare Zerstörungskraft. Nachdem wir die Forschungsdaten ausgewertet haben, kamen wir zu dem Schluss, dass die Waffe die schwachen nuklearen Kräfte, welche alle Moleküle zusammenhalten, reversieren kann. Wenn diese Waffe in die Hände der Skedar gerät, ist die Erde innerhalb einer Stunde nicht mehr als eine schwach expandierende Staubwolke im All. Bringen Sie Elvis zu einem Terminal, damit er von dort aus die Waffensysteme sabotieren kann.\n\n|3. Ziel: - Flüchten Sie aus dem Cetanischen Schiff!\n\nStellen Sie sicher, dass das Schiff unter allen Umständen zerstört wird. Anschließend müssen Sie mit Dr. Caroll und Elvis das Dock erreichen. Gelangen Sie mit Hilfe des Tauchboots an die Oberfläche. Dort sollten Sie von der M.S. Newcastle aufgenommen werden.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Reaktivieren Sie die Teleporter!\n", + /* 6*/ "Machen Sie die Waffe funktionsunfähig!\n", + /* 7*/ "Sichern Sie den Kontrollraum!\n", + /* 8*/ "Restaurieren Sie Dr. Caroll!\n", + /* 9*/ "Flüchten Sie aus dem Schiff!\n", + /* 10*/ "Auf diese Weise kommen wir innerhalb des Schiffs\nschneller voran.\n", + /* 11*/ "Diese Tarnkappe schützt uns vor den automatischen\nVerteidigungsanlagen.\n", + /* 12*/ "Da ist Dr. Caroll. Wir müssen versuchen,\nseine Persönlichkeit wieder herzustellen.\n", + /* 13*/ "Wir müssen hier raus!\n", + /* 14*/ "Elvis wurde eliminiert.\n", + /* 15*/ "Dr. Caroll wurde zerstört.\n", + /* 16*/ "Evakuierung erfolgreich\n", + /* 17*/ "Elvis hat die Tür entriegelt.\n", + /* 18*/ "Hier, nimm diese Waffe und halte mir die Skedar\nvom Leib, während ich hier arbeite.\n", + /* 19*/ "Tarnkappe wurde aufgenommen.\n", + /* 20*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 21*/ "Kontrollraum wurde gesichert.\n", + /* 22*/ "Dr. Carolls Presönlichkeitsprofil wurde restauriert.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Sicherungsdiskette\n", + /* 26*/ "Eine Sicherungsdiskette\n", + /* 27*/ "\n", + /* 28*/ "Ich glaube, ein klein wenig Sabotage wäre hier \ndurchaus angebracht.\n", + /* 29*/ "Wir sollten nun diese Teleporter reaktivieren.\n", + /* 30*/ "Teleporter wurde reaktiviert.\n", + /* 31*/ "Irgendwas ist hier faul. Es ist niemand zu sehen.\n", + /* 32*/ "Keine Spuren eines Kampfes. Keine leeren Patronenhülsen oder Einschusslöcher.\n", + /* 33*/ "Aber es sollte zumindest noch eine Wache hier sein. Das macht alles keinen Sinn.\n", + /* 34*/ "Vielleicht finden wir weiter drinnen noch jemanden. Gib mir Deckung.\n", + /* 35*/ "Ich hoffe, dass dataDyne nichts unternommen hat, um zu verhindern, dass...\n", + /* 36*/ "Virus entdeckt.\n", + /* 37*/ "Ich und mein großes Mundwerk.\n", + /* 38*/ "Gegenmaßnahmen werden eingeleitet. Gegenma...*** ooOOoh!! *** eeEEe!! *** aaAhh!! *** oOOoh!! *** aAArRrgghh!! *** YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "Dr. Caroll? Haben Sie sich wieder unter Kontrolle? Können Sie das Programm stoppen?\n", + /* 40*/ "Ich habe mich wieder unter Kontrolle. Aber das Programm läuft schon zu lange. Ich kann es jetzt nicht mehr unterbrechen. Es gibt jetzt nur noch eine Möglichkeit.\n", + /* 41*/ "Wovon sprechen Sie?\n", + /* 42*/ "Wenn das Programm durchgelaufen ist, bin ich der einzige, der diese schreckliche Waffe kontrollieren kann. Ich darf nicht länger existieren. Das Cetanische Schiff muss mit mir zerstört werden. Es gibt leider keine Alternative, Joanna. Glauben Sie mir! Gehen Sie! Weichen Sie den Skedar aus und flüchten Sie! Es war mir eine große Ehre, mit Ihnen zu arbeiten. Leben Sie wohl, Joanna Dark.\n", + /* 43*/ "Die Cetanische Waffe wurde funktionsunfähig gemacht.\n", + /* 44*/ "Munition verschwendet - Die Waffe kann nicht funktionsunfähig gemacht werden.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_i.c b/src/files/lang/pal-final/pam_str_i.c new file mode 100644 index 000000000..b95cc1948 --- /dev/null +++ b/src/files/lang/pal-final/pam_str_i.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Devi disattivare l'arma distruggendo i punti nevralgici di comando sparsi per l'astronave. Attenta: talvolta le armi normali non fuzioneranno.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Restituisci il cervello al Dr. Caroll\n\nQuesta è l'ultima fase del piano di contingenza presentato dal Dr. Caroll durante il suo rapporto alla villa. Riportando il suo cervello alla struttura del decodificatore gli sarà restituita la facoltà di comando sul Sapiente e su quelle parti dell'astronave Cetan inglobate dal decodificatore. \n\n|Obiettivo 5: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 1*/ "ASTRONAVE CETAN\n", + /* 2*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Controlla la sala comandi\n\nAssicurati che gli Skedar stiano lontani dalla sala comandi in modo da permetterti di restituire al Dr. Caroll il suo cervello di backup senza interruzioni. Tuttavia non abbiamo idea di che stratagemmi possano essere stati escogitati per impedirti di portare a termine la tua missione, quindi tieni gli occhi bene aperti!\n\n|Obiettivo 4: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente è stato scoperto lo scopo della cospirazione: un'enorme astronave aliena sul fondo dell'Oceano Pacifico. Si tratta di un mezzo spaziale Cetan dotato di vita propria, sebbene attualmente assopito. Al momento sta subendo l'invasione degli Skedar e dei loro meschini tirapiedi, la dataDyne Corporation.\n\n|Carrington:\n\nI risultati della nostra breve analisi dei dati di ricerca ci hanno lasciati esterrefatti: dall'interpretazione dei dati siamo riusciti a scoprire che la gigantesca struttura sul fondo oceanico non è altro che un'astronave di origine aliena. Apparentemente si tratta di un organismo vivente di una razza nota come Cetan, tuttavia ora sembra addormentato. Contiene la bomba più pericolosa mai esistita!\n\n|Obiettivo 1: - Riattiva i teleportali\n\nLa riattivazione dei portali ti permetterà l'ingresso in settori altrimenti inaccessibili dell'astronave Cetan. Qualora gli Skedar fossero già riusciti a bloccare l'entrata alla sala comandi, la tua unica possibilità d'accesso rimarrebbe la lunga via esterna.\n\n|Obiettivo 2: - Disattiva la megabomba Cetan\n\nEcco la causa di tutti i mali: una bomba di dimensioni inimmaginabili. Secondo le note di ricerca sarebbe in grado di invertire le deboli forze nucleari che tengono assieme le molecole. Se dovesse cadere nelle mani degli Skedar, nel giro di un'ora la Terra sarebbe ridotta ad una nuvola di polvere di cui non rimarrebbe che un vago ricordo. Se riesci a portare Elvis ad uno dei terminali, riuscirà a sabotare l'unità di comando dell'arma.\n\n|Obiettivo 3: - Fuga dall'astronave Cetan\n\nFuggi con Elvis e il Dr. Caroll verso la darsena dopo esserti accertata della distruzione totale dell'astronave con ogni mezzo necessario. Usa l'unità sommergibile per tornare in superficie, dove sarete prelevati dall'incrociatore HMAS Newcastle.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Riattiva i teleportali\n", + /* 6*/ "Disattiva la megabomba Cetan \n", + /* 7*/ "Controlla la sala comandi\n", + /* 8*/ "Restituisci il cervello al Dr. Caroll \n", + /* 9*/ "Fuga dall'astronave Cetan\n", + /* 10*/ "Questo ci aiuterà a fare il giro \ndell'astronave più velocemente.\n", + /* 11*/ "Questa immuno-maschera ci proteggerà \ndalle difese automatiche.\n", + /* 12*/ "Ecco il Dr. Caroll! Vediamo se riusciamo \nancora a recuperarlo.\n", + /* 13*/ "Dobbiamo uscire di qua! Presto!\n", + /* 14*/ "Elvis è stato ucciso.\n", + /* 15*/ "Il Dr. Caroll è stato ucciso.\n", + /* 16*/ "Evacuazione dall'astronave Cetan riuscita.\n", + /* 17*/ "Elvis ha aperto la porta.\n", + /* 18*/ "To'! Prendi questa e tienimi lontano \nquegli Skedar mentre sto lavorando.\n", + /* 19*/ "Trovata immuno-maschera.\n", + /* 20*/ "Disattivata megabomba Cetan.\n", + /* 21*/ "Sala comandi sotto controllo.\n", + /* 22*/ "Restituito il cervello al Dr. Caroll.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco di backup\n", + /* 26*/ "Disco di backup\n", + /* 27*/ "\n", + /* 28*/ "Sembra che un po' di sabotaggio \nnon possa fargli che bene! \n", + /* 29*/ "È ora di riattivare questi teleportali.\n", + /* 30*/ "I teleportali sono stati riattivati.\n", + /* 31*/ "Non è normale! Non si vede anima viva!\n", + /* 32*/ "Tutto tranquillo!!! Niente bossoli, niente tracce di proiettili!\n", + /* 33*/ "Ma ci deve essere almeno qualche retroguardia... Non ha senso!!!\n", + /* 34*/ "Ci deve essere qualcuno all'interno. Coprimi!\n", + /* 35*/ "Ecco! Spero solo che la dataDyne non abbia fatto niente per impedire...\n", + /* 36*/ "Trovato un virus.\n", + /* 37*/ "Io e la mia linguaccia!!!\n", + /* 38*/ "Contromisure adottate... Contromi...***(cric... cric... crac... ecc...)*** Non ci posso credere! Quei vandali mi hanno manipolato i circuiti... ***AAAHIIIAAA... cric... crac...\n", + /* 39*/ "Dr. Caroll? Riprenda il controllo di sé! Riesce a fermare il programma?\n", + /* 40*/ "Sì, sì, ci sono, mia cara! Ma ho paura che il programma sia andato troppo oltre per poterlo fermare adesso. C'è un sola via d'uscita!\n", + /* 41*/ "Cosa significa?\n", + /* 42*/ "Quando il programma avrà finito, sarò ingrado di comandare una bomba potentissima! Non posso permettermi di restare in vita! Devo distruggere i Cetan e con loro me stesso, sfortunatamente! Mi spiace, Joanna... Non c'è altro modo e neanche tempo di discutere la cosa! Ora va! Evita gli Skedar e avrai tutto il tempo di fuggire. È stato un onore lavorare con te. Addio, Joanna Dark!\n", + /* 43*/ "La megabomba Cetan è stata disattivata.\n", + /* 44*/ "Operazione fallita: megabomba ancora attiva.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/pam_str_s.c b/src/files/lang/pal-final/pam_str_s.c new file mode 100644 index 000000000..e5346c7b7 --- /dev/null +++ b/src/files/lang/pal-final/pam_str_s.c @@ -0,0 +1,52 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Depende de ti: destruye los nodos de energía a lo largo de la nave, y el arma dejará de ser operativa. Algunos estarán fuera del alcance de las armas normales.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Restaurar la Personalidad del Dr. Caroll\n\nÉsta es la última fase del plan de contingencia que el Dr. Caroll adelantó durante su informe en la Villa. Restaurar su personalidad a la del creador de códigos de apertura reafirmará su control sobre el caparazón inteligente y aquellas partes de la nave Cetan que como 'rompedor de códigos' es capaz de tomar.\n\n|Objetivo Cinco: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 1*/ "NAVE CETAN\n", + /* 2*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Asegurar la Sala de Control\n\nAsegúrate de que la Sala de Control está libre de Skedar para permitirte restaurar la copia de la personalidad del Dr. Caroll sin interrupciones. No tenemos ni idea de qué salvaguardas han instalado en ese lugar para prevenir que alguien lo intente, así que ten cuidado.\n\n|Objetivo Cuatro: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa meta de la conspiración se conoce por fin: una gigantesca nave alienígena se encuentra en el fondo del Pacífico. Parcialmente orgánica, aunque inactiva, la nave Cetan está siendo invadida por los Skedar y sus inconscientes vasallos de la Corporación dataDyne.\n\n|Carrington - \n\nNuestro primer análisis de los datos de la investigación nos han dejado pasmados. Hemos reunido tantos objetivos como hemos podido basándonos en la interpretación de estos datos. La gigantesca estructura del fondo oceánico es una nave espacial de origen alienígena. Aparentemente es una nave orgánica, de una raza llamada Cetan, aunque ahora está inactiva. No obstante, aloja el arma más peligrosa que puedas imaginar.\n\n|Objetivo Uno: - Reactivar los Teleportales\n\nDevolver los teleportales a un estatus activo significará que tendrás acceso a zonas de la nave Cetan que de otra forma hubieran sido inaccesibles; si los Skedar han logrado bloquear la entrada a la Sala de Control, entonces un largo rodeo será el único acceso disponible que podrás encontrar.\n\n|Objetivo Dos: - Desactivar la Mega-Arma Cetan\n\nEsto es todo lo que sabemos: se trata de un arma de una magnitud fantástica. De acuerdo con las notas de investigación descifradas, es capaz de invertir la débil fuerza nuclear que mantiene las moléculas juntas. Si los Skedar ponen sus garras en esto, la Tierra se convertirá en una creciente nube de polvo en sólo una hora. Elvis saboteará los sistemas del arma si consigues llevarle a la terminal.\n\n|Objetivo Tres: - Escapar de la Nave Cetan\n\nEscapa con Elvis y el Dr. Caroll por la bahía de carga después de asegurar la destrucción de la nave de la forma en que sea posible. Usa el sumergible para volver a la superficie, donde seréis recogidos por el crucero HMAS Newcastle.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Reactivar los teleportales\n", + /* 6*/ "Desactivar la mega-arma Cetan\n", + /* 7*/ "Asegurar la sala de control\n", + /* 8*/ "Restaurar personalidad del Dr. Caroll\n", + /* 9*/ "Escapar de la nave Cetan\n", + /* 10*/ "Esto nos ayudará a recorrer la \nnave más rápido.\n", + /* 11*/ "Este disfraz de anticuerpos nos protegerá \nde las defensas automáticas.\n", + /* 12*/ "Ahí está el Dr. Caroll. Veamos si podemos \narreglar lo que le hicieron.\n", + /* 13*/ "¡Tenemos que salir de aquí!\n", + /* 14*/ "Elvis ha muerto.\n", + /* 15*/ "El Dr. Caroll ha muerto.\n", + /* 16*/ "Evacuación de la nave Cetan exitosa.\n", + /* 17*/ "Elvis ha abierto la puerta.\n", + /* 18*/ "Aquí. Coge este arma y mantén a los Skedar \nalejados de mí mientras trabajo.\n", + /* 19*/ "Máscara de anticuerpos obtenida.\n", + /* 20*/ "La mega-arma Cetan ha sido desactivada.\n", + /* 21*/ "La Sala de Control ha sido asegurada.\n", + /* 22*/ "La personalidad del Dr. Caroll ha sido restaurada.\n", + /* 23*/ "\n", + /* 24*/ "\n", + /* 25*/ "Disco de seguridad\n", + /* 26*/ "Un disco de seguridad\n", + /* 27*/ "\n", + /* 28*/ "Parece que esto puede beneficiarnos para \nun pequeño sabotaje.\n", + /* 29*/ "Es hora de reactivar esos teleportales.\n", + /* 30*/ "Los teleportales han sido reactivados.\n", + /* 31*/ "Esto no es normal. No hay nadie por aquí.\n", + /* 32*/ "No hay señales de lucha. No hay casquillos o agujeros de bala.\n", + /* 33*/ "Pero debería haber un guarda al menos. No tiene sentido.\n", + /* 34*/ "Debe haber alguien más adelante. Cúbreme.\n", + /* 35*/ "Allá vamos. Espero que dataDyne no haya hecho nada para prevenir esto...\n", + /* 36*/ "Virus detectado.\n", + /* 37*/ "¡Qué bocaza tengo!\n", + /* 38*/ "Iniciando contramedidas. Inician.....*** ¡¡ooOOoh!! *** ¡¡eeEEe!! *** ¡¡aaAhh!! *** ¡¡oOOoh!! *** ¡¡aAArRrgghh!! *** ¡¡YEEeeooOOOOOOowWWwlll!! ***\n", + /* 39*/ "¿Dr. Caroll? ¿Tiene el control de nuevo? ¿Puede detener el programa?\n", + /* 40*/ "Sí, estoy de vuelta, cariño. Pero el programa ha estado en marcha demasiado como para detenerlo completamente. Sólo existe una manera de acabar con esto...\n", + /* 41*/ "¿Qué quiere decir?\n", + /* 42*/ "Cuando el programa haya acabado, tendré el control de un arma devastadoramente poderosa. No puede permitirse mi existencia. Así que debo destruir la nave Cetan y a mí mismo con ella. Lo siento, Joanna... No hay otra manera, ni tiempo para discutirlo. Vete. Esquiva a los Skedar y tendrás tiempo para escapar. Ha sido un honor trabajar contigo. Adiós, Joanna Dark.\n", + /* 43*/ "La mega-arma Cetan ha sido inutilizada.\n", + /* 44*/ "Munición desperdiciada - incapaz de desactivar la mega-arma.\n", + /* 45*/ NULL, + /* 46*/ NULL, + /* 47*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteE.c b/src/files/lang/pal-final/peteE.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-final/peteE.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteJ.c b/src/files/lang/pal-final/peteJ.c new file mode 100644 index 000000000..dd9f41ca6 --- /dev/null +++ b/src/files/lang/pal-final/peteJ.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer To Limousine\n\nThe limousine in the main street arrived not long before you did. All attempts at a trace have come up blank so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw them out, leaving the way open.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the build-up of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry To G5 Building\n\none of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve Drop Point Equipment\n", + /* 10*/ "Attach Tracer To Limousine\n", + /* 11*/ "Prepare Escape Route\n", + /* 12*/ "Aquire Diversion Target\n", + /* 13*/ "Create Vehicular Diversion\n", + /* 14*/ "Gain Entry To G5 Building\n", + /* 15*/ "Mine Placed Correctly\n", + /* 16*/ "Mine Placed Incorrectly\n", + /* 17*/ "Virus Already Downloaded Into NavComp\n", + /* 18*/ "Hovcab Is Unresponsive - Need Reprogrammer.\n", + /* 19*/ "Accessing Hovercab Navigation Systems\n", + /* 20*/ "Virus Downloaded Successfully\n", + /* 21*/ "Hovercab Navigation Systems Reprogrammed\n", + /* 22*/ "Connection To HoverCab Broken\n", + /* 23*/ "Tracer Bug Placed Correctly\n", + /* 24*/ "Tracer Bug Placed Incorrectly\n", + /* 25*/ "Mission Critical Vehicle Destroyed\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "Datadyne Limo Has Escaped\n", + /* 29*/ "Unnacceptable Civilian Casualties\n", + /* 30*/ "Look out she's got a gun\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder Alert - Send re-inforcements\n", + /* 33*/ "Elevator Access Sealed\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me\n", + /* 36*/ "Tracer Bug Has Been Noticed\n", + /* 37*/ "Greetings CItizen\n", + /* 38*/ "Obtain Remote Mine\n", + /* 39*/ "Dr Carolls\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine\n", + /* 43*/ "Obtain Tracer Bug\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug\n", + /* 48*/ "Elevator Door Cannot Be Reopened\n", + /* 49*/ "Obtain Reprogrammer\n", + /* 50*/ "Dr Carolls\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer\n", + /* 54*/ "Diversion has been created\n", + /* 55*/ "Obtain Remote Mine\n", + /* 56*/ "Dr Carolls\n", + /* 57*/ "Falcon2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked up doors will\ndo as an escape route.\n", + /* 62*/ "Re-program that taxi - it's a Mark 2, \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set\n", + /* 65*/ "EEPROM flag has been cleared\n", + /* 66*/ "An Alternative Diversion Has Been Created!\n", + /* 67*/ "Tracer Bug Has Been Spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a front for dataDyne and whoever else is involved in this plot. I know Cassandra de Vries is going to be here, but I need to know who else is attending and what they discuss. By the time you get out, the help I requested should have arrived.", + /* 69*/ "Just who is this help you keep referring to?", + /* 70*/ "Not now, Joanna. Time for radio silence. Good luck!", + /* 71*/ "Thanks a lot.", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/peteP.c b/src/files/lang/pal-final/peteP.c new file mode 100644 index 000000000..51e3823a5 --- /dev/null +++ b/src/files/lang/pal-final/peteP.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Attach Tracer to Limousine\n\nThe limousine on the main street arrived not long before you did. All attempts at a trace have come up blank, so it will have to be handled the old-fashioned way. Place a bug on the limo so it can be tracked back to where it came from.\n\n|Objective Three: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Four: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Five: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 1*/ "CHICAGO STREETS\n", + /* 2*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Prepare Escape Route\n\nThere is a disused fire escape behind the G5 Building that will be useful in your escape. Prepare the ground now by attaching explosives to a blocked-up doorway. To avoid giving an alarm, you must trigger the mine once the meeting surveillance is complete.\n\n|Objective Three: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Four: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 3*/ "|Background - \n\nThe G5 Corporation is believed to be a front for dataDyne. Care is needed due to the civilian presence on the streets. Expect intense resistance outside and inside the building - our recon team reported that the buildup of troops started hours ago.\n\n|Carrington - \n\nRemember your urban combat training. It will come in very useful if the situation hasn't changed since the recon team's report earlier. One more thing, Joanna - there's a security robot patrolling the street. Stay away from it if at all possible.\n\n|Objective One: - Retrieve Drop Point Equipment\n\nThe recon team we sent in while you were in transit left a small package of equipment for you, hidden in one of the storm drains. It has just about everything you will need to complete the mission objectives.\n\n|Objective Two: - Create Vehicular Diversion\n\nAny disturbance will attract attention from the guards in the area, but this can be used to your advantage. Reprogram the autopilot guidance computer on the cab to cause it to crash nearby.\n\n|Objective Three: - Gain Entry to G5 Building\n\nOne of the guards by the lift entrance is in charge of a control panel that will lock the lift doors, denying access instantly. The diversion caused by the crashing cab should draw that guard and the others out into the street, leaving the way open. And remember, don't harm any civilians.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Retrieve drop point equipment\n", + /* 10*/ "Attach tracer to limousine\n", + /* 11*/ "Prepare escape route\n", + /* 12*/ "Acquire diversion target\n", + /* 13*/ "Create vehicular diversion\n", + /* 14*/ "Gain entry to G5 building\n", + /* 15*/ "Mine placed correctly.\n", + /* 16*/ "Mine placed incorrectly.\n", + /* 17*/ "Virus already downloaded into NavComp.\n", + /* 18*/ "Hovcab is unresponsive - need Reprogrammer.\n", + /* 19*/ "Accessing hovercab navigation systems.\n", + /* 20*/ "Virus downloaded successfully.\n", + /* 21*/ "Hovercab navigation systems reprogrammed.\n", + /* 22*/ "Connection to hovercab broken.\n", + /* 23*/ "Tracer Bug placed correctly.\n", + /* 24*/ "Tracer Bug placed incorrectly.\n", + /* 25*/ "Mission critical vehicle destroyed.\n", + /* 26*/ "MISSION FAILED\n", + /* 27*/ "MISSION SUCCESSFUL\n", + /* 28*/ "DataDyne limo has escaped.\n", + /* 29*/ "Mission failed - unacceptable civilian casualties.\n", + /* 30*/ "Look out - she's got a gun!\n", + /* 31*/ "There's a maniac on the loose!\n", + /* 32*/ "Intruder alert - send reinforcements.\n", + /* 33*/ "Elevator access sealed.\n", + /* 34*/ "Hey - what are you doing?\n", + /* 35*/ "You don't scare me.\n", + /* 36*/ "Tracer Bug has been noticed.\n", + /* 37*/ "Greetings, citizen.\n", + /* 38*/ "Obtain Remote Mine.\n", + /* 39*/ "Dr. Caroll's\n", + /* 40*/ "Remote Mine\n", + /* 41*/ "A Remote Mine\n", + /* 42*/ "Picked up a Remote Mine.\n", + /* 43*/ "Obtain Tracer Bug.\n", + /* 44*/ "Dr. Caroll's\n", + /* 45*/ "Tracer Bug\n", + /* 46*/ "A Tracer Bug\n", + /* 47*/ "Picked up a Tracer Bug.\n", + /* 48*/ "Elevator door cannot be reopened.\n", + /* 49*/ "Obtain Reprogrammer.\n", + /* 50*/ "Dr. Caroll's\n", + /* 51*/ "Reprogrammer\n", + /* 52*/ "A Reprogrammer\n", + /* 53*/ "Picked up a Reprogrammer.\n", + /* 54*/ "Diversion has been created.\n", + /* 55*/ "Obtain Remote Mine.\n", + /* 56*/ "Dr. Caroll's\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "A Remote Mine\n", + /* 59*/ "Picked up a Remote Mine.\n", + /* 60*/ "The only place we could secure the \nequipment was a storm drain.\n", + /* 61*/ "Either of those blocked-up doors will \ndo as an escape route.\n", + /* 62*/ "Reprogram that taxi - it's a Mark 2 \nand should be compatible.\n", + /* 63*/ "That car park lift is your only \npoint of ingress.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "An alternative diversion has been created!\n", + /* 67*/ "Tracer Bug has been spotted.\n", + /* 68*/ "We suspect the G5 Corporation is just a \nfront for dataDyne and whoever else is \ninvolved in this plot. I know Cassandra \nde Vries is going to be here, but I need \nto know who else is attending and what \nthey discuss. By the time you get out, \nthe help I requested should have arrived.\n", + /* 69*/ "Just who is this help you keep \nreferring to?\n", + /* 70*/ "Not now, Joanna. Time for radio silence. \nGood luck!\n", + /* 71*/ "Thanks a lot.\n", + /* 72*/ "Remote Mine has been wasted.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_f.c b/src/files/lang/pal-final/pete_str_f.c new file mode 100644 index 000000000..b4a3498b4 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_f.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Placer un Pisteur sur la limousine\n\nLa limousine est arrivée dans la rue principale peu après vous. Toutes les tentatives pour la pister ont échouées, il va falloir faire ça à l'ancienne. Placez le Pisteur sur la limousine. Nous pourrons alors savoir d'où elle vient.\n\n|Objectif 3: - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 4: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 5: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 1*/ "LES RUES DE CHICAGO\n", + /* 2*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2 - Préparer voie de sortie\n\nIl y a une issue de secours désaffectée à l'arrière de l'immeuble du G5 qui vous servira à vous enfuir. Préparer le chemin en plaçant des explosifs à la porte. Pour éviter de donner l'alarme, vous devrez déclencher la mine une fois le meeting terminé.\n\n|Objectif 3 - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 4 - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa Corporation G5 sert de couverture à la dataDyne. Il faudra être prudent, il va y avoir beaucoup de civils dans les rues. Attendez-vous à une forte résistance à l'intérieur comme à l'extérieur de l'immeuble. Nos espions ont rapporté la mobilisation de leurs troupes.\n\n|Carrington - \n\nIl va falloir mettre en application votre entraînement en milieu urbain. La situation n'a pas beaucoup évolué depuis la première reconnaissance. Faites attention, une unité de sécurité robotique patrouille les rues. Evitez-la autant que possible.\n\n|Objectif 1: - Récupérer l'équipement au point de largage\n\nL'escouade de reconnaissance a laissé de l'équipement derrière elle pour vous, caché dans une bouche d'égout. Il y aura tout ce qu'il vous faut pour mener à bien votre mission.\n\n|Objectif 2: - Créer une diversion\n\nLes gardes sont très vigilants, n'importe quel mouvement est susceptible d'attirer leur attention. Vous allez utiliser ceci à votre avantage. Reprogrammez l'ordinateur du taxi pour qu'il aille s'écraser devant les gardes pour créer une diversion.\n\n|Objectif 3: - Entrer dans l'immeuble du G5\n\nUn des gardes près de l'entrée de l'ascenseur est chargé du panneau de contrôle qui permet de verrouiller les portes. La diversion engendrée par le taxi devrait attirer ce garde et les autres dans la rue. Le chemin vous sera alors ouvert. Souvenez-vous : vous ne devez pas blesser de civils.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Récupérer équipement point de largage\n", + /* 10*/ "Placer Pisteur sur limousine\n", + /* 11*/ "Préparer voie de sortie\n", + /* 12*/ "Acquérir cible de diversion\n", + /* 13*/ "Créer diversion\n", + /* 14*/ "Entrer dans l'immeuble du G5\n", + /* 15*/ "Mine bien positionnée.\n", + /* 16*/ "Mine mal positionnée.\n", + /* 17*/ "Virus téléchargé dans le NavComp.\n", + /* 18*/ "Taxi incontrôlable - reprogrammation nécessaire.\n", + /* 19*/ "Accès au système de navigation du taxi.\n", + /* 20*/ "Virus téléchargé.\n", + /* 21*/ "Système de navigation taxi reprogrammé.\n", + /* 22*/ "Connexion au taxi perdu.\n", + /* 23*/ "Pisteur bien positionné.\n", + /* 24*/ "Pisteur mal positionné.\n", + /* 25*/ "Véhicule crucial détruit.\n", + /* 26*/ "MISSION ECHOUEE\n", + /* 27*/ "MISSION ACCOMPLIE\n", + /* 28*/ "Limousine DataDyne perdue.\n", + /* 29*/ "Mission échouée - trop de pertes civiles.\n", + /* 30*/ "Attention - elle a une arme!\n", + /* 31*/ "Y'a une maniaque dans les rues!\n", + /* 32*/ "Alerte Intrus - Envoyez des renforts.\n", + /* 33*/ "Accès ascenseur scellé.\n", + /* 34*/ "Hé - Qu'est-ce que vous faites là?\n", + /* 35*/ "Pfff. Même pas peur!\n", + /* 36*/ "Pisteur remarqué.\n", + /* 37*/ "Salutations, citoyen.\n", + /* 38*/ "Obtenir Mine télécom.\n", + /* 39*/ "Dr. Caroll: \n", + /* 40*/ "Mine télécom\n", + /* 41*/ "Une mine télécom.\n", + /* 42*/ "Mine télécom. obtenue.\n", + /* 43*/ "Obtenir pisteur.\n", + /* 44*/ "Dr Caroll: \n", + /* 45*/ "Pisteur\n", + /* 46*/ "Un pisteur\n", + /* 47*/ "Pisteur obtenu.\n", + /* 48*/ "Les portes ascenseur ne peuvent plus être ouvertes.\n", + /* 49*/ "Obtenir Reprogrammeur.\n", + /* 50*/ "Dr. Caroll: \n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un reprogrammeur\n", + /* 53*/ "Reprogrammeur obtenu.\n", + /* 54*/ "Diversion créée.\n", + /* 55*/ "Obtenir mine télécom.\n", + /* 56*/ "Dr. Caroll: \n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Une mine télécom.\n", + /* 59*/ "Mine télécom.\n", + /* 60*/ "Nous avons caché l'équipement \ndans une bouche d'égout.\n", + /* 61*/ "N'importe laquelle de ces portes bloquée \npeut servir de sortie.\n", + /* 62*/ "Reprogrammez ce taxi, c'est un type 2. \nIl devrait être compatible.\n", + /* 63*/ "Cet ascenseur à voiture est votre \nseul point d'entrée.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Une autre diversion a été créée!\n", + /* 67*/ "Pisteur à été découvert.\n", + /* 68*/ "Nous pensons que le G5 n'est qu'une \ncouverture de la dataDyne et qu'il est \nimpliqué dans ce complot. Je sais que \nCassandra de Vries sera présente, mais j'ai besoin \nde savoir qui d'autre sera là et de quoi ils \nvont parler. Le temps que vous évacuiez, \nles renforts débarqueront.\n", + /* 69*/ "Une cavalerie va venir me sauver... \nA qui avez-vous fait appel?\n", + /* 70*/ "Je ne peux rien dire pour l'instant. \nSilence radio! Bonne chance, Joanna!\n", + /* 71*/ "Merci, chef.\n", + /* 72*/ "Mine télécom. gâchée.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_g.c b/src/files/lang/pal-final/pete_str_g.c new file mode 100644 index 000000000..9ec3eabc8 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_g.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Befestigen Sie das Peilgerät an der Limousine!\n\nDie Limousine, die auf der Hauptstraße steht, ist kurz vor Ihnen eingetroffen. Alle Versuche, ein Peilgerät anzubringen, sind fehlgeschlagen. Daher muss die Sache wohl auf die altmodische Weise geregelt werden. Platzieren Sie ein Peilgerät am Wagen, damit wir ihren Weg verfolgen können.\n\n|3. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Buildings ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|4. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|5. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 1*/ "STRASSEN VON CHICAGO\n", + /* 2*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Bereiten Sie Ihren Fluchtweg vor!\n\nAn der Rückseite des G5-Building ist eine stillgelegte Feuerleiter angebracht. Sie wird sich bei Ihrer Flucht als äußerst nützlich erweisen. In weiterer Folge müssen Sie einen blockierten Durchgang frei sprengen. Sie dürfen die Minen allerdings erst zünden, wenn der Wach-Zyklus komplettiert worden ist.\n\n|3. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|4. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\ndataDyne scheint unter dem Deckmantel der G5 Corporation zu agieren. Aufgrund zahlreicher ziviler Präsenzen auf den Straßen ist äußerste Vorsicht oberstes Prinzip. Rechnen Sie außerhalb und innerhalb des Gebäudes mit massivem Widerstand. Unser Aufklärungsteam hat berichtet, dass schon vor Stunden mit der Mobilisierung begonnen wurde.\n\n|Carrington - \n\nErinnern Sie sich an Ihr urbanes Kampftraining! Für den Fall, dass das Aufklärungsteam Recht behält, wird es sich als ausgesprochen nützlich erweisen. Eines noch, Joanna - Auf der Straße patrouilliert ein Sicherheits- Roboter. Vermeiden Sie unter allen Umständen den Kontakt mit ihm.\n\n|1. Ziel: - Finden Sie die Ausrüstung!\n\nWährend Ihres Transits hat das Aufklärungsteam ein kleines Paket mit der entsprechenden Ausrüstung für Sie hinterlassen. Es wurde in einem der Abwasserkanäle versteckt. Das Paket enthält alles, was Sie zur Komplettierung dieser Mission benötigen.\n\n|2. Ziel: - Starten Sie ein Ablenkungsmanöver!\n\nJegliche Störung erregt sofort die Aufmerksamkeit der Wachen. Aber genau dieser Umstand könnte für Sie von Vorteil sein. Reprogrammieren Sie den Autopiloten des Taxis, um es in einen Unfall zu verwickeln.\n\n|3. Ziel: - Betreten Sie das G5-Building!\n\nEine der Wachen am Aufzug ist für die Sicherung der Steuerelemente verantwortlich. Die Türen bleiben verschlossen, es sei denn, dass die Wache durch den von Ihnen verursachten Unfall abgelenkt wird. Dadurch sollten Sie freie Bahn haben. Vergessen Sie nicht: Es dürfen keine Zivilisten zu Schaden kommen!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie die Ausrüstung!\n", + /* 10*/ "Befestigen Sie das Peilgerät am Wagen!\n", + /* 11*/ "Bereiten Sie Ihren Fluchtweg vor!\n", + /* 12*/ "Wählen Sie ein Objekt für das Ablenkungsmanöver!\n", + /* 13*/ "Sorgen Sie für ein Ablenkungsmanöver!\n", + /* 14*/ "Betreten Sie das G5-Building!\n", + /* 15*/ "Mine wurde korrekt platziert.\n", + /* 16*/ "Mine wurde nicht korrekt platziert.\n", + /* 17*/ "Virus wurde bereits installiert.\n", + /* 18*/ "Hover-Cab reagiert nicht - Reprogrammierung erforderlich\n", + /* 19*/ "Zugriff auf das Navigationssystem erfolgt\n", + /* 20*/ "Virus wurde erfolgreich installiert.\n", + /* 21*/ "Navigationssystem wurde reprogrammiert.\n", + /* 22*/ "Verbindung zum Hover-Cab wurde unterbrochen.\n", + /* 23*/ "Peilsender wurde korrekt platziert.\n", + /* 24*/ "Peilsender wurde nicht korrekt platziert.\n", + /* 25*/ "Wichtiges Objekt wurde zerstört.\n", + /* 26*/ "MISSION FEHLGESCHLAGEN\n", + /* 27*/ "MISSION ERFOLGREICH\n", + /* 28*/ "Die dataDyne-Limousine befindet sich außer Reichweite.\n", + /* 29*/ "Mission fehlgeschlagen - Unakzeptable zivile Verluste\n", + /* 30*/ "Vorsicht! Sie hat eine Waffe!\n", + /* 31*/ "Da läuft wohl ein Spinner frei herum!\n", + /* 32*/ "Eindringling geortet - Verstärkung ist unterwegs.\n", + /* 33*/ "Zugriff zum Aufzug ist versiegelt.\n", + /* 34*/ "Hey - Was machen Sie da?\n", + /* 35*/ "Sie machen mir keine Angst.\n", + /* 36*/ "Peilsender wurde gefunden.\n", + /* 37*/ "Sei mir gegrüßt, Bürger.\n", + /* 38*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 39*/ "Dr. Carolls\n", + /* 40*/ "Fernzünder-Mine\n", + /* 41*/ "Eine Fernzünder-Mine\n", + /* 42*/ "Fernzünder-Mine aufgenommen\n", + /* 43*/ "Erlangen Sie den Peilsender.\n", + /* 44*/ "Dr Carolls\n", + /* 45*/ "Peilsender\n", + /* 46*/ "Ein Peilsender\n", + /* 47*/ "Peilsender aufgenommen\n", + /* 48*/ "Aufzugstür kann nicht wieder geöffnet werden.\n", + /* 49*/ "Erlangen Sie den Programm-Overrider.\n", + /* 50*/ "Dr. Carolls\n", + /* 51*/ "Programm-Overrider\n", + /* 52*/ "Ein Programm-Overrider\n", + /* 53*/ "Programm-Overrider aufgenommen\n", + /* 54*/ "Ablenkungsmanöver erfolgreich\n", + /* 55*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 56*/ "Dr. Carolls\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Eine Fernzünder-Mine\n", + /* 59*/ "Fernzünder-Mine aufgenommen\n", + /* 60*/ "Der einzige Ort, an dem wir die Ausrüstung sicher unterbringen \nkonnten, ist ein Kanal.\n", + /* 61*/ "Jede dieser blockierten Türen eignet \nsich als Fluchtweg.\n", + /* 62*/ "Reprogrammieren Sie das Taxi! Der Wagen ist vom Typ Mark 2 \nund sollte kompatibel sein.\n", + /* 63*/ "Der einzige Zutritt für Sie ist der \nAufzug am Parkdeck.\n", + /* 64*/ "EEPROM-Flag wurde gesetzt.\n", + /* 65*/ "EEPROM-Flag wurde gelöscht.\n", + /* 66*/ "Es wurde ein alternatives Ablenkungsmanöver durchgeführt!\n", + /* 67*/ "Peilsender wurde entdeckt.\n", + /* 68*/ "Wir vermuten, dass die G5 Corporation nur \nals Tarnung für dataDyne fungiert. Ich weiß, \ndass Cassandra de Vries anwesend sein wird. \nAber ich muss wissen, wer außerdem an dem \nTreffen teilnimmt und worüber gesprochen wird. \nWenn Sie das Gebäude verlassen, sollte die Hilfe, \ndie ich angefordert habe, eingetroffen sein.\n", + /* 69*/ "Wer ist diese 'Hilfe', auf die Sie sich \nbeziehen?\n", + /* 70*/ "Nicht jetzt, Joanna. Ab jetzt herrscht absolute \nFunkstille. Viel Glück!\n", + /* 71*/ "Hm, herzlichen Dank.\n", + /* 72*/ "Fernzünder-Mine wurde verschwendet.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_i.c b/src/files/lang/pal-final/pete_str_i.c new file mode 100644 index 000000000..2e671c664 --- /dev/null +++ b/src/files/lang/pal-final/pete_str_i.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Attacca una microspia alla limousine\n\nLa limousine sulla strada principale è arrivata poco prima di te. Tutti i tentativi di ricostruirne il percorso sono falliti, quindi bisognerà agire nel modo tradizionale. Attacca una microspia alla limousine per poter scoprirne la provenienza.\n\n|Obiettivo 3: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 4: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 5: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 1*/ "STRADE DI CHICAGO\n", + /* 2*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Prepara la via di fuga\n\nDietro all'Edificio G5 c'è un'uscita antincendio abbandonata che ti sarà sicuramente utile durante la fuga. Preparati la strada subito, mettendo dell'esplosivo sulla porta bloccata. Per evitare di far scattare l'allarme dovrai far saltare la mina solo dopo che la sorveglianza ha completato il suo giro di ronda.\n\n|Obiettivo 3: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 4: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nSi ritiene che la G5 Corporation sia una copertura per la dataDyne. Si richiede molta attenzione per la presenza di civili in strada. Ci si aspetta una strenua resistenza sia all'interno che all'esterno dell'edificio: la nostra squadra di ricognizione ci ha riferito che la formazione delle truppe è iniziata ore fa.\n\n|Carrington:\n\nRicorda il tuo addestramento al combattimento urbano. Ti sarà molto utile se la situazione non ha subito mutamenti dall'ultimo rapporto della squadra di ricognizione. Un'altra cosa, Joanna: c'è un robot di sicurezza che pattuglia la strada. Stagli alla larga se ti è possibile.\n\n|Obiettivo 1: - Va a prendere l'attrezzatura\n\nLa squadra che abbiamo mandato in ricognizione durante la tua assenza ha lasciato un pacco per te nascosto in uno dei canali fognari: lì troverai tutta l'attrezzatura necessaria per completare gli obiettivi della missione.\n\n|Obiettivo 2: - Distrai le forze di sicurezza\n\nOgni minima anomalia attirerà l'attenzione delle guardie lì intorno, ma questo può anche essere sfruttato a tuo vantaggio. Riprogramma il computer di comando del pilota automatico nel taxi per provocare un incidente lì vicino.\n\n|Obiettivo 3: - Entra nell'Edificio G5\n\nUna delle guardie all'ingresso dell'ascensore è addetta ad un quadro comandi in grado di bloccare le porte dell'ascensore, impedendone istantaneamente l'accesso. La distrazione causata dallo schianto del taxi dovrebbe attirare in strada la guardia in questione e sviare l'attenzione dall'ingresso lasciandoti via libera. Ma ricordati di non ferire mai nessun civile.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Va a prendere l'attrezzatura\n", + /* 10*/ "Attacca una microspia alla limousine\n", + /* 11*/ "Prepara la via di fuga\n", + /* 12*/ "Identifica obiettivo di distrazione\n", + /* 13*/ "Distrai le forze di sicurezza\n", + /* 14*/ "Entra nell'Edificio G5\n", + /* 15*/ "Mina piazzata correttamente\n", + /* 16*/ "Mina in posizione errata\n", + /* 17*/ "Virus già scaricato nel computer.\n", + /* 18*/ "Computer non risponde: serve riprogrammatore.\n", + /* 19*/ "Accesso al sistema di navigazione.\n", + /* 20*/ "Virus scaricato correttamente.\n", + /* 21*/ "Computer di navigazione riprogrammato.\n", + /* 22*/ "Interrotto collegamento al computer.\n", + /* 23*/ "Microspia piazzata correttamente.\n", + /* 24*/ "Microspia in posizione errata.\n", + /* 25*/ "Distrutto veicolo essenziale alla missione.\n", + /* 26*/ "MISSIONE FALLITA\n", + /* 27*/ "MISSIONE COMPIUTA\n", + /* 28*/ "La limousine dataDyne è riuscita a scappare.\n", + /* 29*/ "Missione fallita - Vittime civili inaccettabili.\n", + /* 30*/ "Attenzione! Ha una pistola!\n", + /* 31*/ "È pazza! È pazza! Rinchiudetela!!!\n", + /* 32*/ "Allarme intrusione - Mandate rinforzi!\n", + /* 33*/ "Bloccato l'accesso all'ascensore.\n", + /* 34*/ "Ehi, cosa stai facendo?\n", + /* 35*/ "Non mi fai paura!\n", + /* 36*/ "La microspia è stata scoperta.\n", + /* 37*/ "Saluti!!!\n", + /* 38*/ "Procurati mina a distanza.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina distanza\n", + /* 41*/ "Mina distanza\n", + /* 42*/ "Presa mina a distanza.\n", + /* 43*/ "Procurati microspia.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "Microspia\n", + /* 46*/ "Microspia\n", + /* 47*/ "Presa microspia.\n", + /* 48*/ "Impossibile riaprire porta ascensore.\n", + /* 49*/ "Procurati riprogrammatore.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Riprogramm.\n", + /* 52*/ "Riprogramm.\n", + /* 53*/ "Preso riprogrammatore.\n", + /* 54*/ "Creata la distrazione.\n", + /* 55*/ "Procurati mina a distanza.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Mina distanza\n", + /* 59*/ "Presa mina a distanza.\n", + /* 60*/ "L'unico posto in cui è stato possibile \nnascondere gli strumenti era il canale.\n", + /* 61*/ "Una di quelle porte bloccate può \nessere un'ottima via di fuga.\n", + /* 62*/ "Riprogramma quel taxi: è un Mark 2, \ndovrebbe essere compatibile!\n", + /* 63*/ "Quell'ascensore nel parcheggio \nè l'unica entrata possibile!\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "Creata distrazione alternativa!\n", + /* 67*/ "La microspia è stata scoperta.\n", + /* 68*/ "Sospettiamo che la G5 Corporation sia \nsolo una copertura per la dataDyne e per \nchiunque altro sia coinvolto in questo \ncomplotto. So per certo che sarà presente \nCassandra de Vries, ma devo anche scoprire \nchi altro ci sarà e di che cosa si parlerà. \nAl momento che uscirai i rinforzi che ho \nrichiesto saranno già arrivati.\n", + /* 69*/ "Solo una cosa, chi sono questi \n'rinforzi'?\n", + /* 70*/ "Non adesso, Joanna. È ora del silenzio \nradio. In bocca al lupo!\n", + /* 71*/ "Grazie tante!!!\n", + /* 72*/ "Sprecata mina a distanza.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/pete_str_s.c b/src/files/lang/pal-final/pete_str_s.c new file mode 100644 index 000000000..451c3591f --- /dev/null +++ b/src/files/lang/pal-final/pete_str_s.c @@ -0,0 +1,80 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Colocar el Rastreador en la Limusina\n\nLa limusina de la calle principal llegó poco antes que tú. Todos los intentos de rastrearla han sido inútiles, así que tendremos que hacerlo a la vieja usanza. Coloca un 'bicho' en la limusina para que así podamos rastrear adónde se dirige.\n\n|Objetivo Tres: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Cuatro: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cinco: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 1*/ "CALLES DE CHICAGO\n", + /* 2*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Preparar Ruta de Escape\n\nHay una salida de incendios en desuso detrás del Edificio G5 que nos puede ser útil para escapar. Prepara ahora el camino colocando explosivos en la puerta bloqueada. Para evitar activar la alarma, debes detonar la mina cuando el encuentro de vigilancia haya finalizado.\n\n|Objetivo Tres: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Cuatro: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nSe cree que la Corporación G5 es una tapadera de dataDyne. Debemos ser cuidadosos debido a la presencia de civiles en las calles. Debes esperar resistencia intensa tanto fuera como dentro del edificio. Nuestro equipo de reconocimiento ha informado que están reforzando sus tropas desde hace horas.\n\n|Carrington - \n\nRecuerda tu entrenamiento en combate urbano. Te será muy útil si la situación no ha cambiado respecto al informe del equipo de reconocimiento. Una cosa más, Joanna: hay robots de seguridad patrullando la calle. Aléjate de ellos todo lo que sea posible.\n\n|Objetivo Uno: - Recuperar el Equipo del Punto de Encuentro\n\nEl grupo de reconocimiento que enviamos cuando viajabas dejó un pequeño paquete con equipo para ti, oculto en los desagües. Contiene todo lo que necesitas para completar los objetivos de la misión.\n\n|Objetivo Dos: - Crear Distracción Móvil\n\nCualquier alboroto puede atraer la atención de los guardas de la zona, pero esto también puede ser ventajoso. Reprograma el piloto automático del ordenador del taxi para hacer que se choque cerca.\n\n|Objetivo Tres: - Accede al Edificio G5\n\nUno de los guardas en la entrada del ascensor está a cargo de un panel de control que cerrará las puertas del mismo inmediatamente. La distracción causada por el choque del taxi puede sacar a ese guarda y sus compañeros a la calle, dejando el camino abierto. Recuerda, no debes dañar a los civiles.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Recuperar el equipo\n", + /* 10*/ "Colocar el rastreador en la limusina\n", + /* 11*/ "Preparar la ruta de escape\n", + /* 12*/ "Adquirir blancos de distracción\n", + /* 13*/ "Crear distracción móvil\n", + /* 14*/ "Entrar en el edificio G5\n", + /* 15*/ "Mina colocada correctamente.\n", + /* 16*/ "Mina colocada incorrectamente.\n", + /* 17*/ "Virus ya implantado en el Navegador.\n", + /* 18*/ "El aerotaxi no responde: requiere Reprogramación.\n", + /* 19*/ "Accediendo al sistema de navegación del aerotaxi.\n", + /* 20*/ "Virus descargado satisfactoriamente.\n", + /* 21*/ "Sistema de navegación del taxi reprogramado.\n", + /* 22*/ "Conexión con el aerotaxi perdida.\n", + /* 23*/ "'Bicho' Rastreador colocado correctamente.\n", + /* 24*/ "'Bicho' Rastreador colocado incorrectamente.\n", + /* 25*/ "Vehículo crítico de la misión destruido.\n", + /* 26*/ "MISIÓN FALLADA\n", + /* 27*/ "MISIÓN CONSEGUIDA\n", + /* 28*/ "La limusina de dataDyne ha escapado.\n", + /* 29*/ "Misión fallada: bajas civiles inaceptables.\n", + /* 30*/ "Cuidado. ¡Tiene un arma!\n", + /* 31*/ "¡Hay un maníaco suelto!\n", + /* 32*/ "Alerta de Intruso: refuerzos enviados.\n", + /* 33*/ "Acceso del ascensor sellado.\n", + /* 34*/ "¡Hey! ¿Qué haces?\n", + /* 35*/ "No me asustas.\n", + /* 36*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 37*/ "Bienvenido, ciudadano.\n", + /* 38*/ "Obtén la Mina Remota.\n", + /* 39*/ "Dr. Caroll:\n", + /* 40*/ "Mina Remota\n", + /* 41*/ "Una Mina Remota\n", + /* 42*/ "Mina Remota obtenida.\n", + /* 43*/ "Obtén el 'Bicho' Rastreador.\n", + /* 44*/ "Dr. Caroll:\n", + /* 45*/ "'Bicho' R.\n", + /* 46*/ "Un 'Bicho' Rastreador\n", + /* 47*/ "'Bicho' Rastreador obtenido.\n", + /* 48*/ "La puerta del ascensor no puede reabrirse.\n", + /* 49*/ "Obtén el Reprogramador.\n", + /* 50*/ "Dr. Caroll:\n", + /* 51*/ "Reprogram.\n", + /* 52*/ "Un Reprogramador\n", + /* 53*/ "Reprogramador obtenido.\n", + /* 54*/ "Distracción en marcha.\n", + /* 55*/ "Obtén la Mina Remota.\n", + /* 56*/ "Dr. Caroll:\n", + /* 57*/ "Falcon 2\n", + /* 58*/ "Una Mina Remota\n", + /* 59*/ "Mina Remota obtenida.\n", + /* 60*/ "El único lugar donde pudimos asegurar \nel equipo fue en un desagüe.\n", + /* 61*/ "Cada una de esas puertas bloqueadas \npuede ser una ruta de escape.\n", + /* 62*/ "Reprograma ese taxi: es un Mark 2 \ny debe ser compatible.\n", + /* 63*/ "Ese elevador de coches es el \núnico punto de acceso.\n", + /* 64*/ "EEPROM flag has been set.\n", + /* 65*/ "EEPROM flag has been cleared.\n", + /* 66*/ "¡Una distracción alternativa ha sido creada!\n", + /* 67*/ "El 'Bicho' Rastreador ha sido descubierto.\n", + /* 68*/ "Sospechamos que la Corporación G5 es sólo una \ntapadera de dataDyne y que está también \nenvuelta en este complot. Sé que Cassandra \nDe Vries va a estar aquí, pero necesito \nsaber quién más va a venir y sobre qué \nvan a discutir. Una vez salgas, la ayuda \nque solicité estará esperando.\n", + /* 69*/ "¿Pero a qué ayuda te estás \nrefiriendo?\n", + /* 70*/ "Ahora no, Joanna. Mantén la radio en silencio. \n¡Buena suerte!\n", + /* 71*/ "Muchas gracias.\n", + /* 72*/ "La Mina Remota ha sido desperdiciada.\n", + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjE.c b/src/files/lang/pal-final/propobjE.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-final/propobjE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjJ.c b/src/files/lang/pal-final/propobjJ.c new file mode 100644 index 000000000..fc459a214 --- /dev/null +++ b/src/files/lang/pal-final/propobjJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up ", + /* 1*/ "Double ", + /* 2*/ "ammo", + /* 3*/ "cartridge", + /* 4*/ "magnum bullet", + /* 5*/ "golden bullet", + /* 6*/ "hand grenade", + /* 7*/ "grenade round", + /* 8*/ "rocket", + /* 9*/ "homing rocket", + /* 10*/ "remote mine", + /* 11*/ "proximity mine", + /* 12*/ "timed mine", + /* 13*/ "combat ", + /* 14*/ "knife", + /* 15*/ "knives", + /* 16*/ "s", + /* 17*/ "dart", + /* 18*/ "n-bomb", + /* 19*/ "drugs", + /* 20*/ "explosive pen", + /* 21*/ "explosive case", + /* 22*/ "flare", + /* 23*/ "piton", + /* 24*/ "of dynamite", + /* 25*/ "stick ", + /* 26*/ "sticks ", + /* 27*/ "bug", + /* 28*/ "micro camera", + /* 29*/ "GoldenEye key", + /* 30*/ "token", + /* 31*/ "plastique", + /* 32*/ "Picked up a key.\n", + /* 33*/ "Picked up a shield.\n", + /* 34*/ "A shield.\n", + /* 35*/ "Picked up something.\n", + /* 36*/ "This door is locked.\n", + /* 37*/ "bolt", + /* 38*/ "orb", + /* 39*/ "Reaper ammo", + /* 40*/ "cloaking device", + /* 41*/ "speed pill", + /* 42*/ "your ", + /* 43*/ "YOUR some ", + /* 44*/ "Some ", + /* 45*/ "a ", + /* 46*/ "A ", + /* 47*/ "an ", + /* 48*/ "An ", + /* 49*/ "the ", + /* 50*/ "The ", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, + /* 56*/ NULL, + /* 57*/ NULL, + /* 58*/ NULL, + /* 59*/ NULL, + /* 60*/ NULL, + /* 61*/ NULL, + /* 62*/ NULL, + /* 63*/ NULL, + /* 64*/ NULL, + /* 65*/ NULL, + /* 66*/ NULL, + /* 67*/ NULL, + /* 68*/ NULL, + /* 69*/ NULL, + /* 70*/ NULL, + /* 71*/ NULL, + /* 72*/ NULL, + /* 73*/ NULL, + /* 74*/ NULL, + /* 75*/ NULL, + /* 76*/ NULL, + /* 77*/ NULL, + /* 78*/ NULL, + /* 79*/ NULL, + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobjP.c b/src/files/lang/pal-final/propobjP.c new file mode 100644 index 000000000..5f0fcd529 --- /dev/null +++ b/src/files/lang/pal-final/propobjP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Picked up %s.\n", + /* 1*/ "Picked up %s.\n", + /* 2*/ "Picked up %s.\n", + /* 3*/ "Picked up %s.\n", + /* 4*/ "Picked up %s.\n", + /* 5*/ "Picked up %s.\n", + /* 6*/ "Picked up %s.\n", + /* 7*/ "Picked up %s.\n", + /* 8*/ "Double ", + /* 9*/ "ammo", + /* 10*/ "cartridge", + /* 11*/ "magnum bullet", + /* 12*/ "golden bullet", + /* 13*/ "grenade", + /* 14*/ "grenade round", + /* 15*/ "rocket", + /* 16*/ "homing rocket", + /* 17*/ "remote mine", + /* 18*/ "proximity mine", + /* 19*/ "timed mine", + /* 20*/ "combat knife", + /* 21*/ "combat knives", + /* 22*/ "dart", + /* 23*/ "N-Bomb", + /* 24*/ "sedatives", + /* 25*/ "explosive pen", + /* 26*/ "explosive case", + /* 27*/ "flare", + /* 28*/ "piton", + /* 29*/ "of dynamite", + /* 30*/ "stick ", + /* 31*/ "sticks ", + /* 32*/ "bug", + /* 33*/ "micro camera", + /* 34*/ "GoldenEye key", + /* 35*/ "token", + /* 36*/ "plastique", + /* 37*/ "Picked up a key.\n", + /* 38*/ "Picked up a shield.\n", + /* 39*/ "A shield.\n", + /* 40*/ "Picked up something.\n", + /* 41*/ "This door is locked.\n", + /* 42*/ "bolt", + /* 43*/ "orb", + /* 44*/ "Reaper ammo", + /* 45*/ "cloaking device", + /* 46*/ "boost pill", + /* 47*/ "your ", + /* 48*/ "Your ", + /* 49*/ "some ", + /* 50*/ "Some ", + /* 51*/ "some ", + /* 52*/ "Some ", + /* 53*/ "some ", + /* 54*/ "Some ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "a ", + /* 58*/ "A ", + /* 59*/ "an ", + /* 60*/ "An ", + /* 61*/ "the ", + /* 62*/ "The ", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "bolts", + /* 66*/ "orbs", + /* 67*/ "Reaper ammo", + /* 68*/ "cloaking devices", + /* 69*/ "boost pills", + /* 70*/ "ammo", + /* 71*/ "cartridges", + /* 72*/ "magnum bullets", + /* 73*/ "golden bullets", + /* 74*/ "grenades", + /* 75*/ "grenade rounds", + /* 76*/ "rockets", + /* 77*/ "homing rockets", + /* 78*/ "remote mines", + /* 79*/ "proximity mines", + /* 80*/ "timed mines", + /* 81*/ "darts", + /* 82*/ "n-bombs", + /* 83*/ "sedatives", + /* 84*/ "tokens", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_f.c b/src/files/lang/pal-final/propobj_str_f.c new file mode 100644 index 000000000..504f77ac0 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s obtenu.\n", + /* 1*/ "%s obtenue.\n", + /* 2*/ "", + /* 3*/ "", + /* 4*/ "%s obtenus.\n", + /* 5*/ "%s obtenues.\n", + /* 6*/ "", + /* 7*/ "", + /* 8*/ "Double ", + /* 9*/ "Munitions", + /* 10*/ "Cartouche", + /* 11*/ "Balle Magnum", + /* 12*/ "balle en or", + /* 13*/ "Grenade", + /* 14*/ "Munit. grenade", + /* 15*/ "Roquette", + /* 16*/ "Roquette tête cher.", + /* 17*/ "Mine télécom.", + /* 18*/ "Mine prox.", + /* 19*/ "Mine retard.", + /* 20*/ "Couteau combat", + /* 21*/ "Couteaux combat", + /* 22*/ "Fléchette", + /* 23*/ "Bombe-N", + /* 24*/ "Sédatif", + /* 25*/ "stylo explosif", + /* 26*/ "malle explosive", + /* 27*/ "fusée", + /* 28*/ "piton", + /* 29*/ "de dynamite", + /* 30*/ "bâton ", + /* 31*/ "bâtons ", + /* 32*/ "mouchard", + /* 33*/ "micro camera", + /* 34*/ "Clé GoldenEye", + /* 35*/ "jeton", + /* 36*/ "plastique", + /* 37*/ "Clé obtenue.\n", + /* 38*/ "Bouclier obtenu.\n", + /* 39*/ "Un bouclier.\n", + /* 40*/ "Elément obtenu.\n", + /* 41*/ "Cette porte est fermée.\n", + /* 42*/ "Carreau", + /* 43*/ "Orbe", + /* 44*/ "Munit. Reaper", + /* 45*/ "Occulteur", + /* 46*/ "Pilule boost", + /* 47*/ "votre ", + /* 48*/ "Votre ", + /* 49*/ "des ", + /* 50*/ "Des ", + /* 51*/ "des ", + /* 52*/ "Des ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "une ", + /* 60*/ "Une ", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Carreaux", + /* 66*/ "Orbes", + /* 67*/ "Munit. Reaper", + /* 68*/ "Occulteurs", + /* 69*/ "Pilules boost", + /* 70*/ "Munitions", + /* 71*/ "Cartouches", + /* 72*/ "Balles Magnum", + /* 73*/ "Balles en or", + /* 74*/ "Grenades", + /* 75*/ "Munit. grenades", + /* 76*/ "Roquettes", + /* 77*/ "Roquettes tête cher.", + /* 78*/ "Mines télécom.", + /* 79*/ "Mines prox.", + /* 80*/ "Mines retard.", + /* 81*/ "Fléchettes", + /* 82*/ "Bombes-N", + /* 83*/ "Sédatifs", + /* 84*/ "jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_g.c b/src/files/lang/pal-final/propobj_str_g.c new file mode 100644 index 000000000..bce046735 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "%s aufgenommen\n", + /* 1*/ "%s aufgenommen\n", + /* 2*/ "%s aufgenommen\n", + /* 3*/ "%s aufgenommen\n", + /* 4*/ "%s aufgenommen\n", + /* 5*/ "%s aufgenommen\n", + /* 6*/ "%s aufgenommen\n", + /* 7*/ "%s aufgenommen\n", + /* 8*/ "Doppel ", + /* 9*/ "Munition", + /* 10*/ "Magazin", + /* 11*/ "Magnum-Kugel", + /* 12*/ "goldene Kugel", + /* 13*/ "Granate", + /* 14*/ "Granatwerfer-Munition", + /* 15*/ "Rakete", + /* 16*/ "Zielsuch-Rakete", + /* 17*/ "Fernzünder-Mine", + /* 18*/ "Annäherungs-Mine", + /* 19*/ "Zeitzünder-Mine", + /* 20*/ "Kampfmesser", + /* 21*/ "Kampfmesser", + /* 22*/ "Pfeil", + /* 23*/ "N-Bombe", + /* 24*/ "Betäubungsgeschoss", + /* 25*/ "Explosiver Kugelschreiber", + /* 26*/ "Explosiver Koffer", + /* 27*/ "Leuchtkugel", + /* 28*/ "Felshaken", + /* 29*/ "Dynamit-", + /* 30*/ "Stab ", + /* 31*/ "Stäbe ", + /* 32*/ "Peilsender", + /* 33*/ "Mikro-Kamera", + /* 34*/ "GoldenEye-Schlüssel", + /* 35*/ "Symbol", + /* 36*/ "Plastik", + /* 37*/ "Schlüssel aufgenommen\n", + /* 38*/ "Schild aufgenommen\n", + /* 39*/ "Ein Schild\n", + /* 40*/ "Etwas wurde aufgenommen.\n", + /* 41*/ "Diese Tür ist verschlossen.\n", + /* 42*/ "Bolzen", + /* 43*/ "Kraftzelle", + /* 44*/ "Reaper-Munition", + /* 45*/ "Tarnkappe", + /* 46*/ "Stärkungs-Pille", + /* 47*/ "", + /* 48*/ "", + /* 49*/ "", + /* 50*/ "", + /* 51*/ "", + /* 52*/ "", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "", + /* 58*/ "", + /* 59*/ "", + /* 60*/ "", + /* 61*/ "", + /* 62*/ "", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "Bolzen", + /* 66*/ "Kraftzellen", + /* 67*/ "Reaper-Munition", + /* 68*/ "Tarnkappen", + /* 69*/ "Stärkungs-Pillen", + /* 70*/ "Munition", + /* 71*/ "Magazin", + /* 72*/ "Magnum-Kugeln", + /* 73*/ "Goldkugeln", + /* 74*/ "Granaten", + /* 75*/ "Granatwerfer-Munition", + /* 76*/ "Raketen", + /* 77*/ "Zielsuch-Raketen", + /* 78*/ "Fernzünder-Minen", + /* 79*/ "Annäherungs-Minen", + /* 80*/ "Zeitzünder-Minen", + /* 81*/ "Pfeile", + /* 82*/ "N-Bomben", + /* 83*/ "Betäubungsgeschosse", + /* 84*/ "Jetons", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_i.c b/src/files/lang/pal-final/propobj_str_i.c new file mode 100644 index 000000000..91b90bb2b --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Preso %s\n", + /* 1*/ "Presa %s\n", + /* 2*/ "Presa %s\n", + /* 3*/ "Preso %s\n", + /* 4*/ "Presi %s\n", + /* 5*/ "Prese %s\n", + /* 6*/ "Prese %s\n", + /* 7*/ "Prese %s\n", + /* 8*/ "Doppio ", + /* 9*/ "munizioni", + /* 10*/ "cartuccia", + /* 11*/ "pallottola magnum", + /* 12*/ "pallottola d'oro", + /* 13*/ "granata", + /* 14*/ "granata a giro", + /* 15*/ "missile", + /* 16*/ "missile di ritorno", + /* 17*/ "mina a distanza", + /* 18*/ "mina di prossimità", + /* 19*/ "mina a tempo", + /* 20*/ "pugnale da lotta", + /* 21*/ "pugnali da lotta", + /* 22*/ "freccia", + /* 23*/ "bomba-n", + /* 24*/ "sedativi", + /* 25*/ "penna esplosiva", + /* 26*/ "cassa esplosiva", + /* 27*/ "fiamma", + /* 28*/ "chiodo", + /* 29*/ "di dinamite", + /* 30*/ "carica ", + /* 31*/ "cariche ", + /* 32*/ "cimice", + /* 33*/ "microcamera", + /* 34*/ "chiave GoldenEye", + /* 35*/ "buono", + /* 36*/ "plastica", + /* 37*/ "Presa chiave.\n", + /* 38*/ "Preso scudo.\n", + /* 39*/ "uno scudo.\n", + /* 40*/ "Preso qualcosa.\n", + /* 41*/ "La porta è chiusa.\n", + /* 42*/ "dardo", + /* 43*/ "globo", + /* 44*/ "munizioni Falciatore", + /* 45*/ "Dispositivo mimetico", + /* 46*/ "Pillola booster", + /* 47*/ "la ", + /* 48*/ "La ", + /* 49*/ "dei ", + /* 50*/ "Presi ", + /* 51*/ "delle ", + /* 52*/ "Prese ", + /* 53*/ "", + /* 54*/ "Prese ", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "un'", + /* 62*/ "Un'", + /* 63*/ "", + /* 64*/ "", + /* 65*/ "dardi", + /* 66*/ "globi", + /* 67*/ "munizioni Falciatore", + /* 68*/ "Dispositivo mimetico", + /* 69*/ "Pillole booster", + /* 70*/ "munizioni", + /* 71*/ "cartucce", + /* 72*/ "pallottole magnum", + /* 73*/ "pallottole d'oro", + /* 74*/ "granate", + /* 75*/ "granate a giro", + /* 76*/ "missili", + /* 77*/ "missili a giro", + /* 78*/ "mine a distanza", + /* 79*/ "mine di prossimità", + /* 80*/ "mine a tempo", + /* 81*/ "frecce", + /* 82*/ "bombe-n", + /* 83*/ "sedativi", + /* 84*/ "gettoni", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/propobj_str_s.c b/src/files/lang/pal-final/propobj_str_s.c new file mode 100644 index 000000000..a197bb941 --- /dev/null +++ b/src/files/lang/pal-final/propobj_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "Recogiste %s.\n", + /* 1*/ "Recogiste %s.\n", + /* 2*/ "Recogiste %s.\n", + /* 3*/ "Recogiste %s.\n", + /* 4*/ "Recogiste %s.\n", + /* 5*/ "Recogiste %s.\n", + /* 6*/ "Recogiste %s.\n", + /* 7*/ "Recogiste %s.\n", + /* 8*/ "Doble ", + /* 9*/ "munición", + /* 10*/ "cartucho", + /* 11*/ "bala de magnum", + /* 12*/ "balas doradas", + /* 13*/ "granada", + /* 14*/ "cinto de granadas", + /* 15*/ "cohete", + /* 16*/ "cohete buscador", + /* 17*/ "mina remota", + /* 18*/ "mina de proximidad", + /* 19*/ "mina de tiempo", + /* 20*/ "cuchillo de combate", + /* 21*/ "cuchillos de combate", + /* 22*/ "dardo", + /* 23*/ "bomba-N", + /* 24*/ "sedante", + /* 25*/ "Boli Explosivo", + /* 26*/ "Caja de Explosivos", + /* 27*/ "Bengalas", + /* 28*/ "Pitón", + /* 29*/ "", + /* 30*/ "Cartucho de Dinamita", + /* 31*/ "Cartuchos de Dinamita", + /* 32*/ "Bicho", + /* 33*/ "Microcámara", + /* 34*/ "Llave GoldenEye", + /* 35*/ "Ficha", + /* 36*/ "Explosivo Plástico", + /* 37*/ "Has cogido una Llave.\n", + /* 38*/ "Has cogido un Escudo.\n", + /* 39*/ "Un Escudo.\n", + /* 40*/ "Has cogido algo.\n", + /* 41*/ "Esta puerta está cerrada.\n", + /* 42*/ "saeta", + /* 43*/ "orbe", + /* 44*/ "munición Segadora", + /* 45*/ "disp. de ocultación", + /* 46*/ "reforzador", + /* 47*/ "tu ", + /* 48*/ "Tu ", + /* 49*/ "algunos ", + /* 50*/ "Algunos ", + /* 51*/ "algunas ", + /* 52*/ "Algunas ", + /* 53*/ "", + /* 54*/ "", + /* 55*/ "", + /* 56*/ "", + /* 57*/ "un ", + /* 58*/ "Un ", + /* 59*/ "una ", + /* 60*/ "Una ", + /* 61*/ "unos", + /* 62*/ "Unos", + /* 63*/ "unas", + /* 64*/ "Unas", + /* 65*/ "saetas", + /* 66*/ "orbes", + /* 67*/ "Munición Segadora", + /* 68*/ "disp. de ocultación", + /* 69*/ "reforzadores", + /* 70*/ "Munición", + /* 71*/ "cartuchos", + /* 72*/ "balas de magnum", + /* 73*/ "balas doradas", + /* 74*/ "granadas", + /* 75*/ "cintos de granadas", + /* 76*/ "cohetes", + /* 77*/ "cohetes buscadores", + /* 78*/ "minas remotas", + /* 79*/ "minas de proximidad", + /* 80*/ "minas de tiempo", + /* 81*/ "dardos", + /* 82*/ "bombas-N", + /* 83*/ "sedantes", + /* 84*/ "fichas", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/refE.c b/src/files/lang/pal-final/refE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/refJ.c b/src/files/lang/pal-final/refJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/refP.c b/src/files/lang/pal-final/refP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/refP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_f.c b/src/files/lang/pal-final/ref_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_g.c b/src/files/lang/pal-final/ref_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_i.c b/src/files/lang/pal-final/ref_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ref_str_s.c b/src/files/lang/pal-final/ref_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/ref_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/ritE.c b/src/files/lang/pal-final/ritE.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-final/ritE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/ritJ.c b/src/files/lang/pal-final/ritJ.c new file mode 100644 index 000000000..49f4adf52 --- /dev/null +++ b/src/files/lang/pal-final/ritJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their wellbeing. If the worst has happened then activate the Autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember thatpresidential security are neutral and are not to beharmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President To Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and Retrieve Equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President To Escape Capsule\n", + /* 8*/ "Secure Air Force One Flight Path\n", + /* 9*/ "Detach UFO From Air Force One\n", + /* 10*/ "Obtain suitcase\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a suitcase.\n", + /* 15*/ "Obtain crossbow\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted\n", + /* 21*/ "Ufo attachment destroyed\n", + /* 22*/ "Unable to detach ufo\n", + /* 23*/ "Autopilot has been activated\n", + /* 24*/ "Air Force 1 has been stabilised\n", + /* 25*/ "Autopilot systems have been destroyed\n", + /* 26*/ "The president has been incapacitated\n", + /* 27*/ "Pilots have been killed\n", + /* 28*/ "Pilots have been saved\n", + /* 29*/ "Air Force One is about to crash\n", + /* 30*/ "Obtain remote mine\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We must get to the escape pod. Follow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between\nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands\nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder..\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The president's room is on this \nlevel, Joanna.\n", + /* 48*/ "Somethings wrong... you have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline Pill\n", + /* 53*/ "Adrenaline Pill\n", + /* 54*/ "Picked up an Adrenaline Pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Keycard\n", + /* 58*/ "Keycard\n", + /* 59*/ "Picked up a Keycard.\n", + /* 60*/ "Cargo Bay Has Been Lowered.\n", + /* 61*/ "Cargo Bay Has Been Raised.\n", + /* 62*/ "Mission Critical Object Has Been Destroyed.\n", + /* 63*/ "Access Denied - Lift Keycard Required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift Keycard\n", + /* 67*/ "Lift Keycard\n", + /* 68*/ "Picked up a Lift Keycard.\n", + /* 69*/ "TImed Mine Has Been Wasted.\n", + /* 70*/ "Ha Ha Ha Ha Ha.\n", + /* 71*/ "You'll Never Save Him Now.\n", + /* 72*/ "The President Is Under Attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?", + /* 74*/ "My answer remains the same: I'm sorry, Trent, but no. I won't loan the Pelagic 2 to dataDyne. Now please, can we move on to other matters?", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries, and will back them...", + /* 76*/ "Damn it, man, I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.", + /* 77*/ "As you wish, sir.", + /* 78*/ "My last chance? Ha! You fool. That was yours.", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?", + /* 80*/ "Piece of cake, Joanna. Watch this!", + /* 81*/ "Uh-oh.", + /* 82*/ "Watch what? Will you stop playing around and shoot!", + /* 83*/ "Out of options... Joanna, brace yourself for impact!", + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/ritP.c b/src/files/lang/pal-final/ritP.c new file mode 100644 index 000000000..3219673b9 --- /dev/null +++ b/src/files/lang/pal-final/ritP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Secure Air Force One Flight Path\n\nThe specifics of Trent's plan are not known, but it is believed that the flight crew will be in danger. Get to the cockpit and make sure of their well-being. If the worst has happened, then activate the autopilot.\n\n|Objective Five: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means getting the evidence from the baggage hold and showing it to the President.\n\n|Objective One: - Locate and Retrieve Equipment\n\nFind the equipment hidden in the baggage hold at the bottom of the aircraft and get it back. Remember that Presidential security are neutral and are not to be harmed.\n\n|Objective Two: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Three: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Four: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 3*/ "|Background - \n\nTrent Easton's plan to abduct the President is in motion. The Carrington Institute response hinges on removing the President from Air Force One before Trent can do the same.\n\n|Carrington - \n\nTime is short, Joanna. In order to foil Trent's plan, you have to get the President off the plane. That means convincing him of Trent's betrayal, which in turn means showing the evidence to the President.\n\n|Objective One: - Locate President\n\nThe exact whereabouts of the Presidential office are not known. Once you find the office, present the evidence to the President. Make sure you get there before Trent does, or you can be sure he will manipulate the situation to his advantage.\n\n|Objective Two: - Get President to Escape Capsule\n\nThere is an emergency escape capsule on the lowest deck of the aircraft. Escort the President to the capsule, ensuring that no harm comes to him.\n\n|Objective Three: - Detach UFO From Air Force One\n\nGet that umbilical connector off Air Force One! The quickest way to do it would be to detonate a mine in the connector itself. \n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Locate and retrieve equipment\n", + /* 6*/ "Locate President\n", + /* 7*/ "Get President to escape capsule\n", + /* 8*/ "Secure Air Force One flight path\n", + /* 9*/ "Detach UFO from Air Force One\n", + /* 10*/ "Obtain Suitcase.\n", + /* 11*/ "\n", + /* 12*/ "Suitcase\n", + /* 13*/ "Suitcase\n", + /* 14*/ "Picked up a Suitcase.\n", + /* 15*/ "Obtain Crossbow.\n", + /* 16*/ "\n", + /* 17*/ "Crossbow\n", + /* 18*/ "Crossbow\n", + /* 19*/ "Picked up a Crossbow.\n", + /* 20*/ "Too many neutral casualties inflicted.\n", + /* 21*/ "UFO attachment damaged.\n", + /* 22*/ "Unable to detach UFO.\n", + /* 23*/ "Autopilot has been activated.\n", + /* 24*/ "Air Force One has been stabilized.\n", + /* 25*/ "Autopilot systems have been destroyed.\n", + /* 26*/ "The President has been incapacitated.\n", + /* 27*/ "Pilots have been killed.\n", + /* 28*/ "Pilots have been saved.\n", + /* 29*/ "Air Force One is about to crash.\n", + /* 30*/ "Obtain remote mine.\n", + /* 31*/ "\n", + /* 32*/ "Remote mine\n", + /* 33*/ "Remote mine\n", + /* 34*/ "Picked up a remote mine.\n", + /* 35*/ "Who are you, young lady?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, you're in danger. Trent is trying to \nkidnap you.\n", + /* 38*/ "What the hell was that!\n", + /* 39*/ "We have to get you to the escape pod. \nFollow me.\n", + /* 40*/ "You can't make accusations like that without evidence.\n I assume that you have some?\n", + /* 41*/ "This is a recording of a meeting between \nTrent and the other conspirators.\n", + /* 42*/ "Seems overwhelming... I'm in your hands. \nWhat do we do now?\n", + /* 43*/ "Hey, that's not...\n", + /* 44*/ "It's an intruder...\n", + /* 45*/ "How the hell did you get on board?\n", + /* 46*/ "Now, let's retrieve the evidence.\n", + /* 47*/ "The President's room is on this \nlevel, Joanna.\n", + /* 48*/ "Something's wrong... You have to get to the cockpit!\n", + /* 49*/ "Maybe a mine will detach the UFO.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenaline pill\n", + /* 53*/ "Adrenaline pill\n", + /* 54*/ "Picked up an adrenaline pill.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Key card\n", + /* 58*/ "Key card\n", + /* 59*/ "Picked up a key card.\n", + /* 60*/ "Cargo bay has been lowered.\n", + /* 61*/ "Cargo bay has been raised.\n", + /* 62*/ "Mission critical object has been destroyed.\n", + /* 63*/ "Access denied - lift key card required.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Lift key card\n", + /* 67*/ "Lift key card\n", + /* 68*/ "Picked up a lift key card.\n", + /* 69*/ "Timed mine has been wasted.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "You'll never save him now.\n", + /* 72*/ "The President is under attack.\n", + /* 73*/ "Have you thought any more about that proposal I gave you, sir?\n", + /* 74*/ "My answer remains the same... I'm sorry Trent, but no. I won't loan the Pelagic II to dataDyne. Now please, can we move on to other matters?\n", + /* 75*/ "But this is a golden opportunity to show that America has faith in its industries and will back them...\n", + /* 76*/ "Damn it, man! I say no and I mean no! I'm not gonna change my mind on this! I need my advisors to be unbiased, and recently you've not been giving me the impartiality I require. Let it go, and we'll say no more. This is your last chance.\n", + /* 77*/ "As you wish, sir.\n", + /* 78*/ "My last chance? Ha! You fool. That was yours.\n", + /* 79*/ "Elvis! Elvis! I can't detach that tube from the fuselage! Can you take it out?\n", + /* 80*/ "Piece of cake, Joanna. Watch this!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Watch what? Will you stop playing around and shoot!\n", + /* 83*/ "Out of options... Joanna, brace yourself for impact!\n", + /* 84*/ "The pilots have stabilized Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_f.c b/src/files/lang/pal-final/rit_str_f.c new file mode 100644 index 000000000..fee1613b8 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité du Président est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Sécurisez le plan de vol de Air Force One\n\nLes détails du plan de Trent sont encore inconnus, mais nous pensons que l'équipage de l'avion sera en danger. Vous devrez accéder à la cabine de pilotage pour découvrir ce qu'il prépare. Si la situation échappe à votre contrôle, activez l'auto-pilote.\n\n|Objectif 5: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser et récupérer l'équipement\n\nTrouvez l'équipement dissimulé dans la soute à bagages au fond de l'appareil et ramenez-le. Souvenez-vous que l'équipe de sécurité du Président est neutre et qu'elle ne doit pas être attaquée.\n\n|Objectif 2: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 3: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 4: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe plan de Trent Easton pour kidnapper le Président est commencé. L'institut Carrington veut parer cette manoeuvre en déplaçant le Président de Air Force One avant l'intervention de Trent.\n\n|Carrington - \n\nLe temps nous est compté, Joanna. Pour déjouer les plans de Trent il faut que vous déplaciez le Président de cet avion. Cela veut dire qu'il faudra le convaincre de la trahison de Trent. Pour cela vous devrez trouver des preuves dans la soute à bagages afin de les montrer au Président.\n\n|Objectif 1: - Localiser le Président\n\nL'emplacement exact du Président ne nous est pas connu. Une fois que vous aurez trouvé son bureau, montrez-lui les preuves. Assurez-vous que vous ferez cela avant l'intervention de Trent sinon il risque de pouvoir influencer et manipuler la situation à son avantage.\n\n|Objectif 2: - Placer le Président dans la capsule\n\nIl y a une capsule d'évacuation placée à l'arrière de l'appareil. Escortez le Président jusqu'à cette capsule en vous assurant qu'aucun mal ne lui sera fait.\n\n|Objectif 3: - Détacher l'OVNI de Air Force One\n\nVous devrez retirer la connexion reliée à Air Force One. La façon la plus rapide serait de faire exploser une mine dans le connecteur lui-même. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localiser et récupérer équipement\n", + /* 6*/ "Localiser Président\n", + /* 7*/ "Placer Président dans capsule\n", + /* 8*/ "Sécuriser plan de vol de Air Force One\n", + /* 9*/ "Détacher OVNI de Air Force One\n", + /* 10*/ "Obtenir mallette.\n", + /* 11*/ "\n", + /* 12*/ "Mallette\n", + /* 13*/ "Mallette\n", + /* 14*/ "Mallette obtenue.\n", + /* 15*/ "Obtenir Arbalète.\n", + /* 16*/ "\n", + /* 17*/ "Arbalète\n", + /* 18*/ "Arbalète\n", + /* 19*/ "Arbalète obtenue.\n", + /* 20*/ "Trop de victimes neutres.\n", + /* 21*/ "Connexion à l'OVNI détruite.\n", + /* 22*/ "Impossible de détruire connexion OVNI.\n", + /* 23*/ "Auto-pilote enclenché.\n", + /* 24*/ "Air Force One stabilisé.\n", + /* 25*/ "Système Auto-pilote détruit.\n", + /* 26*/ "Le Président est K.O.\n", + /* 27*/ "Pilotes tués.\n", + /* 28*/ "Pilotes sauvés.\n", + /* 29*/ "Air Force One va s'écraser.\n", + /* 30*/ "Obtenir mine télécom.\n", + /* 31*/ "\n", + /* 32*/ "Mine télécom.\n", + /* 33*/ "Mine télécom.\n", + /* 34*/ "Mine télécom. obtenue.\n", + /* 35*/ "Qui êtes-vous, jeune fille?\n", + /* 36*/ "Securité, SECURITE!!\n", + /* 37*/ "Mr. le Président, vous êtes en danger. Trent va essayer \nde vous kidnapper.\n", + /* 38*/ "Mais? Que se passe-t-il?!\n", + /* 39*/ "Vous devez gagner sans tarder la capsule de secours! \nSuivez-moi!\n", + /* 40*/ "Avez-vous des preuves pour avancer de tels propos?\n Vos accusations sont très graves.\n", + /* 41*/ "Voici l'enregistrement de la réunion entre \nTrent et ses sbires conspirateurs.\n", + /* 42*/ "C'est effrayant... Je vous crois. \nQue fait-on maintenant?\n", + /* 43*/ "Hé, ce n'est pas...\n", + /* 44*/ "C'est un intrus...\n", + /* 45*/ "Comment avez-vous fait pour monter à bord?\n", + /* 46*/ "Bon, récupérons les preuves.\n", + /* 47*/ "Le bureau du Président est dans \nle secteur, Joanna.\n", + /* 48*/ "Il y a quelque chose de bizarre... Foncez à la cabine de pilotage! \n", + /* 49*/ "Peut-être une mine pourrait détruire la connexion à l'OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Pilule d'adrénaline\n", + /* 53*/ "Pilule d'adrénaline\n", + /* 54*/ "Pilule d'adrénaline obtenue.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Carte\n", + /* 58*/ "Carte\n", + /* 59*/ "Carte obtenue.\n", + /* 60*/ "Soute baissée.\n", + /* 61*/ "Soute levée.\n", + /* 62*/ "Objet crucial détruit.\n", + /* 63*/ "Accès refusé - Carte ascenseur requise.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Carte ascenseur\n", + /* 67*/ "Carte ascenseur \n", + /* 68*/ "Carte ascenseur obtenue.\n", + /* 69*/ "Mine retardement.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "C'est trop tard, tu ne pourras pas le sauver.\n", + /* 72*/ "Le Président est attaqué.\n", + /* 73*/ "Avez-vous réfléchi à la proposition que je vous ai présentée, monsieur?\n", + /* 74*/ "Ma réponse est toujours la même: désolé Trent, c'est non. Je ne confierai pas le Pelagic II à la dataDyne. Changeons de sujet, voulez-vous!\n", + /* 75*/ "Mais c'est l'occasion en or de montrer que l'Amérique a foi en son industrie et que vous êtes prêt à les...\n", + /* 76*/ "Ca suffit, quand je dis non c'est non! Je ne vais pas changer d'avis sur ce sujet! Je veux que mes conseillers soient impartiaux, et vous ne me donnez pas cette impression, Trent. Le sujet est clos. C'est votre dernière chance. Je ne reviendrai pas sur ma décision.\n", + /* 77*/ "Comme vous voulez, monsieur.\n", + /* 78*/ "Ma dernière chance? Ha! Pauvre fou. C'était plutôt la tienne, crétin!\n", + /* 79*/ "Elvis! Elvis! Je n'arrive pas à détacher ce tube du fuselage! Peux-tu t'en charger?\n", + /* 80*/ "Un jeu d'enfant, Joanna. Regarde-moi faire!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "Regarder quoi? Et si tu faisais dans l'efficace pour une fois, ouvre le feu!\n", + /* 83*/ "Je n'ai plus le choix... Joanna, accroche-toi, ça va secouer!\n", + /* 84*/ "Les pilotes ont stabilisé Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_g.c b/src/files/lang/pal-final/rit_str_g.c new file mode 100644 index 000000000..0f8ffdee8 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen, ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Sichern Sie die Flugroute der Air Force One!\n\nGenauere Informationen über Trents Plan sind uns nicht bekannt. Wir vermuten aber, dass sich das Flugpersonal in höchster Gefahr befindet. Gehen Sie ins Cockpit und versichern Sie sich, dass es der Crew gut geht. Im schlimmsten anzunehmenden Fall müssen Sie den Autopiloten aktivieren.\n\n|5. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden und bergen Sie die Ausrüstung!\n\nFinden Sie die Ausrüstung, die im Gepäckraum im Bauch des Flugzeugs für Sie bereitliegt. Bedenken Sie, dass es sich bei der Leibwache des Präsidenten um neutrale Personen handelt, denen kein Schaden zugefügt werden darf.\n\n|2. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|3. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|4. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nTrent Eastons Plan den Präsidenten zu kidnappen ist in vollem Gang. Das Carrington Institut plant, den Präsidenten aus der Air Force One zu schmuggeln, bevor Trent zuschlagen kann.\n\n|Carrington - \n\nWir haben nicht viel Zeit, Joanna. Um Trents Plan zu vereiteln, müssen Sie den Präsidenten aus dem Flugzeug schaffen. Das bedeutet, dass Sie den Präsidenten von Trents Betrug überzeugen müssen. Dazu müssen Sie den Beweis im Gepäckraum finden und dem Präsidenten vorlegen.\n\n|1. Ziel: - Finden Sie den Präsidenten!\n\nDie exakte Lage des Präsidenten-Büros ist nicht bekannt. Legen Sie dem Präsidenten den Beweis vor, um ihn von der Konspiration zu überzeugen. Sie müssen das Büro erreichen, bevor Trent dorthin gelangt. Andernfalls wird er garantiert alles unternehmen, um die Situation zu seinem Vorteil zu manipulieren.\n\n|2. Ziel: - Bringen Sie den Präsidenten zur Fluchtkapsel!\n\nAm untersten Deck des Flugzeugs befindet sich eine Rettungskapsel. Eskortieren Sie den Präsidenten zur Kapsel, und sorgen Sie für seine Sicherheit!\n\n|3. Ziel: - Lösen Sie die Verankerung des UFOs!\n\nLösen Sie die Verbindung zwischen dem UFO und der Air Force One! Sie können dieses Ziel am effizientesten erreichen, wenn Sie direkt an der 'Nabelschnur' eine Mine zur Detonation bringen. \n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Finden und bergen Sie die Ausrüstung!\n", + /* 6*/ "Finden Sie den Präsidenten!\n", + /* 7*/ "Bringen Sie den Präsidenten zur Kapsel!\n", + /* 8*/ "Sichern Sie die Flugroute!\n", + /* 9*/ "Lösen Sie die Verankerung des UFOs!\n", + /* 10*/ "Finden Sie den Koffer!\n", + /* 11*/ "\n", + /* 12*/ "Koffer\n", + /* 13*/ "Koffer\n", + /* 14*/ "Koffer wurde aufgenommen\n", + /* 15*/ "Erlangen Sie die Armbrust!\n", + /* 16*/ "\n", + /* 17*/ "Armbrust\n", + /* 18*/ "Armbrust\n", + /* 19*/ "Armbrust wurde aufgenommen\n", + /* 20*/ "Es sind zu viele neutrale Verluste zu beklagen.\n", + /* 21*/ "Verankerung wurde zerstört.\n", + /* 22*/ "Verankerung kann nicht gelöst werden.\n", + /* 23*/ "Autopilot wurde aktiviert.\n", + /* 24*/ "Der Flug der Air Force One wurde stabilisiert.\n", + /* 25*/ "Der Autopilot wurde zerstört.\n", + /* 26*/ "Der Präsident wurde schwer verletzt.\n", + /* 27*/ "Die Piloten wurden eliminiert.\n", + /* 28*/ "Die Piloten befinden sich in Sicherheit.\n", + /* 29*/ "Die Air Force One ist im Begriff, abzustürzen.\n", + /* 30*/ "Erlangen Sie die Fernzünder-Mine.\n", + /* 31*/ "\n", + /* 32*/ "Fernzünder-Mine\n", + /* 33*/ "Fernzünder-Mine\n", + /* 34*/ "Fernzünder-Mine aufgenommen\n", + /* 35*/ "Wer sind Sie, junge Dame?\n", + /* 36*/ "Security, SECURITY!!\n", + /* 37*/ "Mr. President, Sie befinden sich in Gefahr. Trent versucht, \nSie zu kidnappen.\n", + /* 38*/ "Was, zur Hölle, war das?\n", + /* 39*/ "Rasch! Wir müssen zur Fluchtkapsel. \nFolgen Sie mir!\n", + /* 40*/ "Sie können solche Anschuldigungen nicht vorbringen, ohne\n stichhaltige Beweise zu haben.\n", + /* 41*/ "Ich habe eine Aufzeichnung des Meetings von\nTrent und den anderen Verschwörern.\n", + /* 42*/ "Das ist mehr als überzeugend. Ich vertraue Ihnen.\nWas sollen wir jetzt tun?\n", + /* 43*/ "Hey, das ist nicht...\n", + /* 44*/ "Ein Eindringling...\n", + /* 45*/ "Wie sind Sie an Bord gekommen?\n", + /* 46*/ "Dann suchen wir mal nach dem Beweis.\n", + /* 47*/ "Das Büro des Präsidenten befindet \nsich auf diesem Level.\n", + /* 48*/ "Irgendetwas stimmt nicht... Sie müssen zum Cockpit!\n", + /* 49*/ "Vielleicht kann das UFO mit einer Mine gelöst werden.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalin-Kapsel\n", + /* 53*/ "Adrenalin-Kapsel\n", + /* 54*/ "Adrenalin-Kapsel aufgenommen\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Schlüsselkarte\n", + /* 58*/ "Schlüsselkarte\n", + /* 59*/ "Schlüsselkarte aufgenommen\n", + /* 60*/ "Laderaum wurde abgesenkt.\n", + /* 61*/ "Laderaum wurde angehoben.\n", + /* 62*/ "Wichtiges Objekt wurde zerstört.\n", + /* 63*/ "Zugriff verweigert - Aufzugs-Karte erforderlich\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Aufzugs-Karte\n", + /* 67*/ "Aufzugs-Karte\n", + /* 68*/ "Aufzugs-Karte aufgenommen\n", + /* 69*/ "Die Zeitzünder-Mine wurde ineffektiv eingesetzt.\n", + /* 70*/ "Ha, Ha, Ha, Ha, Ha.\n", + /* 71*/ "Jetzt kannst du ihn nicht mehr retten.\n", + /* 72*/ "Der Präsident wird attackiert.\n", + /* 73*/ "Haben Sie nochmals über meinen Vorschlag nachgedacht, Sir?\n", + /* 74*/ "Meine Antwort bleibt unverändert. Es tut mir leid, Trent, aber ich sage nein. Ich werde die Pelagic II nicht an dataDyne verleihen. Können wir uns jetzt bitte anderen Themen zuwenden?\n", + /* 75*/ "Aber das wäre die beste Gelegenheit, um zu beweisen, dass die Regierung Vertrauen in die amerikanische Industrie hat, und...\n", + /* 76*/ "Verdammt noch mal! Wenn ich nein sage, dann meine ich nein! Ich werde meine Meinung dahingehend nicht ändern. Ich brauche meine Berater, um unvoreingenommen zu bleiben. In letzter Zeit haben Sie mir nicht unbedingt unparteiische Ratschläge erteilt. Hören Sie nun endlich damit auf. Das ist Ihre letzte Chance.\n", + /* 77*/ "Wie Sie wünschen, Sir.\n", + /* 78*/ "Meine letzte Chance? Ha! Du dummer Narr. Das war DEINE letzte Chance!\n", + /* 79*/ "Elvis! Elvis! Ich kann die Verankerung des UFOs nicht lösen! Kannst du das erledigen?\n", + /* 80*/ "Das ist ein Kinderspiel, Joanna. Pass auf und lerne!\n", + /* 81*/ "Uh-oh.\n", + /* 82*/ "Lerne was? Kannst du endlich mit dem Quatsch aufhören und schießen?\n", + /* 83*/ "Ende der Fahnenstange... Joanna, bereite dich auf den Aufprall vor!\n", + /* 84*/ "Die Piloten konnten die Air Force One stabilisieren.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_i.c b/src/files/lang/pal-final/rit_str_i.c new file mode 100644 index 000000000..7bb65c525 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Accerta rotta di volo Air Force One\n\nNon siamo a conoscenza dei dettagli del piano di Trent, ma riteniamo che il personale di volo sia in pericolo. Va nella cabina di pilotaggio e assicurati che stiano bene. Se è accaduto l'irreparabile, attiva il pilota automatico!\n\n|Obiettivo 5: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Trova e recupera la tua attrezzatura\n\nTrova la tua attrezzatura nascosta nel bagagliaio sul fondo dell'aereo e riprenditela. Ricorda che le forze di sicurezza del Presidente sono neutrali e non devono essere ferite, né tanto meno uccise.\n\n|Obiettivo 2: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 3: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 4: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl piano di Trent Easton per il rapimento del Presidente è iniziato. La reazione del Carrington Institute consiste nell'allontanamento del Presidente dall'Air Force One prima che ci riesca Trent.\n\n|Carrington:\n\nIl tempo stringe, Joanna. Per mandare a monte il piano di Trent devi riuscire a far scendere il Presidente dall'aereo. Ciò significa convincerlo del tradimento di Trent, il che a sua volta implica il ritrovamento delle prove dal bagagliaio dell'aereo e la loro esibizione al Presidente.\n\n|Obiettivo 1: - Localizza il Presidente\n\nL'esatta posizione dell'ufficio presidenziale è sconosciuta. Cercalo e una volta trovato presenta al Presidente le prove del tradimento. Fa in modo di arrivare là prima di Trent o sta sicura che sarà in grado di manipolare la situazione e rigirarla a suo vantaggio.\n\n|Obiettivo 2: - Porta il Presidente alla capsula\n\nSul piano inferiore del velivolo si trova una capsula di salvataggio. Scorta il Presidente fino ad essa facendo attenzione che non gli succeda nulla nel tragitto.\n\n|Obiettivo 3: - Stacca la capsula dall'Air Force One\n\nTaglia il cordone ombelicale dell'Air Force One! Il modo più semplice e veloce è quello di far esplodere una mina sul collegamento stesso.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Trova e recupera l'attrezzatura\n", + /* 6*/ "Localizza il Presidente\n", + /* 7*/ "Porta il Presidente alla capsula\n", + /* 8*/ "Accerta rotta di volo Air Force One\n", + /* 9*/ "Stacca la capsula dall'Air Force One\n", + /* 10*/ "Procurati valigia.\n", + /* 11*/ "\n", + /* 12*/ "Valigia\n", + /* 13*/ "Valigia\n", + /* 14*/ "Presa valigia.\n", + /* 15*/ "Procurati balestra.\n", + /* 16*/ "\n", + /* 17*/ "Balestra\n", + /* 18*/ "Balestra\n", + /* 19*/ "Presa balestra.\n", + /* 20*/ "Implicate vittime civili.\n", + /* 21*/ "Danneggiato collegamento a capsula.\n", + /* 22*/ "Impossibile staccare capsula.\n", + /* 23*/ "Attivato pilota automatico.\n", + /* 24*/ "L'Air Force One è stato stabilizzato.\n", + /* 25*/ "Distrutto pilota automatico.\n", + /* 26*/ "Il Presidente è stato ucciso.\n", + /* 27*/ "I piloti sono stati uccisi.\n", + /* 28*/ "I piloti sono stati salvati.\n", + /* 29*/ "L'Air Force One sta per schiantarsi.\n", + /* 30*/ "Procurati mina a distanza.\n", + /* 31*/ "\n", + /* 32*/ "Mina distanza\n", + /* 33*/ "Mina distanza\n", + /* 34*/ "Presa mina a distanza.\n", + /* 35*/ "E lei chi sarebbe?\n", + /* 36*/ "Sicurezza, SICUREZZA!!!\n", + /* 37*/ "Signor Presidente, lei è in pericolo. Trent sta \ntentando di rapirla!\n", + /* 38*/ "Cosa diavolo è stato?!\n", + /* 39*/ "Dobbiamo raggiungere la capsula di salvataggio! \nMi segua!\n", + /* 40*/ "Non può mica andare in giro a fare certe accuse \nsenza prove concrete!!! Spero che abbia \nuna valida spiegazione!\n", + /* 41*/ "Questa è una registrazione della riunione \ntra Trent e gli altri cospiratori!\n", + /* 42*/ "Una prova schiacciante... Sono nelle sue mani! \nCosa dobbiamo fare?\n", + /* 43*/ "Ehi, non è...\n", + /* 44*/ "È un intruso...\n", + /* 45*/ "Come diavolo sei salita a bordo?\n", + /* 46*/ "È ora di recuperare le prove!\n", + /* 47*/ "L'ufficio del Presidente è su \nquesto piano, Joanna!\n", + /* 48*/ "C'è qualcosa che non quadra... Devi andare nella cabina di pilotaggio, presto!\n", + /* 49*/ "Forse la capsula si può staccare con una mina.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Compressa di adrenalina\n", + /* 53*/ "Compressa di adrenalina\n", + /* 54*/ "Presa compressa di adrenalina.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Tessera magnetica\n", + /* 58*/ "Tessera magnetica\n", + /* 59*/ "Presa tessera magnetica.\n", + /* 60*/ "Abbassato bagagliaio.\n", + /* 61*/ "Alzato bagagliaio.\n", + /* 62*/ "Distrutto strumento essenziale alla missione.\n", + /* 63*/ "Accesso negato - Serve tessera ascensore.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Tessera ascensore\n", + /* 67*/ "Tessera ascensore\n", + /* 68*/ "Presa tessera ascensore.\n", + /* 69*/ "La mina a orologeria è stata sprecata.\n", + /* 70*/ "Ah, ah, ah , ah!!!\n", + /* 71*/ "Oramai non puoi più salvarlo!\n", + /* 72*/ "Stanno attaccando il Presidente!!!\n", + /* 73*/ "Ha più pensato alla proposta che le ho fatto, signore?\n", + /* 74*/ "La mia risposta è sempre la stessa, Trent! No, mi dispiace! Non metterò il Pelagic II a disposizione della dataDyne. Ora possiamo cambiare argomento, per favore?\n", + /* 75*/ "Ma questa è un'occasione d'oro per dimostrare che l'America ha piena fiducia nel suo tessuto industriale e che lo sostiene...\n", + /* 76*/ "Maledizione! Ho detto NO ed è NO! Non mi farà cambiare idea su questo punto Trent! I miei consiglieri devono essere imparziali e negli ultimi tempi non si può proprio dire che lei lo sia stato! Lasciamo perdere e dimentichiamo l'accaduto! Questa è la sua ultima possibilità, Trent!\n", + /* 77*/ "Come preferisce, signor Presidente!\n", + /* 78*/ "La MIA ultima possibilità? Si sbaglia di grosso: questa era la SUA!\n", + /* 79*/ "Elvis! Elvis! Non riesco a staccare il tubo dalla fusoliera! Tu ce la fai?\n", + /* 80*/ "Elementare, Joanna. Guarda qua!\n", + /* 81*/ "Eee... hop!\n", + /* 82*/ "Guarda cosa? La vuoi piantare di giocare e sparare una buona volta?!\n", + /* 83*/ "Non abbiamo scelta... Joanna, preparati all'impatto!\n", + /* 84*/ "I piloti hanno stabilizzato l'Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/rit_str_s.c b/src/files/lang/pal-final/rit_str_s.c new file mode 100644 index 000000000..cd2cba581 --- /dev/null +++ b/src/files/lang/pal-final/rit_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, deberás sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Asegurar la Trayectoria de Vuelo del Air Force One\n\nNo se conocen los detalles específicos del plan de Trent, pero se cree que la tripulación está en peligro. Llega hasta la cabina y asegúrate de su bienestar. Si ocurre lo peor, activa el piloto automático.\n\n|Objetivo Cinco: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 1*/ "AIR FORCE ONE\n", + /* 2*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar y Recuperar el Equipo\n\nEncuentra el equipo escondido en la bodega de carga en la parte inferior del avión, y tráelo de vuelta. Recuerda que los agentes de la seguridad Presidencial son neutrales por lo que no deben ser dañados.\n\n|Objetivo Dos: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Tres: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Cuatro: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl plan de Trent Easton para secuestrar al Presidente está en marcha. El Instituto Carrington debe hacer de bisagra sacando al Presidente del Air Force One antes de que Trent lo haga.\n\n|Carrington - \n\nQueda poco tiempo, Joanna. Para frustrar el plan de Trent, debemos sacar al Presidente del avión. Esto lo convencerá de la traición de Trent, lo que significa poder obtener evidencias en la bodega de carga de equipaje, las cuales podremos enseñar al Presidente.\n\n|Objetivo Uno: - Localizar al Presidente\n\nSe desconoce el paradero exacto de la oficina Presidencial. Cuando la encuentres, muestra las evidencias al Presidente. Asegúrate de llegar allí antes de que lo haga Trent, o puedes estar segura de que manipulará la situación a su favor.\n\n|Objetivo Dos: - Llevar al Presidente a la Cápsula de Escape\n\nExiste una cápsula de escape de emergencia en la bahía inferior del avión. Escolta al Presidente hasta la cápsula, asegurándote de que no recibe ningún daño.\n\n|Objetivo Tres: - Separar el OVNI del Air Force One\n\n¡Separa la conexión umbilical del Air Force One! La manera más rápida de hacerlo es detonar una mina en la propia conexión. \n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Localizar y recuperar el equipo\n", + /* 6*/ "Localizar al Presidente\n", + /* 7*/ "Llevar al Presidente a la cápsula\n", + /* 8*/ "Asegurar trayectoría del Air Force One\n", + /* 9*/ "Separar el OVNI del Air Force One\n", + /* 10*/ "Obtén la Maleta.\n", + /* 11*/ "\n", + /* 12*/ "Maleta\n", + /* 13*/ "Maleta\n", + /* 14*/ "Maleta obtenida.\n", + /* 15*/ "Obtén la Ballesta.\n", + /* 16*/ "\n", + /* 17*/ "Ballesta\n", + /* 18*/ "Ballesta\n", + /* 19*/ "Ballesta obtenida.\n", + /* 20*/ "Has causado demasiadas bajas neutrales.\n", + /* 21*/ "Conexión del OVNI dañado.\n", + /* 22*/ "Incapaz de separar el OVNI.\n", + /* 23*/ "El Piloto Automático ha sido activado.\n", + /* 24*/ "El Air Force One ha sido estabilizado.\n", + /* 25*/ "El Piloto Automático ha sido destruido.\n", + /* 26*/ "El Presidente ha sido eliminado.\n", + /* 27*/ "Los pilotos han muerto.\n", + /* 28*/ "Los pilotos han sido salvados.\n", + /* 29*/ "El Air Force One está a punto de estrellarse.\n", + /* 30*/ "Obtén la mina remota.\n", + /* 31*/ "\n", + /* 32*/ "Mina remota\n", + /* 33*/ "Mina remota\n", + /* 34*/ "Mina remota obtenida.\n", + /* 35*/ "¿Quién es usted, jovencita?\n", + /* 36*/ "¡¡Seguridad, SEGURIDAD!!\n", + /* 37*/ "Sr. Presidente, está usted en peligro. Trent intenta \nsecuestrarle.\n", + /* 38*/ "¡Qué demonios es eso!\n", + /* 39*/ "Debemos llevarle a la cápsula de escape. \nSígame.\n", + /* 40*/ "No puede hacer acusaciones como ésa sin evidencias.\n ¿Asumo que tendrá alguna?\n", + /* 41*/ "Ésta es una grabación de una reunión entre \nTrent y los otros conspiradores.\n", + /* 42*/ "Parece abrumador... Estoy en sus manos. \n¿Qué hacemos ahora?\n", + /* 43*/ "Hey, tú no eres...\n", + /* 44*/ "Es una intrusa...\n", + /* 45*/ "¿Cómo ha subido a bordo?\n", + /* 46*/ "Ahora, recuperemos la evidencia.\n", + /* 47*/ "La habitación del Presidente está en \neste nivel, Joanna.\n", + /* 48*/ "Algo va mal... ¡Debes llegar a la cabina!\n", + /* 49*/ "Quizá una mina separe el OVNI.\n", + /* 50*/ "\n", + /* 51*/ "\n", + /* 52*/ "Adrenalina\n", + /* 53*/ "Pastilla de Adrenalina\n", + /* 54*/ "Pastilla de Adrenalina obtenida.\n", + /* 55*/ "\n", + /* 56*/ "\n", + /* 57*/ "Llave magnética\n", + /* 58*/ "Llave magnética \n", + /* 59*/ "Llave magnética obtenida.\n", + /* 60*/ "La bahía de carga ha sido bajada.\n", + /* 61*/ "La bahía de carga ha sido subida.\n", + /* 62*/ "Objeto crítico de la misión destruido.\n", + /* 63*/ "Acceso denegado: llave magnética del ascensor requerida.\n", + /* 64*/ "\n", + /* 65*/ "\n", + /* 66*/ "Llave ascensor\n", + /* 67*/ "Llave magnética del ascensor \n", + /* 68*/ "Llave magnética del ascensor obtenida.\n", + /* 69*/ "La mina de tiempo ha sido desperdiciada.\n", + /* 70*/ "Ja, ja, ja, ja, ja.\n", + /* 71*/ "Ahora ya no podrás salvarle.\n", + /* 72*/ "Están atacando al Presidente.\n", + /* 73*/ "¿Ha reconsiderado algo más la propuesta que le hice, señor?\n", + /* 74*/ "Mi respuesta es la misma: lo siento, Trent, pero no. No quiero prestar el Pelagic II a dataDyne. Por favor, ¿podemos ahora tratar otras cuestiones?\n", + /* 75*/ "Pero ésta es una oportunidad de oro para demostrar que América tiene fe en sus industrias y que las apoya...\n", + /* 76*/ "¡Maldición! ¡He dicho no y significa no! ¡No pienso cambiar de opinión! Necesito que mis asesores sean imparciales, y ahora no me estás dando la imparcialidad que necesito. Déjalo, y no hablemos más de ello. Es tu última oportunidad.\n", + /* 77*/ "Como quiera, señor.\n", + /* 78*/ "¿Mi última oportunidad? ¡Ja! Idiota. Fue la tuya...\n", + /* 79*/ "¡Elvis! ¡Elvis! ¡No puedo soltar ese tubo del fuselaje! ¿Puedes hacerlo tú?\n", + /* 80*/ "Pan comido, Joanna. ¡Mira esto!\n", + /* 81*/ "Oh-oh.\n", + /* 82*/ "¿Mirar, qué? ¿Quieres dejar de juguetear? ¡Dispara!\n", + /* 83*/ "No hay más opciones... ¡Joanna, prepárate para el impacto!\n", + /* 84*/ "Los pilotos han estabilizado el Air Force One.\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/runE.c b/src/files/lang/pal-final/runE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/runJ.c b/src/files/lang/pal-final/runJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/runP.c b/src/files/lang/pal-final/runP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/runP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_f.c b/src/files/lang/pal-final/run_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_g.c b/src/files/lang/pal-final/run_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_i.c b/src/files/lang/pal-final/run_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/run_str_s.c b/src/files/lang/pal-final/run_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/run_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevE.c b/src/files/lang/pal-final/sevE.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-final/sevE.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevJ.c b/src/files/lang/pal-final/sevJ.c new file mode 100644 index 000000000..ec6481d25 --- /dev/null +++ b/src/files/lang/pal-final/sevJ.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "Mainframe destroyed!\nData cannot be downloaded.\n", + /* 1*/ "Get Elvis to warn the institute.\n", + /* 2*/ "Get Elvis to warn the institute.\n", + /* 3*/ "Get Elvis to warn the institute.\n", + /* 4*/ "Sabotage Enemy Medical Experiment\n", + /* 5*/ "Destroy Captured Maian Saucer\n", + /* 6*/ "Activate Distress Signal\n", + /* 7*/ "Medical Experiment Has Been Sabotaged\n", + /* 8*/ "Captured Maian Saucer Has Been Destroyed\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, + /* 12*/ NULL, + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevP.c b/src/files/lang/pal-final/sevP.c new file mode 100644 index 000000000..a8d87f7e4 --- /dev/null +++ b/src/files/lang/pal-final/sevP.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Destroy Captured Maian Craft\n\nMy final act of duty will be to destroy what remains of the vehicle in which I arrived on Earth. If anyone discovers that the technology within is similar to the Carrington Institute 'inventions,' then our allies on earth will be endangered, and I will have failed.\n\n|Objective Three: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 1*/ "AREA 51, NEVADA, EARTH\n", + /* 2*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Sabotage Enemy Medical Experiment\n\nThe body of my charge, the Maian Ambassador to Earth, is being experimented on. To complete my duty as a Maian Protector, I must ensure that the body is destroyed.\n\n|Objective Two: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 3*/ "|Background - \n\nEmergency capture protocols activated. Ship XD-310372 suffered hostile planetfall. Maian Protector One (Aelphaeis Mangarae) sole survivor. Planet designated pre-contact status; paranoia grade 'B+,' intolerance grade 'B,' xenophobia grade 'A.' Destroy equipment remaining; prevent examination of Maian technology and/or personnel.\n\n|Objective One: - Send Distress Signal to Allies\n\nThe Carrington Institute might be able to help me. If I can get a message out to them, they will know of my location and status. Any equipment I am unable to reach and destroy, they will.\n\nEND\n", + /* 4*/ "Sabotage enemy medical experiment\n", + /* 5*/ "Destroy captured Maian saucer\n", + /* 6*/ "Activate distress signal\n", + /* 7*/ "Medical experiment has been sabotaged.\n", + /* 8*/ "Captured Maian saucer has been destroyed.\n", + /* 9*/ "Distress signal has been sent.\n", + /* 10*/ "Critical mission object has been destroyed.\n", + /* 11*/ "Mission failed - cannot escape from medlab.\n", + /* 12*/ "Alternative escape route found.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_f.c b/src/files/lang/pal-final/sev_str_f.c new file mode 100644 index 000000000..0394aff11 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_f.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Détruire le vaisseau maian capturé\n\nMon dernier objectif sera de détruire les restes du vaisseau avec lequel je suis arrivé sur Terre. Si quelqu'un découvre la ressemblance entre nos technologies et celles de l'Institut Carrington nos alliés seront en danger et j'aurai échoué dans ma mission.\n\n|Objectif 3: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 1*/ "SECTEUR 51, NEVADA, TERRE\n", + /* 2*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Saboter le labo d'expérimentation ennemi\n\nDes expériences sont conduites sur le corps de l'ambassadeur. Je dois mener à bien ma tâche de Protecteur, pour cela je dois détruire ce corps.\n\n|Objectif 2: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nProtocole de capture d'urgence activé. Appareil XD-310372 a subit de gros dégâts après le crash. Protecteur maian (Aelphaeis Mangarae) seul survivant. Rapport statut planète: paranoïa degré 'B+,' intolérance degré 'B,' xénophobie degré 'A.' Détruire équipement afin d'empêcher toute étude de technologie maian par les habitants de cette planète.\n\n|Objectif 1: - Envoyer un message de détresse aux alliés\n\nL'Institut Carrington peut m'aider. Si je peux leur faire parvenir un message, ils connaîtront ma position et ma situation. Ils pourront ainsi détruire tout élément hors de ma portée.\n\nFIN\n", + /* 4*/ "Saboter labo de tests\n", + /* 5*/ "Détruire vaisseau maian capturé\n", + /* 6*/ "Activer le signal de détresse\n", + /* 7*/ "Labo de tests saboté.\n", + /* 8*/ "Vaisseau maian capturé détruit.\n", + /* 9*/ "Signal de détresse activé.\n", + /* 10*/ "Objet crucial détruit.\n", + /* 11*/ "Mission échouée - impossible de quitter labo de tests.\n", + /* 12*/ "Voie de sortie alternative activée.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_g.c b/src/files/lang/pal-final/sev_str_g.c new file mode 100644 index 000000000..35de19d9a --- /dev/null +++ b/src/files/lang/pal-final/sev_str_g.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Zerstören Sie das Maianische Schiff!\n\nMein letzter Akt der Pflichterfüllung besteht darin, das Schiff, mit dem ich die Erde erreicht habe, zu zerstören. Sollte irgendjemand feststellen, dass die sich an Bord befindliche Technologie der des Carrington Instituts ähnlich ist, geraten unsere Verbündeten auf der Erde in Gefahr, und meine Mission ist gescheitert.\n\n|3. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 1*/ "AREA 51, NEVADA, ERDE\n", + /* 2*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Sabotieren Sie das gegnerische medizinische Experiment!\n\nBei der Person, für die ich verantwortlich war, handelte es sich um den Maianischen Botschafter. Derzeit sollen an seinem Körper Experimente durchgeführt werden. Um meine Pflicht als Maianischer Protektor zu erfüllen, muss ich dafür Sorge tragen, dass der Körper zerstört wird.\n\n|2. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nNotfall-Logbuch aktiviert. Schiff XD-310372 wurde gezwungen, auf einem unerforschten Planeten notzulanden. Der einzige Überlebende ist der Maianische Protektor Nr. 1 (Aelphaeis Mangarae). Die Klassifizierung weist den Planeten als eine Welt im Prä-Kontakt-Status aus. Paranoia Grad 'B+', Intoleranz Grad 'B', Xenophobie Grad 'A'. Zerstören Sie die verbleibende Ausrüstung, und verhindern Sie die Bergung von Maianischer Technologie und/oder Personal.\n\n|1. Ziel: - Senden Sie ein Notsignal an Ihre Verbündeten!\n\nDas Carrington Institut kann mir eventuell helfen. Wenn es mir gelingt, eine Nachricht an sie zu schicken, können sie meine Position feststellen. Um die technische Ausrüstung, die ich nicht finde, wird sich dann das Institut kümmern.\n\nENDE\n", + /* 4*/ "Sabotieren Sie das Experiment!\n", + /* 5*/ "Zerstören Sie das Maianische Schiff!\n", + /* 6*/ "Senden Sie ein Notsignal!\n", + /* 7*/ "Medizinisches Experiment wurde sabotiert.\n", + /* 8*/ "Das Maianische Schiff wurde zerstört.\n", + /* 9*/ "Notsignal wurde gesendet.\n", + /* 10*/ "Wichtiges Objekt wurde zerstört.\n", + /* 11*/ "MISSION FEHLGESCHLAGEN - Flucht ist nicht mehr möglich.\n", + /* 12*/ "Es wurde eine alternative Fluchtroute gefunden.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_i.c b/src/files/lang/pal-final/sev_str_i.c new file mode 100644 index 000000000..904104465 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_i.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Elimina la navicella Maian sequestrata\n\nL'ultimo mio dovere sarà quello di distruggere quel che rimane della navicella Maian con cui sono arrivato sulla Terra. Se qualcuno scoprisse che la tecnologia di costruzione è simile a quella delle 'invenzioni' del Carrington Institute, i nostri alleati sulla Terra sarebbero in grave pericolo e io avrei fallito la mia missione.\n\n|Obiettivo 3: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 1*/ "AREA 51, NEVADA, TERRA\n", + /* 2*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Sabotaggio esperimento medico nemico\n\nIl corpo di cui sono responsabile, quello dell'ambasciatore Maian sulla Terra, è stato sottoposto ad un esperimento. Per compiere il mio dovere come Difensore Maian devo accertarmi che quel corpo venga eliminato.\n\n|Obiettivo 2: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nAttivati protocolli per misure di emergenza. Velivolo XD-310372 ha subito un attacco nemico ed è stato abbattuto. Maian Difensore 1 (Aelphaeis Mangarae) è l'unico sopravvissuto. Stato di precontatto progettato per il pianeta: paranoia grado 'B+', intolleranza grado 'B', xenofobia grado 'A'. Distruggi la strumentazione rimanente. Impedisci l'analisi della tecnologia Maian e/o degli individui.\n\n|Obiettivo 1: - Invia segnale di pericolo agli alleati\n\nIl Carrington Institute potrebbe essere in grado di aiutarmi. Devo riuscire a far pervenire loro un messaggio per informarli della mia posizione e del mio stato di salute. In tal modo potranno distruggere loro qualsiasi apparecchiatura che non riesco a raggiungere ed eliminare io stessa.\n\nFINE\n", + /* 4*/ "Sabotaggio esperimento medico nemico\n", + /* 5*/ "Elimina la navicella Maian sequestrata\n", + /* 6*/ "Invia segnale di pericolo\n", + /* 7*/ "L'esperimento medico è stato sabotato.\n", + /* 8*/ "La navicella Maian è stata distrutta.\n", + /* 9*/ "Il segnale di pericolo è stato inviato.\n", + /* 10*/ "Distrutto strumento essenziale alla missione.\n", + /* 11*/ "Missione fallita - Impossibile uscire dal laboratorio\n", + /* 12*/ "Trovata via di fuga alternativa.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sev_str_s.c b/src/files/lang/pal-final/sev_str_s.c new file mode 100644 index 000000000..bae650920 --- /dev/null +++ b/src/files/lang/pal-final/sev_str_s.c @@ -0,0 +1,20 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme de que el cuerpo es destruido.\n\n|Objetivo Dos: - Destruir la Nave Maian capturada\n\nMi último acto y mi deber será destruir lo que queda del vehículo en el que llegué a la Tierra. Si alguien descubre que su tecnología es similar a la de las 'invenciones' del Instituto Carrington, nuestros aliados terrícolas estarán en peligro, y habremos fallado.\n\n|Objetivo Tres: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 1*/ "ÁREA 51, NEVADA, TIERRA\n", + /* 2*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Sabotear el Experimento Médico Enemigo\n\nEstán experimentando con el cuerpo a mi cargo, el Embajador Maian para la Tierra. Para completar mi tarea como Protector Maian, debo asegurarme que el cuerpo es destruido.\n\n|Objetivo Dos: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nProtocolos de captura de emergencia activados. La nave XD-310372 ha caído en un planeta hostil. Protector Maian Uno (Aelphaeis Mangarae) es el único superviviente. Estatus del planeta designado: grado de paranoia 'B+', grado de intolerancia 'B', grado de xenofobia 'A'. Se debe destruir el equipo restante y evitar el estudio de la tecnología Maian y/o del personal.\n\n|Objetivo Uno: - Enviar una Señal de Socorro a nuestros Aliados\n\nEl Instituto Carrington podrá ayudarme. Si pudiera enviarles un mensaje, sabrían dónde localizarme y mi estatus. Cualquier equipo que yo no sea capaz de alcanzar ni destruir, seguro que ellos podrán hacerlo.\n\nFIN\n", + /* 4*/ "Sabotear experimento médico enemigo\n", + /* 5*/ "Destruir platillo Maian capturado\n", + /* 6*/ "Activar la señal de socorro\n", + /* 7*/ "El experimento médico ha sido saboteado.\n", + /* 8*/ "El platillo Maian ha sido destruido.\n", + /* 9*/ "La señal de socorro ha sido enviada.\n", + /* 10*/ "Objeto crítico de la misión ha sido destruido.\n", + /* 11*/ "Misión fallada: no puedes escapar del laboratorio.\n", + /* 12*/ "Ruta de escape alternativa encontrada.\n", + /* 13*/ NULL, + /* 14*/ NULL, + /* 15*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbE.c b/src/files/lang/pal-final/sevbE.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbE.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbJ.c b/src/files/lang/pal-final/sevbJ.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbJ.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevbP.c b/src/files/lang/pal-final/sevbP.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevbP.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_f.c b/src/files/lang/pal-final/sevb_str_f.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_f.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_g.c b/src/files/lang/pal-final/sevb_str_g.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_g.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_i.c b/src/files/lang/pal-final/sevb_str_i.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_i.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevb_str_s.c b/src/files/lang/pal-final/sevb_str_s.c new file mode 100644 index 000000000..4e68db084 --- /dev/null +++ b/src/files/lang/pal-final/sevb_str_s.c @@ -0,0 +1,12 @@ +#include + +char *lang[] = { + /* 0*/ "Retaking the Institute.\nLead the team and clean out the building.\n", + /* 1*/ "Lead the team and clean out the building.\n", + /* 2*/ "Lead the team and clean out the building.\n", + /* 3*/ "Kill All Enemy Agents\n", + /* 4*/ "Do Something Else\n", + /* 5*/ "And Something Else\n", + /* 6*/ NULL, + /* 7*/ NULL, +}; diff --git a/src/files/lang/pal-final/sevxE.c b/src/files/lang/pal-final/sevxE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxJ.c b/src/files/lang/pal-final/sevxJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxP.c b/src/files/lang/pal-final/sevxP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_f.c b/src/files/lang/pal-final/sevx_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_g.c b/src/files/lang/pal-final/sevx_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_i.c b/src/files/lang/pal-final/sevx_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevx_str_s.c b/src/files/lang/pal-final/sevx_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevx_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbE.c b/src/files/lang/pal-final/sevxbE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbJ.c b/src/files/lang/pal-final/sevxbJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxbP.c b/src/files/lang/pal-final/sevxbP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxbP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_f.c b/src/files/lang/pal-final/sevxb_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_g.c b/src/files/lang/pal-final/sevxb_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_i.c b/src/files/lang/pal-final/sevxb_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/sevxb_str_s.c b/src/files/lang/pal-final/sevxb_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/sevxb_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/shoE.c b/src/files/lang/pal-final/shoE.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-final/shoE.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/shoJ.c b/src/files/lang/pal-final/shoJ.c new file mode 100644 index 000000000..dabb92652 --- /dev/null +++ b/src/files/lang/pal-final/shoJ.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment.\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Activate Bridge\n\nApparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the inner sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targetting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment\n\n|Objective Two: - Gain Access To Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Three: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar Warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Four: - Assasinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale, and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify Temple Targets\n", + /* 6*/ "Activate Bridge\n", + /* 7*/ "Gain Access To Inner Sanctum\n", + /* 8*/ "Destroy Secret Skedar Army\n", + /* 9*/ "Assasinate Skedar Leader\n", + /* 10*/ "Obtain Night Sight\n", + /* 11*/ "\n", + /* 12*/ "Night Sight\n", + /* 13*/ "Night Sight\n", + /* 14*/ "Picked up Night Sight\n", + /* 15*/ "Obtain Scanner\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner\n", + /* 20*/ "Obtain Target Amplifier\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier\n", + /* 25*/ "Target Amplifier placed correctly\n", + /* 26*/ "Target Amplifier placed incorrectly\n", + /* 27*/ "Generator De-activated\n", + /* 28*/ "Skedar Inner Sanctum Has Been Reached\n", + /* 29*/ "Skedar Secret Army Has Been Defeated\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant round here. This must\nbe the inner sanctum.\n", + /* 32*/ "OH NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay this is it... cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The battle shrine is located at the most holy part of this holy planet.", + /* 35*/ "So let me get this straight, its holy. But there's more to it than that, isn't there?", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire, but we always had to be on our guard. The destruction of this place would mean a chance at true peace.", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.", + /* 38*/ "If you're caught on the ground when the fleet gets here you won't stand a chance. ", + /* 39*/ "That's a mistake I don't intend to make.", + /* 40*/ "Yesss...", + /* 41*/ "Joanna! Joanna! Where are you? Are you hurt?", + /* 42*/ "Elvis! Elvis! Over here.", + /* 43*/ "No problem, grab my arms, well get you out in no time.", + /* 44*/ "No, quick! Give me a gun!", + /* 45*/ "Will! You! Just! Let! Go!", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.", + /* 48*/ "Of course, Joanna, of course.", + /* 49*/ "No, I would have.", + /* 50*/ "I believe you.", + /* 51*/ NULL, + /* 52*/ NULL, + /* 53*/ NULL, + /* 54*/ NULL, + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/shoP.c b/src/files/lang/pal-final/shoP.c new file mode 100644 index 000000000..5f0a1bb79 --- /dev/null +++ b/src/files/lang/pal-final/shoP.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Destroy Secret Skedar Army\n\nThe Maian High Command suspects that more Skedar warriors are kept in stasis in unknown locations. This could be one of those places. If it is, destroy them. The last thing we need to face now is a stream of psychotic reinforcements.\n\n|Objective Five: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 1*/ "SKEDAR BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Gain Access to Inner Sanctum\n\nSearch through the maze of underground corridors to find the Inner Sanctum. Expect resistance to be fierce, fanatical even. This is a shrine to war, and they are very devout in their worship.\n\n|Objective Four: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 3*/ "|Background - \n\nThe hidden heart of the Skedar religion is exposed at last - a desert planet burning under three suns. The leader of the Skedar terrorist faction is based at the Battle Shrine on the surface of the planet. The destruction of the Shrine and the death of their leader would break the morale of the Skedar.\n\n|Carrington - Not Available.\n\n|Elvis - \n\nThere's some groundwork to do, Joanna - I need parts of the temple marked as targets for bombardment. And we need to be absolutely certain that the Skedar leader is dead. He is sure to have powerful shielding capable of withstanding gunfire, so you may need to destroy part of the shrine itself to deal the final blow.\n\n|Objective One: - Identify Temple Targets\n\nAttach a targeting device to each of three obelisks on the surface. They form part of a damaged but still functional shield generator that might cause part of the Shrine to escape the bombardment. Use the R-Tracker to identify the correct ones.\n\n|Objective Two: - Activate Bridge\n\nYou may have to blow a hole in the outer wall just to gain access to the shrine interior - your IR scanner should help find a weak spot in the structure. Once inside the perimeter, there's another problem. Apparently caused many years ago by one of the earthquakes which plague the planet, a deep ravine cuts the Inner Sanctum area off from the rest of the Shrine. The Skedar have made a retractable bridge to provide access, but you can guarantee it will be well guarded.\n\n|Objective Three: - Assassinate Skedar Leader\n\nThe leader is a warrior much revered by the Skedar. His death will be a hammer blow to their morale and will mark the end of their warpath throughout the galaxy. Peace for all.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "Identify temple targets\n", + /* 6*/ "Activate bridge\n", + /* 7*/ "Gain access to Inner Sanctum\n", + /* 8*/ "Destroy secret Skedar army\n", + /* 9*/ "Assassinate Skedar leader\n", + /* 10*/ "Obtain Night Vision.\n", + /* 11*/ "\n", + /* 12*/ "Night Vision\n", + /* 13*/ "Night Vision\n", + /* 14*/ "Picked up Night Vision.\n", + /* 15*/ "Obtain Scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Picked up Scanner.\n", + /* 20*/ "Obtain Target Amplifier.\n", + /* 21*/ "\n", + /* 22*/ "Target Amplifier\n", + /* 23*/ "Target Amplifier\n", + /* 24*/ "Picked up Target Amplifier.\n", + /* 25*/ "Target Amplifier placed correctly.\n", + /* 26*/ "Target Amplifier placed incorrectly.\n", + /* 27*/ "Generator has been reactivated.\n", + /* 28*/ "Skedar Inner Sanctum has been reached.\n", + /* 29*/ "Skedar secret army has been defeated.\n", + /* 30*/ "This seems to be one of the special pillars.\n", + /* 31*/ "The power's more constant in this area. \nThe Inner Sanctum can't be far away.\n", + /* 32*/ "OH, NO!!! A Skedar army in suspended animation!\n", + /* 33*/ "Okay, this is it... Cut off the head and the \nbody will perish.\n", + /* 34*/ "This is the Skedar fanatics' most holy place. They believe this planet is sacred ground. The Battle Shrine is located at the most holy part of this holy planet.\n", + /* 35*/ "So let me get this straight - it's holy. But there's more to it than that, isn't there?\n", + /* 36*/ "Yes. In all of the time that we Maians fought the Skedar, we never found this place. We knew that until it was destroyed, the war would never be over. We fought the Skedar to a standstill, we earned a ceasefire - but we always had to be on our guard. The destruction of this place would mean a chance at true peace.\n", + /* 37*/ "Then we have to be certain that no fanatics survive. I'll go in and take out the leader. You'll have to summon the Maian fleet to level the Shrine.\n", + /* 38*/ "If you're caught on the ground when the fleet gets here, you won't stand a chance.\n", + /* 39*/ "That's a mistake I don't intend to make.\n", + /* 40*/ "Yesss...\n", + /* 41*/ "Joanna! Joanna! \n", + /* 42*/ "Elvis! Elvis! Over here.\n", + /* 43*/ "No problem. Grab my arms - we'll get you out in no time.\n", + /* 44*/ "No, quick! Give me your gun!\n", + /* 45*/ "Will! You! Just! Let! Go!\n", + /* 46*/ "I managed to get the fleet to stop the bombardment while I looked for you. They'll start as soon as we're clear.\n", + /* 47*/ "I'd have got out in time if that one hadn't grabbed my foot.\n", + /* 48*/ "Of course, Joanna, of course.\n", + /* 49*/ "No, I would have.\n", + /* 50*/ "I believe you.\n", + /* 51*/ "Make your sacrifice to the God of War.\n", + /* 52*/ "Grenade ammo used up - can't enter Shrine.\n", + /* 53*/ "Alternative entrance to Shrine created.\n", + /* 54*/ "Where are you? Are you hurt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_f.c b/src/files/lang/pal-final/sho_str_f.c new file mode 100644 index 000000000..d69096fcb --- /dev/null +++ b/src/files/lang/pal-final/sho_str_f.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion Skedar. Il se trouve sur une planète désertique. Le chef des terroristes Skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, nous pouvons seulement garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au Centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter à une résistance acharnée. Tu vas te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Eliminer l'armée Skedar\n\nLe haut commandement maian pense que des soldats skedars sont gardés dans des champs de stase à l'intérieur de cette installation. Si cela est vrai, il faudra les détruire. La dernière chose dont nous avons besoin c'est une armée de fanatiques psychotiques.\n\n|Objectif 5: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 1*/ "AUTEL DE BATAILLE SKEDAR\n", + /* 2*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion skedar. Il se trouve sur une planète désertique. Le chef des terroristes skedars se cache dans un Temple de la guerre placé à la surface de la planète. La destruction du Temple et l'élimination de leur leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement te garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Accéder au centre du Sanctuaire\n\nTu dois parcourir et explorer le dédale de corridors pour trouver le Sanctuaire. Tu vas certainement te heurter à une résistance acharnée. Tu vas te déplacer dans le Temple de la guerre, et les Skedars sont des fanatiques. Ils ne se laisseront pas faire.\n\n|Objectif 4: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nNous avons enfin découvert le sanctuaire de la religion skedar. Il se trouve sur une planète désertique. Le chef des terroristes skedars se cache dans un Temple de la guerre situé à la surface de la planète. La destruction du Temple et l'élimination de leur chef pourrait semer le trouble dans leurs rangs.\n\n|Carrington - Indisponible.\n\n|Elvis - \n\nIl va falloir faire dans l'infiltration, Joanna. Je veux que tu marques des parties du Temple pour guider un bombardement stratégique. De plus, je veux être sûr de l'élimination du chef des Skedars.\n\n|Objectif 1: - Identifier les cibles du Temple\n\nPlace une balise de guidage sur les trois obélisques à la surface. Ils forment une sorte de générateur de bouclier énergétique qui serait susceptible de protéger le Temple des bombardements. Utilise un Pisteur-R pour identifier les objectifs valides.\n\n|Objectif 2: - Activer le pont\n\nApparemment, un gigantesque tremblement de terre aurait créé une fissure qui sépare le saint des saints de ce sanctuaire du reste du Temple. Les Skedars ont installé un gigantesque pont escamotable qui permet d'y accéder, je peux seulement te garantir qu'il sera extrêmement bien gardé.\n\n|Objectif 3: - Assassiner le chef des Skedars\n\nLe chef est un puissant guerrier, vénéré par les Skedars. Sa mort perturbera leur moral et mettra certainement un terme à leur désir de conquête galactique. La paix pourra ainsi régner.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Identifier les cibles du Temple\n", + /* 6*/ "Activer le pont\n", + /* 7*/ "Accéder au centre du sanctuaire\n", + /* 8*/ "Détruire l'armée secrète Skedar\n", + /* 9*/ "Assassiner le chef des Skedars\n", + /* 10*/ "Obtenir Vue nocturne.\n", + /* 11*/ "\n", + /* 12*/ "Vue nocturne\n", + /* 13*/ "Vue nocturne\n", + /* 14*/ "Vue nocturne obtenue.\n", + /* 15*/ "Obtenir scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner obtenu.\n", + /* 20*/ "Obtenir Ampli cible.\n", + /* 21*/ "\n", + /* 22*/ "Ampli cible\n", + /* 23*/ "Ampli cible\n", + /* 24*/ "Ampli cible obtenu.\n", + /* 25*/ "Ampli cible positionné correctement.\n", + /* 26*/ "Ampli cible mal positionné.\n", + /* 27*/ "Générateur activé.\n", + /* 28*/ "Centre du sanctuaire Skedar atteint.\n", + /* 29*/ "Armée secrète Skedar détruite.\n", + /* 30*/ "Ca ressemble à un des piliers que je suis censée trouver.\n", + /* 31*/ "Cette zone est plus stable. \nLe sanctuaire doit être proche.\n", + /* 32*/ "OH, NON!!! Une armée skedar en animation suspendue!\n", + /* 33*/ "Très bien, il faut trancher la tête...le reste périra lentement.\n", + /* 34*/ "Voici le saint des saints des fanatiques skedars. Ils pensent que cette planète est sacrée. L'Autel de Bataille est le lieu le plus vénéré de cette planète.\n", + /* 35*/ "Je vois. Cet endroit est sacré pour eux. Mais ce n'est pas tout, il y a autre chose, n'est-ce pas?", + /* 36*/ "En effet. Depuis le temps que les Maians se battent contre les Skedars, nous n'avons jamais pu trouver cet endroit. Sa destruction est la clé de la victoire. Nous avons combattu jusqu'à obtenir un cessez-le-feu, mais nous avons toujours été sur nos gardes. La destruction de cet endroit pourra enfin donner une chance à la paix.\n", + /* 37*/ "Nous devons être certains qu'aucun fanatique ne survivra. Je vais m'occuper du chef. Il faudra que tu prépares l'armada maian pour pulvériser ce satané temple.\n", + /* 38*/ "Il faudra que tu t'enfuies avant les bombardements, nous n'allons pas faire dans le détail.\n", + /* 39*/ "Je ne compte pas vraiment m'éterniser.\n", + /* 40*/ "Ouiii...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Par ici.\n", + /* 43*/ "Pas de problème. Attrape mon bras. On va te sortir de là.\n", + /* 44*/ "Non, vite! Donne-moi ton arme!\n", + /* 45*/ "Fous le camp!\n", + /* 46*/ "J'ai réussi à retarder le bombardement, la flotte est en attente. Ils vont commencer dès que nous serons partis.\n", + /* 47*/ "Je m'en serais tirée si ce gros lourdaud ne m'avait pas attrapé le pied.\n", + /* 48*/ "J'en suis sûr, Joanna, j'en suis sûr.\n", + /* 49*/ "Non, je te dis que je l'aurais fait.\n", + /* 50*/ "Mais je te crois.\n", + /* 51*/ "Fais tes prières au dieu de la guerre.\n", + /* 52*/ "Plus de grenades - Impossible d'entrer dans le Temple.\n", + /* 53*/ "Autre accès au Temple créé.\n", + /* 54*/ "Où es-tu? Tout va bien?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_g.c b/src/files/lang/pal-final/sho_str_g.c new file mode 100644 index 000000000..ec4420891 --- /dev/null +++ b/src/files/lang/pal-final/sho_str_g.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Vernichten Sie die geheime Skedar-Armee!\n\nDas Hohe Kommando der Maianer vermutet, dass eine große Anzahl von sich in Stasis befindlichen Skedar an geheimen Orten untergebracht ist. Der Schrein könnte einer dieser Orte sein. Wenn das der Fall ist, muss er zerstört werden. Das Letzte, was wir jetzt brauchen können, ist ein nicht enden wollender Strom von psychotischen Fanatikern.\n\n|5. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 1*/ "SKEDAR KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Gelangen Sie in den inneren Bereich!\n\nEin unterirdisches Labyrinth führt in den inneren Bereich. Rechnen Sie mit starkem, wenn nicht gar fanatischem Widerstand. Letztendlich handelt es sich um einen Kriegsschrein, und die Skedar sind ausgesprochen gläubig.\n\n|4. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas versteckte Zentrum der Skedar-Religion ist nunmehr entdeckt. Es handelt sich um einen von Wüsten bedeckten Planeten, der von drei Sonnen beschienen wird. Der Anführer der terroristischen Skedar-Fraktion hält sich in einem Schrein auf der Oberfläche des Planeten auf. Die Zerstörung des Schreins und der Tod ihres Anführers würde die Moral der Skedar untergraben.\n\n|Carrington - Nicht verfügbar.\n\n|Elvis - \n\nEs gilt, ein bisschen Vorarbeit zu leisten, Joanna. Einige Teile des Tempels müssen für die Bombardierung als Ziele markiert werden. Außerdem müssen wir absolut sichergehen, dass der Anführer der Skedar nicht mehr am Leben ist. Es ist anzunehmen, dass er über einen starken Schutzschild verfügt, der jeglichem Beschuss standhält. Das bedeutet, dass Sie wohl einen Teil des Schreins zerstören müssen, um den Anführer zu besiegen.\n\n|1. Ziel: - Identifizieren Sie die Ziele!\n\nBefestigen Sie Peilgeräte an jedem der drei Obelisken auf der Oberfläche. Sie sind Bestandteil eines beschädigten, aber immer noch funktionstüchtigen Schildgenerators. Wird dieser nicht außer Kraft gesetzt, könnten Teile des Schreins dem Bombenhagel entgehen. Setzen Sie den Tracker ein, um die Ziele zu identifizieren.\n\n|2. Ziel: - Aktivieren Sie die Brücke!\n\nSie müssen ein Loch in die Außenmauer sprengen, um in das Innere des Schreins zu gelangen. Ihr IR-Scanner sollte in der Lage sein, eine Schwachstelle ausfindig zu machen. Sobald Sie diese Aufgabe erfüllt haben, ergibt sich ein weiteres Problem. Durch eines der Erdbeben, von welchen der Planet ständig erschüttert wird, ist ein tiefer Graben entstanden. Dadurch wird der innere Bereich vom Rest des Schreins abgeschnitten. Die Skedar haben eine ausfahrbare Brücke errichtet, um die beiden Gebiete miteinander zu verbinden. Sie müssen aber davon ausgehen, dass die Brücke streng bewacht wird.\n\n|3. Ziel: - Eliminieren Sie den Anführer der Skedar!\n\nDer Anführer der Skedar genießt bei seinen Gefolgsleuten großes Ansehen. Sein Tod ist gleichzeitig ein Schlag gegen ihre Moral. Der unaufhörliche Kriegszug durch die Galaxie könnte ein für allemal gestoppt werden!\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "Identifizieren Sie die Ziele!\n", + /* 6*/ "Aktivieren Sie die Brücke!\n", + /* 7*/ "Gelangen Sie in den inneren Bereich!\n", + /* 8*/ "Vernichten Sie die geheime Armee!\n", + /* 9*/ "Eliminieren Sie den Anführer!\n", + /* 10*/ "Erlangen Sie das Nachtsichtgerät!\n", + /* 11*/ "\n", + /* 12*/ "Nachtsichtgerät\n", + /* 13*/ "Nachtsichtgerät\n", + /* 14*/ "Nachtsichtgerät aufgenommen\n", + /* 15*/ "Erlangen Sie den Scanner!\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Scanner aufgenommen\n", + /* 20*/ "Erlangen Sie das Peilgerät!\n", + /* 21*/ "\n", + /* 22*/ "Peilgerät\n", + /* 23*/ "Peilgerät\n", + /* 24*/ "Peilgerät aufgenommen\n", + /* 25*/ "Peilgerät wurde korrekt platziert.\n", + /* 26*/ "Peilgerät wurde nicht korrekt platziert.\n", + /* 27*/ "Generator wurde reaktiviert.\n", + /* 28*/ "Der innere Bereich des Schreins wurde erreicht.\n", + /* 29*/ "Die geheime Skedar-Armee wurde vernichtet.\n", + /* 30*/ "Das scheint eine der drei Säulen zu sein.\n", + /* 31*/ "Die Stromversorgung in diesem Bereich wird immer konstanter. \nDer innere Bereich kann nicht weit entfernt sein.\n", + /* 32*/ "OH NEIN!!! Die geheime Armee befindet sich tatsächlich in dem Schrein!\n", + /* 33*/ "Okay, es muss sein... Wenn der Kopf abgeschnitten wird, \nstirbt auch der Körper.\n", + /* 34*/ "Dies ist der heiligste Ort der Skedar. Der Planet scheint ihr heiliges Land zu sein. Der Schrein befindet sich am heiligsten Ort dieses heiligen Planeten.\n", + /* 35*/ "Lass mich mal resümieren: Hier ist es heilig. Aber das kann noch nicht alles sein, oder?\n", + /* 36*/ "Stimmt. In all der Zeit, in der die Maianer gegen die Skedar gekämpft haben, konnten wir diesen Ort nicht ausfindig machen. Wir wussten, dass, solange dieser Ort besteht, der Krieg niemals enden würde. Zwar konnten wir einen Waffenstillstand erzielen, mussten aber trotzdem stets wachsam sein. Die Zerstörung des Schreins wäre eine Chance, wieder Frieden zu erlangen.\n", + /* 37*/ "Also müssen wir dafür sorgen, dass kein Skedar überlebt. Ich gehe rein und kümmere mich um den Anführer, und du koordinierst inzwischen den Angriff der Maianischen Flotte.\n", + /* 38*/ "Aber wenn du nicht rechtzeitig von dort verschwindest, hast du keine Chance.\n", + /* 39*/ "Das ist ein Fehler, den ich nicht begehen werde.\n", + /* 40*/ "Jaaa...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Hier drüben!\n", + /* 43*/ "OK! Halt dich an mir fest! Wir bringen dich sofort hier raus.\n", + /* 44*/ "Nein! Rasch! Gib mir eine Waffe!\n", + /* 45*/ "Lass! Mich! Endlich! In! Frieden!!!\n", + /* 46*/ "Ich konnte das Bombardement der Flotte einstellen, um nach dir zu suchen. Der Angriff geht weiter, wenn wir hier raus sind.\n", + /* 47*/ "Ich hätte es rechtzeitig geschafft, wenn mich der Kerl hier nicht erwischt hätte.\n", + /* 48*/ "Natürlich, Joanna, natürlich.\n", + /* 49*/ "Ich hätte es geschafft!\n", + /* 50*/ "Ich glaube dir.\n", + /* 51*/ "Bring dem Gott des Krieges dein Opfer dar!\n", + /* 52*/ "Granaten verbraucht - Zutritt unmöglich.\n", + /* 53*/ "Es wurde ein alternativer Eingang erschaffen.\n", + /* 54*/ "Wo bist du? Bist du verletzt?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_i.c b/src/files/lang/pal-final/sho_str_i.c new file mode 100644 index 000000000..ae79fe392 --- /dev/null +++ b/src/files/lang/pal-final/sho_str_i.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Distruggi l'esercito segreto Skedar \n\nIl Comandante Supremo Maian sospetta la presenza di altri guerrieri Skedar conservati in stasi in luoghi a noi ignoti e questo potrebbe essere uno di quelli, perciò lo dovrai distruggere. L'ultima cosa di cui abbiamo bisogno ora è un'orda di fanatici psicotici.\n\n|Obiettivo 5: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente regnerà la pace!\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA SKEDAR\n", + /* 2*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Trova l'accesso al Santuario Interno\n\nInoltrati nel labirinto di corridoi sotterranei per trovare l'ingresso al Santuario Interno. Troverai una resistenza accanita e talvolta addirittura fanatica. Si tratta di un tempio dedicato alla guerra, costruito da creature estremamente devote al loro culto.\n\n|Obiettivo 4: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nFinalmente è stato scoperto il fulcro della religione Skedar: un pianeta deserto, arso dal calore di tre soli. Il capo della fazione terroristica Skedar ha la sua roccaforte nel Tempio della Guerra sulla superficie del pianeta. La distruzione del tempio e la morte del loro capo implicherebbe la decadenza degli Skedar.\n\n|Carrington:\n\nIrreperibile.\n\n|Elvis:\n\nC'è da fare un po' di lavoro preliminare, Joanna! Bisogna contrassegnare vari settori del tempio come obiettivi per il bombardamento. Inoltre dobbiamo essere assolutamente sicuri che il capo degli Skedar sia morto stecchito! Sappiamo che dispone di uno scudo molto potente in grado di contrastare le armi da fuoco, quindi dovrai distruggere parte del tempio stesso in preparazione al colpo finale.\n\n|Obiettivo 1: - Identifica gli obiettivi nel tempio\n\nAttacca un bersaglio su ciascuno dei tre obelischi del tempio. Essi fanno parte del generatore degli scudi che è stato danneggiato, ma è ancora attivo e perciò in grado di proteggere parte del tempio dalla distruzione totale. Usa il puntatore-R per identificare gli obiettivi corretti.\n\n|Obiettivo 2: - Attiva il ponte retrattile\n\nPer riuscire ad accedere al tempio dovrai ricavare un passaggio nel muro esterno. Lo scanner a infrarossi ti aiuterà a scoprire un punto debole nella struttura muraria. All'interno ti attende un altro problema: la zona dove si erge il Santuario Interno è separata dal resto del tempio da un profondo abisso apparentemente causato molti secoli or sono da uno dei frequenti terremoti che affliggono il pianeta. Per raggiungere tale area gli Skedar hanno costruito un ponte retrattile, che sarà sicuramente sotto sorveglianza speciale.\n\n|Obiettivo 3: - Elimina il capo degli Skedar\n\nIl capo è un guerriero particolarmente venerato dagli Skedar. La sua morte sarebbe un colpo fatale per questa civiltà e segnerebbe la fine del loro sentiero di guerra attraverso la galassia. Finalmente sarà la pace!\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "Identifica gli obiettivi nel tempio\n", + /* 6*/ "Attiva il ponte retrattile\n", + /* 7*/ "Trova l'accesso al Santuario Interno\n", + /* 8*/ "Distruggi l'esercito segreto Skedar\n", + /* 9*/ "Elimina il capo degli Skedar\n", + /* 10*/ "Procurati Vista Notturna.\n", + /* 11*/ "\n", + /* 12*/ "Vista Notturna\n", + /* 13*/ "Vista Notturna\n", + /* 14*/ "Presa Vista Notturna.\n", + /* 15*/ "Procurati scanner.\n", + /* 16*/ "\n", + /* 17*/ "Scanner\n", + /* 18*/ "Scanner\n", + /* 19*/ "Preso scanner.\n", + /* 20*/ "Procurati bersaglio.\n", + /* 21*/ "\n", + /* 22*/ "Bersaglio\n", + /* 23*/ "Bersaglio\n", + /* 24*/ "Preso bersaglio.\n", + /* 25*/ "Bersaglio piazzato correttamente.\n", + /* 26*/ "Bersaglio in posizione errata.\n", + /* 27*/ "Il generatore è stato riattivato.\n", + /* 28*/ "Raggiunto Santuario Interno Skedar.\n", + /* 29*/ "Distrutto esercito segreto Skedar.\n", + /* 30*/ "Questo sembra uno degli obelischi.\n", + /* 31*/ "Qui il campo energetico sembra più costante. \nIl Santuario Interno non può essere lontano.\n", + /* 32*/ "OH, NO!!! Un esercito Skedar in stato di morte apparente!\n", + /* 33*/ "Benissimo, ecco fatto! Mozzandogli il capo \nil corpo morirà!\n", + /* 34*/ "Questo è il luogo più SACRO per quei fanatici degli Skedar! Credono che questo pianeta sia SACRO ed inviolabile. Il Tempio di Guerra si trova nella parte più SACRA di questo pianeta SACRO!\n", + /* 35*/ "Fammi capire bene... Ma, allora è SACRO! Però c'è anche dell'altro, vero?\n", + /* 36*/ "Sì! In tutto il tempo che noi Maian abbiamo lottato contro gli Skedar non siamo mai riusciti a scoprire questo posto. Sapevamo che la guerra non sarebbe mai finita finché non fosse stato distrutto: abbiamo costretto gli Skedar a una tregua, li abbiamo piegati a cessare il fuoco, ma comunque non potevamo mai abbassare la guardia. La distruzione di questo posto implicherà una pace vera! \n", + /* 37*/ "Allora dobbiamo accertarci che non ci sfugga nessun fanatico: io entro e porto fuori il capo; tu chiami a raccolta la flotta Maian per radere al suolo il tempio!\n", + /* 38*/ "Se ti trovi ancora in giro quando fa irruzione la flotta, non avrai più possibilità di salvezza!\n", + /* 39*/ "È un errore che intendo evitare!\n", + /* 40*/ "Proprio così...\n", + /* 41*/ "Joanna! Joanna!\n", + /* 42*/ "Elvis! Elvis! Da questa parte!\n", + /* 43*/ "Nessun problema! Afferra il mio braccio! Ti tireremo fuori in un batter d'occhio!\n", + /* 44*/ "No, presto! Dammi la pistola!\n", + /* 45*/ "VUOI LASCIARMI ANDARE?! PER LA MISERIA?!!\n", + /* 46*/ "La flotta ha interrotto il bombardamento per darmi il tempo di trovarti. Andranno avanti non appena saremo fuori di qui!\n", + /* 47*/ "Sarei riuscita a svignarmela in tempo, se quello non mi si fosse aggrappato al piede!\n", + /* 48*/ "Ma certo, Joanna, naturalmente!\n", + /* 49*/ "No, veramente!!!\n", + /* 50*/ "Sì, sì, ti credo!\n", + /* 51*/ "Compi il tuo sacrificio in onore del Dio della Guerra.\n", + /* 52*/ "Granate esaurite - Impossibile entrare nel tempio.\n", + /* 53*/ "Creata entrata alternativa al tempio.\n", + /* 54*/ "Dove sei? Sei ferita?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/sho_str_s.c b/src/files/lang/pal-final/sho_str_s.c new file mode 100644 index 000000000..1a2f061dd --- /dev/null +++ b/src/files/lang/pal-final/sho_str_s.c @@ -0,0 +1,60 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos en el Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca a través del laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Destruir el Ejército Secreto Skedar\n\nEl Alto Comando Maian sospecha que más guerreros Skedar están en estado de hibernación en lugares desconocidos. Éste puede ser uno de esos lugares. Si así es, destrúyelos. La última cosa que necesitamos es enfrentarnos a una oleada de refuerzos sicóticos.\n\n|Objetivo Cinco: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA SKEDAR\n", + /* 2*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Acceder al Interior Sacro\n\nBusca en el laberinto de corredores subterráneos para encontrar el Interior Sacro. Se espera una resistencia feroz, incluso fanática. Éste es un templo dedicado a la guerra, y son muy devotos con sus creencias.\n\n|Objetivo Cuatro: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nPor fin se ha descubierto el oculto corazón de la religión Skedar: un planeta desierto que arde bajo tres soles. El líder de la facción terrorista Skedar tiene su base en el Templo de Batalla, sito en la superficie del planeta. La destrucción del Templo y la muerte de su líder destrozaría la moral de los Skedar.\n\n|Carrington - No Disponible.\n\n|Elvis - \n\nTenemos trabajo de campo por hacer, Joanna. Necesito marcar como blancos ciertas partes del templo para el bombardeo. Y necesitamos tener la absoluta certeza de que el líder Skedar muere. Seguro que posee un poderoso escudo capaz de soportar tiroteos, así que necesitarás destruir parte del propio santuario para asestar el golpe final.\n\n|Objetivo Uno: - Posicionar Blancos del Templo\n\nConecta dispositivos de control de blancos a cada uno de los tres obeliscos de la superficie. Forman parte de un dañado, pero todavía funcional, generador de escudo que puede evitar que parte del Templo escape al bombardeo. Usa el Rastreador-R para identificar los correctos.\n\n|Objetivo Dos: - Activar el Puente\n\nDeberás abrir un agujero en el muro exterior para acceder al interior del santuario: tu escáner de infrarrojos te ayudará a encontrar un punto débil en la estructura. Una vez dentro del perímetro, hay otro problema. Aparentemente producido hace muchos años por uno de los terremotos que asolan el planeta, un profundo barranco separa el Interior Sacro del resto del Templo. Los Skedar han construido un puente móvil para acceder al mismo, pero puedes estar segura de que estará bien protegido.\n\n|Objetivo Tres: - Eliminar al Líder Skedar\n\nEl líder es un guerrero reverenciado por los Skedar. Su muerte será un duro mazazo a su moral y marcará el fin de su guerra por toda la galaxia. O sea, paz para todos.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "Posicionar blancos en el templo\n", + /* 6*/ "Activar el puente\n", + /* 7*/ "Acceder al Interior Sacro\n", + /* 8*/ "Destruir ejército secreto Skedar\n", + /* 9*/ "Eliminar al líder Skedar\n", + /* 10*/ "Obtén la Visión Nocturna.\n", + /* 11*/ "\n", + /* 12*/ "V. Nocturna\n", + /* 13*/ "Visión Nocturna\n", + /* 14*/ "Visión Nocturna obtenida.\n", + /* 15*/ "Obtén el Escáner.\n", + /* 16*/ "\n", + /* 17*/ "Escáner\n", + /* 18*/ "Escáner\n", + /* 19*/ "Escáner obtenido.\n", + /* 20*/ "Obtén el Amplificador de Blancos.\n", + /* 21*/ "\n", + /* 22*/ "Amplificador\n", + /* 23*/ "Amplificador\n", + /* 24*/ "Amplificador de Blancos obtenido.\n", + /* 25*/ "Amplificador colocado correctamente.\n", + /* 26*/ "Amplificador colocado incorrectamente.\n", + /* 27*/ "El Generador ha sido reactivado.\n", + /* 28*/ "El Interior Sacro Skedar ha sido alcanzado.\n", + /* 29*/ "El ejército secreto Skedar ha sido derrotado.\n", + /* 30*/ "Éste parece ser uno de los pilares especiales.\n", + /* 31*/ "La energía es más constante en este área. \nEl Interior Sacro no puede estar muy lejos.\n", + /* 32*/ "¡¡¡OH, NO!!! ¡Un ejército Skedar en animación suspendida!\n", + /* 33*/ "Vale, entonces... Cortémosle la cabeza y el \ncuerpo perecerá.\n", + /* 34*/ "Éste es el lugar más sagrado de los fanáticos Skedar. Ellos creen que este planeta es tierra sagrada. El Templo de Batalla está situado en la parte más sagrada de este 'santo' planeta.\n", + /* 35*/ "A ver si me aclaro. Es sagrado, ¿no? Pero hay bastante más que eso, ¿no es así?\n", + /* 36*/ "Sí. En todo el tiempo que los Maian hemos luchado contra los Skedar, no encontramos este lugar. Sabíamos que hasta que no fuera destruido, la guerra no terminaría. Luchamos con los Skedar hasta llegar a un punto muerto donde obtuvimos un alto el fuego, pero hay que estar en guardia. La destrucción de este lugar puede significar una paz verdadera.\n", + /* 37*/ "Así que tenemos que asegurarnos de que ningún fanático sobreviva. Entraré a por el líder. Tu tienes que traer a la flota Maian para derribar el Templo.\n", + /* 38*/ "Si estás en tierra cuando la flota llegue aquí, no tendrás ninguna oportunidad.\n", + /* 39*/ "Ése es un error que no pienso cometer.\n", + /* 40*/ "Siiií...\n", + /* 41*/ "¡Joanna! ¡Joanna! \n", + /* 42*/ "¡Elvis! ¡Elvis! Aquí.\n", + /* 43*/ "Ningún problema. Agárrate a mis brazos. Te sacaré enseguida.\n", + /* 44*/ "¡No, rápido! ¡Dame tu arma!\n", + /* 45*/ "¡Quieres! ¡Soltarme! ¡De! ¡Una! ¡Vez!\n", + /* 46*/ "He podido detener el bombardeo de la flota mientras te buscaba. Empezarán de nuevo cuando estemos a salvo.\n", + /* 47*/ "Hubiera salido a tiempo si ese m... no me hubiera cogido del pie.\n", + /* 48*/ "Por supuesto, Joanna, por supuesto.\n", + /* 49*/ "No, de verdad.\n", + /* 50*/ "Te creo.\n", + /* 51*/ "Haz tu sacrificio al Dios de la Guerra.\n", + /* 52*/ "Granadas utilizadas. No puedes entrar al Templo.\n", + /* 53*/ "Creada entrada alternativa al Templo.\n", + /* 54*/ "¿Dónde estás? ¿Estás herida?\n", + /* 55*/ NULL, +}; diff --git a/src/files/lang/pal-final/siloE.c b/src/files/lang/pal-final/siloE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/siloJ.c b/src/files/lang/pal-final/siloJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/siloP.c b/src/files/lang/pal-final/siloP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/siloP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_f.c b/src/files/lang/pal-final/silo_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_g.c b/src/files/lang/pal-final/silo_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_i.c b/src/files/lang/pal-final/silo_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/silo_str_s.c b/src/files/lang/pal-final/silo_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/silo_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/statE.c b/src/files/lang/pal-final/statE.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-final/statE.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/statJ.c b/src/files/lang/pal-final/statJ.c new file mode 100644 index 000000000..6481e7dc9 --- /dev/null +++ b/src/files/lang/pal-final/statJ.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "Mopping Up The Skedar Homeworld\n", + /* 1*/ "Kill all the skedar .\n", + /* 2*/ "Kill all the skedar .\n", + /* 3*/ "Kill all the skedar .\n", + /* 4*/ "Kill Skedar Captain\n", + /* 5*/ "Kill Skedar Captain 2\n", + /* 6*/ "Kill Skedar Captain 3\n", + /* 7*/ "Elvii Leader Has Been Killed.\n", + /* 8*/ "Skedar Captain Has Been Killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/statP.c b/src/files/lang/pal-final/statP.c new file mode 100644 index 000000000..ef236a625 --- /dev/null +++ b/src/files/lang/pal-final/statP.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\n|Objective Three: - Regicide Part Three\n\nSorry, sorry, it seems that there is a third King. Our scanners had trouble detecting it due to the extreme amount of surface disturbance caused by the fleet bombardment. As a result, this King is more prepared than the other two; this makes it even more vital that the King be destroyed.\n\nEND\n", + /* 1*/ "BATTLE SHRINE\n", + /* 2*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide Part One\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\n|Objective Two: - Regicide Part Two\n\nThere is another clone! A fault in the Skedar clone tanks meant that two Kings were activated at once. This one has had more time to acclimatize itself, so it is therefore more dangerous. Once it has been destroyed, the threat is over.\n\nEND\n", + /* 3*/ "|Background - \n\nThe fleet bombardment has now ceased. Teams of Maian Protectors are being assembled for mopping up operations on the surface. Gene-spectrum scanning has brought another candidate for the Skedar King to our attention.\n\n|Objective One: - Regicide\n\nThis clone of the Skedar King was activated when Joanna Dark shot and killed the existing King. It should be confused, and not as much of a threat as the previous King - at the moment. Destroy it before it can take control of the remnants of the Skedar army.\n\nEND\n", + /* 4*/ "Kill Skedar King.\n", + /* 5*/ "Kill Skedar King 2.\n", + /* 6*/ "Kill Skedar King 3.\n", + /* 7*/ "Maian leader has been killed.\n", + /* 8*/ "Skedar King has been killed.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_f.c b/src/files/lang/pal-final/stat_str_f.c new file mode 100644 index 000000000..d29db6670 --- /dev/null +++ b/src/files/lang/pal-final/stat_str_f.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\n|Objectif 3: - Régicide Acte trois\n\nPardon, désolé, il y a un troisième Roi. Nos détecteurs n'ont pu le repérer auparavant en raison de fortes perturbations dues aux bombardements massifs de la flotte. Ce Roi est mieux préparé que les deux autres, il est impératif qu'il soit éliminé dans les plus brefs délais. Dépêchez-vous, il ne faut pas qu'il rassemble ses armées.\n\nFIN\n", + /* 1*/ "AUTEL DE COMBAT\n", + /* 2*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne rassemble les restes de l'armée skedar.\n\n|Objectif 2: - Régicide Acte deux\n\nIl y a un autre clone! Un défaut de fonctionnement des cuves génitrices a provoqué l'activation simultanée de deux Rois skedars. Celui-ci a eu plus de temps pour s'habituer au monde, il sera certainement plus dangereux que son frère. Une fois que vous l'aurez détruit, la menace sera écartée.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLe bombardement de la flotte est terminé. Des équipes de Protecteurs maians sont constituées pour mener des opérations à la surface de la planète. Un balayage au spectre génétique a révélé la présence d'un nouveau clone du Roi skedar.\n\n|Objectif 1: - Régicide Acte Un\n\nCe clone du Roi skedar a été activé quand Joanna Dark a éliminé le Roi existant. Il est encore au stade juvénile, il est certainement moins dangereux que l'ancien Roi pour le moment. Eliminez-le avant qu'il ne regroupe les restes de l'armée skedar.\n\nFIN\n", + /* 4*/ "Tuer Roi skedar\n", + /* 5*/ "Tuer Roi skedar 2\n", + /* 6*/ "Tuer Roi skedar 3\n", + /* 7*/ "Le Dirigeant maian a été tué.\n", + /* 8*/ "Le Roi skedar a été tué.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_g.c b/src/files/lang/pal-final/stat_str_g.c new file mode 100644 index 000000000..ca69f207e --- /dev/null +++ b/src/files/lang/pal-final/stat_str_g.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\n|3. Ziel: - Königsmord Teil Drei\n\nEs tut uns leid, aber es sieht so aus, als gäbe es noch einen dritten König. Aufgrund der starken Interferenzen nach dem Bombardement, konnten ihn unsere Scanner nicht erfassen. Dieser König konnte sich noch weiter entwickeln, als die beiden anderen. Das bedeutet, dass er noch gefährlicher ist. Die Notwendigkeit, ihn zu eliminieren, ist daher noch größer.\n\nENDE\n", + /* 1*/ "KRIEGSSCHREIN\n", + /* 2*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\n|2. Ziel: - Königsmord Teil Zwei\n\nEs gibt noch einen zweiten Klon! Ein Fehler im System der Klon-Behälter hat dazu geführt, dass zwei Könige gleichzeitig aktiviert worden sind. Dieser Klon hatte mehr Zeit, sich zu akklimatisieren. Das bedeutet, dass er um ein Vielfaches gefährlicher ist. Wird er eliminiert, ist die Bedrohung vorüber.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDas Bombardement wurde nunmehr eingestellt. Es werden nun Teams, bestehend aus Maianischen Protektoren, zusammengestellt, um die Oberfläche des Planeten zu durchkämmen. Ein spektrales Gen-Scanning hat ergeben, das ein neuer Anwärter auf den Thron der Skedar existiert.\n\n|1. Ziel: - Königsmord Teil Eins\n\nAls Joanna Dark den König der Skedar eliminierte, wurde sein Klon aktiviert. Der Klon müsste in seinem momentanen Stadium sehr desorientiert sein. Daher dürfte er nicht die gleiche Bedrohung darstellen, wie sein Vorgänger. Sie müssen ihn besiegen, bevor er die Kontrolle über die verbleibenden Soldaten der Skedar-Armee erlangt!\n\nENDE\n", + /* 4*/ "Vernichten Sie den Skedar-König!\n", + /* 5*/ "Vernichten Sie den Skedar-König 2!\n", + /* 6*/ "Vernichten Sie den Skedar-König 3!\n", + /* 7*/ "Der Maianische Anführer wurde eliminiert.\n", + /* 8*/ "Der Skedar-König wurde eliminiert.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_i.c b/src/files/lang/pal-final/stat_str_i.c new file mode 100644 index 000000000..4294e1bfc --- /dev/null +++ b/src/files/lang/pal-final/stat_str_i.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non sussisterà più.\n\n|Obiettivo 3: - Regicidio - Parte terza\n\nMi rincresce doverti comunicare che esiste un terzo clone del re. I nostri scanner hanno incontrato difficoltà nel riconoscerlo a causa delle forti interferenze della superficie dovute alla veemenza dei bombardamenti. Attenzione questo re è più pericoloso degli altri due! È pertanto di vitale importanza che venga soppresso al più presto.\n\nFINE\n", + /* 1*/ "TEMPIO DI GUERRA\n", + /* 2*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio - Parte prima\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra dell'esercito Skedar.\n\n|Obiettivo 2: - Regicidio - Parte seconda\n\nEsiste un altro clone! Un difetto della sala dei cloni ha provocato l'attivazione di due cloni contemporaneamente. Tuttavia questo ha avuto più tempo per ambientarsi e per questo motivo è anche più pericoloso. Una volta che lo avrai eliminato la minaccia non al più presto.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nDopo la fine dei bombardamenti sono state formate alcune squadre di difensori Maian per portare a termine le operazioni di devastazione sulla superficie del pianeta. Purtroppo l'esplorazione dello spettro genetico ha evidenziato un altro candidato destinato a diventare il re degli Skedar.\n\n|Obiettivo 1: - Regicidio\n\nQuesto clone del re degli Skedar è stato attivato al momento in cui Joanna Dark ha colpito e ucciso il re in carica. Tuttavia è probabile che sia confuso e che per adesso non presenti una vera e propria minaccia come il suo predecessore. Eliminalo prima che si chiarisca le idee e prenda il comando dei reduci di guerra al più presto.\n\nFINE\n", + /* 4*/ "Uccidi il re degli Skedar\n", + /* 5*/ "Uccidi il 2° re degli Skedar\n", + /* 6*/ "Uccidi il 3° re degli Skedar\n", + /* 7*/ "Il capo dei Maian è stato ucciso.\n", + /* 8*/ "Il re degli Skedar è stato ucciso.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/stat_str_s.c b/src/files/lang/pal-final/stat_str_s.c new file mode 100644 index 000000000..4aaf6f579 --- /dev/null +++ b/src/files/lang/pal-final/stat_str_s.c @@ -0,0 +1,16 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\n|Objetivo Tres: - Regicidio Parte Tres\n\nPerdón, perdón... Parece que existe un tercer Rey. Nuestros escáneres han tenido problemas de detección debido a la enorme cantidad de perturbaciones causadas por el bombardeo de la flota. A causa de ello, este Rey está más preparado que los otros dos; esto hace que sea vital que el Rey sea destruido.\n\nFIN\n", + /* 1*/ "TEMPLO DE BATALLA\n", + /* 2*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\n|Objetivo Dos: - Regicidio Parte Dos\n\n¡Hay otro clon! Un fallo en los tanques de clonación Skedar hizo que dos Reyes fueran activados al mismo tiempo. Éste ha tenido más tiempo para aclimatarse, por lo tanto es más peligroso. Una vez sea destruido, la amenaza habrá terminado.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nEl bombardeo de la flota ha cesado. Equipos de Protectores Maian están siendo creados para acabar con las operaciones en la superficie. El escaneo del espectro genético nos ha mostrado a un nuevo candidato para Rey Skedar.\n\n|Objetivo Uno: - Regicidio Parte Uno\n\nEste clon del Rey Skedar fue activado cuando Joanna Dark disparó y mató al Rey precedente. Estará confuso, y no será tan peligroso como el anterior Rey, por el momento. Destrúyelo antes de que pueda tomar el control de los remanentes del ejército Skedar.\n\nFIN\n", + /* 4*/ "Eliminar al Rey Skedar.\n", + /* 5*/ "Eliminar al Rey Skedar 2.\n", + /* 6*/ "Eliminar al Rey Skedar 3.\n", + /* 7*/ "El líder Maian ha muerto.\n", + /* 8*/ "El Rey Skedar ha muerto.\n", + /* 9*/ NULL, + /* 10*/ NULL, + /* 11*/ NULL, +}; diff --git a/src/files/lang/pal-final/titleE.c b/src/files/lang/pal-final/titleE.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/titleE.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/titleJ.c b/src/files/lang/pal-final/titleJ.c new file mode 100644 index 000000000..4dc299aa6 --- /dev/null +++ b/src/files/lang/pal-final/titleJ.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "animation\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "christ tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons animator\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "(is watching)\n", + /* 15*/ "b jones\n", + /* 16*/ "(unknown purpose)\n", + /* 17*/ "steve malpass\n", + /* 18*/ "edge wrangler\n", + /* 19*/ "brian marshall\n", + /* 20*/ "code janitor\n", + /* 21*/ "russell irwin\n", + /* 22*/ "pak man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "pad jockey\n", + /* 25*/ "ross bury\n", + /* 26*/ "pixel pusher\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonsz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "background artist\n", + /* 35*/ "additional\n", + /* 36*/ "dean smith\n", + /* 37*/ "kevin bayliss\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "lee musgrave\n", + /* 45*/ "mark betteridge\n", + /* 46*/ "chris marlow\n", + /* 47*/ "phillip dunne\n", + /* 48*/ "johnni christensen\n", + /* 49*/ "robin beanland\n", + /* 50*/ "steven hurst\n", + /* 51*/ "voice talent\n", + /* 52*/ "eveline fischer\n", + /* 53*/ "chris sutherland\n", + /* 54*/ "chris seavor\n", + /* 55*/ "john silke\n", + /* 56*/ "development tools\n", + /* 57*/ "richard gale\n", + /* 58*/ "mark green\n", + /* 59*/ "mark wilson\n", + /* 60*/ "hardware support\n", + /* 61*/ "pete cox\n", + /* 62*/ "paul mikell\n", + /* 63*/ "doug crouch\n", + /* 64*/ "thanks\n", + /* 65*/ "neil gallagher\n", + /* 66*/ "jonathon o'conner\n", + /* 67*/ "gareth glover\n", + /* 68*/ "motion capture\n", + /* 69*/ "alan tipper\n", + /* 70*/ "des easen\n", + /* 71*/ "jim ballard\n", + /* 72*/ "michelle tipper\n", + /* 73*/ "testing (rare)\n", + /* 74*/ "huw ward\n", + /* 75*/ "david wong\n", + /* 76*/ "adam munton\n", + /* 77*/ "luke munton\n", + /* 78*/ "garry phelps\n", + /* 79*/ "jon silke\n", + /* 80*/ "matthew carter\n", + /* 81*/ "gavin price\n", + /* 82*/ "gareth stevenson\n", + /* 83*/ "joe stamper\n", + /* 84*/ "stephen stamper\n", + /* 85*/ "testing (noa)\n", + /* 86*/ "nintendo guy\n", + /* 87*/ "nintendo gal\n", + /* 88*/ "rare miami\n", + /* 89*/ "eileen hochberg\n", + /* 90*/ "joel hochberg\n", + /* 91*/ "rare twycross\n", + /* 92*/ "chris stamper\n", + /* 93*/ "tim stamper\n", + /* 94*/ "nintendo\n", + /* 95*/ "ken lobb\n", + /* 96*/ "howard lincoln\n", + /* 97*/ "mr arrakawa\n", + /* 98*/ "mr yamauchi\n", + /* 99*/ "copyright rare 2000\n", + /*100*/ "perfect dark, the pd device and\n", + /*101*/ "perfecthead are trademarks\n", + /*102*/ "rare\n", + /*103*/ "designs on the future\n", + /*104*/ "t&a support\n", + /*105*/ "emma scully\n", + /*106*/ "claire phelan\n", + /*107*/ "joanna dark is forever\n", + /*108*/ "perfect dark 2 is finished and sitting on a shelf\n", + /*109*/ "testing (noe)\n", + /*110*/ "supervisor\n", + /*111*/ "kai 'jellybean' neumann\n", + /*112*/ "deputy supervisor\n", + /*113*/ "maurice 'pathfinder' tisdale\n", + /*114*/ "coordinators\n", + /*115*/ "patrick 'capricorn' thieret\n", + /*116*/ "andreas 'brennero' dietz\n", + /*117*/ "editor\n", + /*118*/ "assistant editor\n", + /*119*/ "assistant editors\n", + /*120*/ "localization (french)\n", + /*121*/ "julien 'sexy boy' bardakoff\n", + /*122*/ "jean-baptiste 'ours noir' fleury\n", + /*123*/ "nicolas 'darth lapinou' gourio\n", + /*124*/ "nicolas 'el betal' robert\n", + /*125*/ "localization (german)\n", + /*126*/ "micky 'scorpio's movement' auer\n", + /*127*/ "jan 'ian' peitzmeier\n", + /*128*/ "localization (italian)\n", + /*129*/ "elenor isbitish\n", + /*130*/ "calimero tiiiun\n", + /*131*/ "localization (spanish)\n", + /*132*/ "antonio 'toro' greppi\n", + /*133*/ "carlos 'yoshio' montilla\n", + /*134*/ "susa & natalia\n", + /*135*/ "localization\n", + /*136*/ "product coordinator\n", + /*137*/ "andy 'fiedl' fey\n", + /*138*/ "product supervisor\n", + /*139*/ "tanja 'personalized sarcasm' baar\n", + /*140*/ "product localization manager\n", + /*141*/ "kai '0 to 100' zeh\n", + /*142*/ NULL, + /*143*/ NULL, + /*144*/ NULL, + /*145*/ NULL, + /*146*/ NULL, + /*147*/ NULL, + /*148*/ NULL, + /*149*/ NULL, + /*150*/ NULL, + /*151*/ NULL, + /*152*/ NULL, + /*153*/ NULL, + /*154*/ NULL, + /*155*/ NULL, + /*156*/ NULL, + /*157*/ NULL, + /*158*/ NULL, + /*159*/ NULL, + /*160*/ NULL, + /*161*/ NULL, + /*162*/ NULL, + /*163*/ NULL, + /*164*/ NULL, + /*165*/ NULL, + /*166*/ NULL, + /*167*/ NULL, + /*168*/ NULL, + /*169*/ NULL, + /*170*/ NULL, + /*171*/ NULL, + /*172*/ NULL, + /*173*/ NULL, + /*174*/ NULL, + /*175*/ NULL, + /*176*/ NULL, + /*177*/ NULL, + /*178*/ NULL, + /*179*/ NULL, + /*180*/ NULL, + /*181*/ NULL, + /*182*/ NULL, + /*183*/ NULL, +}; diff --git a/src/files/lang/pal-final/titleP.c b/src/files/lang/pal-final/titleP.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/titleP.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_f.c b/src/files/lang/pal-final/title_str_f.c new file mode 100644 index 000000000..63feff0f6 --- /dev/null +++ b/src/files/lang/pal-final/title_str_f.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "guns and visual orgasms\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mover and shaker\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality engineer\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs on the future\n", + /* 11*/ "chris darling\n", + /* 12*/ "weapons specialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grey area\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "perfect locations and vox\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "well packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "manic welsh designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "bionic backgrounds\n", + /* 27*/ "martin penny\n", + /* 28*/ "sound geezer\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "play that music maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dinomic backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "fearsome foursome\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trent's henchmen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voices in the dark\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techs\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hard and wary support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminators\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dark commanders\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in the sun\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "the perfect core\n", + /*129*/ "-darker than you\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfect spelling\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark is forever\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_g.c b/src/files/lang/pal-final/title_str_g.c new file mode 100644 index 000000000..37e3b0196 --- /dev/null +++ b/src/files/lang/pal-final/title_str_g.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "waffen und visuelle höhepunkte\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "bewegung und erschütterung\n", + /* 7*/ "darkmark\n", + /* 8*/ "reality-techniker\n", + /* 9*/ "chris tilston\n", + /* 10*/ "designs der zukunft\n", + /* 11*/ "chris darling\n", + /* 12*/ "waffenspezialist\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "grauzonen\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "locations und stimmen\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie williams\n", + /* 24*/ "manisch-walisischer designer\n", + /* 25*/ "ross bury\n", + /* 26*/ "hintergründe\n", + /* 27*/ "martin penny\n", + /* 28*/ "maestro grande\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "der maestro\n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "dynamische backgrounds\n", + /* 35*/ "dd snipers\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "die schrecklichen vier\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "trents vasallen\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "stimmen in der dunkelheit\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "ci techniker\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "hardware-support\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "dk crew\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "motion capture\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "going through the motions\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'ich falleeeee' fell\n", + /* 91*/ "doug 'duck dich' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "rare exterminatoren\n", + /* 94*/ "huw ward\n", + /* 95*/ "david wong\n", + /* 96*/ "adam munton\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "dunkle kommandanten\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare in der sonne\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testing (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testing (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "der perfekte kern\n", + /*129*/ "- dunkler als du\n", + /*130*/ "treehouse\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "perfekte rechtschreibung\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark and the pd device\n", + /*147*/ "are trademarks\n", + /*148*/ "rare\n", + /*149*/ "designs on the future\n", + /*150*/ "perfect dark für immer\n", + /*151*/ "testing (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "deputy supervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinators\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "editor\n", + /*160*/ "assistant editor\n", + /*161*/ "assistant editors\n", + /*162*/ "localization (french)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localization (german)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localization (italian)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localization (spanish)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localization\n", + /*178*/ "product coordinator\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "product supervisor\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "product localization manager\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_i.c b/src/files/lang/pal-final/title_str_i.c new file mode 100644 index 000000000..32d6fc491 --- /dev/null +++ b/src/files/lang/pal-final/title_str_i.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armi e orgasmi visivi\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "muovi e sbatti\n", + /* 7*/ "darkmark\n", + /* 8*/ "tecnico effetti reali\n", + /* 9*/ "chris tilston\n", + /* 10*/ "design futuristico\n", + /* 11*/ "chris darling\n", + /* 12*/ "specialista armi\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "area grigia\n", + /* 15*/ "b jones\n", + /* 16*/ "bodybuilder\n", + /* 17*/ "steve malpass\n", + /* 18*/ "dio di voci e luoghi\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "packed man\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "designer galles-mania\n", + /* 25*/ "ross bury\n", + /* 26*/ "sfondi bionici\n", + /* 27*/ "martin penny\n", + /* 28*/ "guru suoni\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "musica, maestro! \n", + /* 31*/ "david clynick\n", + /* 32*/ "bangin hardkore choonz\n", + /* 33*/ "keith rabbette\n", + /* 34*/ "sfondi dinamici\n", + /* 35*/ "cecchini dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "i terribili quattro\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "gli scagnozzi di trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voci al buio\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "tecnici ci\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "supporto hardware\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "squadra dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "fermo immagine\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "tra le immagini\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "sterminatori rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandanti dark\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare alla luce del sole\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "verifica prodotto (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "verifica prodotto (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "il cuore perfect\n", + /*129*/ "-più buio di te!\n", + /*130*/ "la casa nell'albero\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "ortografia perfect\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark e pd device\n", + /*147*/ "sono trademark\n", + /*148*/ "rare\n", + /*149*/ "design del futuro\n", + /*150*/ "perfect dark è per sempre\n", + /*151*/ "verifica prodotto (noe)\n", + /*152*/ "supervisore\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "aiuto supervisore\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinatori\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "redattore\n", + /*160*/ "aiuto redattore\n", + /*161*/ "aiuto redattori\n", + /*162*/ "localizzazione (francese)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localizzazione (tedesco)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localizzazione (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localizzazione (spagnolo)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia\n", + /*177*/ "localizzazione\n", + /*178*/ "coordinatore prodotto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisore prodotto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "manager localizzazione prodotto\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/title_str_s.c b/src/files/lang/pal-final/title_str_s.c new file mode 100644 index 000000000..69567bb3c --- /dev/null +++ b/src/files/lang/pal-final/title_str_s.c @@ -0,0 +1,188 @@ +#include + +char *lang[] = { + /* 0*/ "", + /* 1*/ "\n", + /* 2*/ "perfect dark\n", + /* 3*/ "beau ner chesluk\n", + /* 4*/ "armas y orgasmos visuales\n", + /* 5*/ "jonathan nasty mummery\n", + /* 6*/ "mueve y menea\n", + /* 7*/ "darkmark\n", + /* 8*/ "ingeniero de animación\n", + /* 9*/ "chris tilston\n", + /* 10*/ "diseños futuristas\n", + /* 11*/ "chris darling\n", + /* 12*/ "especialista en armas\n", + /* 13*/ "duncan botwood\n", + /* 14*/ "zona gris\n", + /* 15*/ "b jones\n", + /* 16*/ "culto al cuerpo\n", + /* 17*/ "steve malpass\n", + /* 18*/ "lugares perfectos\n", + /* 19*/ "brian marshall\n", + /* 20*/ "-aqham-\n", + /* 21*/ "russell irwin\n", + /* 22*/ "hombre bien empaquetado\n", + /* 23*/ "jamie 'evo' williams\n", + /* 24*/ "maníaco diseñador galés\n", + /* 25*/ "ross bury\n", + /* 26*/ "escenarios biónicos\n", + /* 27*/ "martin penny\n", + /* 28*/ "tío del sonido\n", + /* 29*/ "grant kirkhope\n", + /* 30*/ "maestro musical\n", + /* 31*/ "david clynick\n", + /* 32*/ "incondicional del ruido\n", + /* 33*/ "keith 'bunny' rabbette\n", + /* 34*/ "artista de escenarios\n", + /* 35*/ "francotiradores dd\n", + /* 36*/ "kevin bayliss\n", + /* 37*/ "dean smith\n", + /* 38*/ "graham smith\n", + /* 39*/ "mike 'curry' currington\n", + /* 40*/ "tony wong\n", + /* 41*/ "simon farmer\n", + /* 42*/ "leigh loveday\n", + /* 43*/ "rob harrison\n", + /* 44*/ "steven hurst\n", + /* 45*/ "los cuatro terribles\n", + /* 46*/ "phil dunne\n", + /* 47*/ "ricky berwick\n", + /* 48*/ "gareth glover\n", + /* 49*/ "jonathon ambrose\n", + /* 50*/ "secuaces de trent\n", + /* 51*/ "lee musgrave\n", + /* 52*/ "johnni christensen\n", + /* 53*/ "mark betteridge\n", + /* 54*/ "chris marlow\n", + /* 55*/ "robin beanland\n", + /* 56*/ "neil gallagher\n", + /* 57*/ "feargal plant\n", + /* 58*/ "voces en la oscuridad\n", + /* 59*/ "eveline fischer\n", + /* 60*/ "chris sutherland\n", + /* 61*/ "chris seavor\n", + /* 62*/ "john silke\n", + /* 63*/ "ben cullum\n", + /* 64*/ "louise tilston\n", + /* 65*/ "alistair lindsay\n", + /* 66*/ "duncan botwood\n", + /* 67*/ "b jones\n", + /* 68*/ "beau chesluk\n", + /* 69*/ "steve malpass\n", + /* 70*/ "técnicos ic\n", + /* 71*/ "richard 'force 9' gale\n", + /* 72*/ "mark green\n", + /* 73*/ "alex zoro\n", + /* 74*/ "mark wilson\n", + /* 75*/ "soporte hard\n", + /* 76*/ "pete 'hardrom' cox\n", + /* 77*/ "paul 'max' mikell\n", + /* 78*/ "doug crouch\n", + /* 79*/ "equipo dk\n", + /* 80*/ "mark stevenson\n", + /* 81*/ "carl tilley\n", + /* 82*/ "chris woods\n", + /* 83*/ "captura de movimientos\n", + /* 84*/ "alan tippertronic\n", + /* 85*/ "des easen\n", + /* 86*/ "jim 'love' ballard\n", + /* 87*/ "en movimiento\n", + /* 88*/ "duncan 'bot' botwood\n", + /* 89*/ "michelle tipper\n", + /* 90*/ "sue 'falling' fell\n", + /* 91*/ "doug 'crouch' crouch\n", + /* 92*/ "ross bury\n", + /* 93*/ "exterminadores rare\n", + /* 94*/ "huw ward\n", + /* 95*/ "adam munton\n", + /* 96*/ "david wong\n", + /* 97*/ "luke munton\n", + /* 98*/ "gary phelps\n", + /* 99*/ "john silke\n", + /*100*/ "matthew carter\n", + /*101*/ "gavin price\n", + /*102*/ "gareth stevenson\n", + /*103*/ "bushbaby\n", + /*104*/ "stephen stamper\n", + /*105*/ "ross bullimore\n", + /*106*/ "justin cook\n", + /*107*/ "dale murchie\n", + /*108*/ "roger smith\n", + /*109*/ "andrew wilson\n", + /*110*/ "comandantes oscuros\n", + /*111*/ "bis\n", + /*112*/ "wombat\n", + /*113*/ "rare en el sol\n", + /*114*/ "joel hochberg\n", + /*115*/ "eileen hochberg\n", + /*116*/ "scott hochberg\n", + /*117*/ "jerry rogowski\n", + /*118*/ "testeo (rare miami)\n", + /*119*/ "keith coll\n", + /*120*/ "testeo (noa)\n", + /*121*/ "michael kelbaugh\n", + /*122*/ "tim bechtel\n", + /*123*/ "tom hertzog\n", + /*124*/ "melvin 'sherwood' forrest\n", + /*125*/ "dougall campbell\n", + /*126*/ "roger harrison\n", + /*127*/ "jeff kalles\n", + /*128*/ "el núcleo perfecto\n", + /*129*/ "- más oscuro que tú -\n", + /*130*/ "casa en el tronco\n", + /*131*/ "armond williams junior\n", + /*132*/ "henry sterchi\n", + /*133*/ "ed ridgeway\n", + /*134*/ "deletreo perfecto\n", + /*135*/ "teresa lillygren\n", + /*136*/ "nintendo\n", + /*137*/ "mr arakawa\n", + /*138*/ "mike fukuda\n", + /*139*/ "don james\n", + /*140*/ "michael kelbaugh\n", + /*141*/ "howard lincoln\n", + /*142*/ "ken lobb\n", + /*143*/ "jacqualee story\n", + /*144*/ "gail tilden\n", + /*145*/ "copyright rare 2000\n", + /*146*/ "perfect dark y el dispositivo pd\n", + /*147*/ "son marcas registradas\n", + /*148*/ "rare\n", + /*149*/ "diseñando el futuro\n", + /*150*/ "perfect dark es para siempre\n", + /*151*/ "testeo (noe)\n", + /*152*/ "supervisor\n", + /*153*/ "kai 'jellybean' neumann\n", + /*154*/ "vicesupervisor\n", + /*155*/ "maurice 'pathfinder' tisdale\n", + /*156*/ "coordinadores\n", + /*157*/ "patrick 'capricorn' thieret\n", + /*158*/ "andreas 'brennero' dietz\n", + /*159*/ "traductor principal\n", + /*160*/ "traductor asistente\n", + /*161*/ "traductores asistentes\n", + /*162*/ "localización (francés)\n", + /*163*/ "julien 'sexy boy' bardakoff\n", + /*164*/ "jean-baptiste 'ours noir' fleury\n", + /*165*/ "nicolas 'darth lapinou' gourio\n", + /*166*/ "nicolas 'el betal' robert\n", + /*167*/ "localización (alemán)\n", + /*168*/ "micky 'scorpio's movement' auer\n", + /*169*/ "jan 'ian' peitzmeier\n", + /*170*/ "localización (italiano)\n", + /*171*/ "elenor isbitish\n", + /*172*/ "calimero tiiiun\n", + /*173*/ "localización (español)\n", + /*174*/ "antonio 'toro' greppi\n", + /*175*/ "carlos 'yoshio' montilla\n", + /*176*/ "susa & natalia & ruth\n", + /*177*/ "localización\n", + /*178*/ "coordinador producto\n", + /*179*/ "andy 'fiedl' fey\n", + /*180*/ "supervisora producto\n", + /*181*/ "tanja 'personalized sarcasm' baar\n", + /*182*/ "director dpto. localización\n", + /*183*/ "kai '0 to 100' zeh\n", +}; diff --git a/src/files/lang/pal-final/traE.c b/src/files/lang/pal-final/traE.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-final/traE.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/traJ.c b/src/files/lang/pal-final/traJ.c new file mode 100644 index 000000000..645ad3f82 --- /dev/null +++ b/src/files/lang/pal-final/traJ.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian Physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJohnathan reports that he is now under suspicion, and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry To Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. keep the guards off Johnathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Johnathan get aboard the craft with him, and you should be able to fly out past the air defences you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate Alien Tech Medpack\n", + /* 10*/ "Rendezvous With CI Spy\n", + /* 11*/ "Revive Elvis Using Medpack\n", + /* 12*/ "Locate Secret Hangar\n", + /* 13*/ "Escape From Area 51\n", + /* 14*/ "Joanna - This is Jonathan. You're in grave danger.\n", + /* 15*/ "The've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab.\nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - Good Luck!\n", + /* 18*/ "Good work Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've openend \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain Alien Medpack\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien MedPack\n", + /* 23*/ "", + /* 24*/ "Picked up an Alien Medpack\n", + /* 25*/ "Joanna - over here\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right we're near. Cover me Jo...\n", + /* 28*/ "Okay - Stand Back\n", + /* 29*/ "Jonathan has been killed\n", + /* 30*/ "Elvis has been killed\n", + /* 31*/ "The Secret Hangar Has Been Located.\n", + /* 32*/ "Okay Jo - lets go.\n", + /* 33*/ "Alien Medpack Activated\n", + /* 34*/ "Alien Medpack Operation Aborted\n", + /* 35*/ "Alien Medpack Has Been Administered\n", + /* 36*/ "Mission Critical Object Destroyed\n", + /* 37*/ "Outer Hangar Door Is Opening\n", + /* 38*/ "Outer Hangar Door Is Closing\n", + /* 39*/ "Inner Hangar Door Is Opening\n", + /* 40*/ "Inner Hangar Door Is Closing\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar door.\n", + /* 46*/ "I'll get out on that jetbike. Cover me while i \nopen the doors.\n", + /* 47*/ "Jonathan go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous Jo..\n", + /* 49*/ "I can handle it..Trust me\n", + /* 50*/ "....okay\n", + /* 51*/ "Damn it Joanna... Cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical Containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets\ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock\nthe base down.\n", + /* 59*/ "Oh no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus it's got no style - know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.", + /* 63*/ "Let's see how that over-confident thief deals with our gas defense system. She'll think twice before messing with me again!", + /* 64*/ "What's that noise? Can't be... gas!", + /* 65*/ "Noooo, that wasn't meant to happen!", + /* 66*/ "Please stop! I'm not supposed to die, she... arggghhh!", + /* 67*/ "You idiot! We'd better get out of here.", + /* 68*/ "gasps, chokes and wheezes", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognise you from before. You helped me. Thank you.", + /* 71*/ "You... You speak our language?", + /* 72*/ "Watch her, she's sharp.", + /* 73*/ "Earrggghh... eerggh...", + /* 74*/ "What's wrong?", + /* 75*/ "I have a headache. And with a head this big, that's no joke.", + /* 76*/ "Can you walk? We must leave before they get organised and hunt us down.", + /* 77*/ "I think so. What's your name?", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!", + /* 80*/ NULL, + /* 81*/ NULL, + /* 82*/ NULL, + /* 83*/ NULL, + /* 84*/ NULL, + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/traP.c b/src/files/lang/pal-final/traP.c new file mode 100644 index 000000000..1ded5895c --- /dev/null +++ b/src/files/lang/pal-final/traP.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Locate Alien AutoSurgeon Device\n\nAll Maian craft carry a device called an AutoSurgeon. Using this is the fastest and safest way of waking him up since they are designed to work on Maian physiology. It should be amongst the wreckage of the ship, or if not, with the items taken to the labs for analysis.\n\n|Objective Two: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Three: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Four: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Five: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 1*/ "AREA 51 - ESCAPE\n", + /* 2*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Revive Maian Bodyguard\n\nWake the Maian up before trying to get out - a hoverbed is not the easiest thing to steer even in normal situations. Once he's up and about, he should be able to fly the Maian craft out of Area 51.\n\n|Objective Four: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 3*/ "|Background - \n\nA craft carrying Institute advisors has been shot down in Nevada. Debris from the crash and the bodies of the advisors have been taken to Area 51. A spy inside the base has managed to get footage to the Institute of a possible survivor. This mission is to rescue that survivor.\n\n|Carrington - \n\nI know you have questions, Jo, and I'm afraid that this isn't the time to answer them. I can tell you that the little fellow you just rescued is a Maian, and he is a bodyguard for the Ambassador whose ship was shot down. Other details and background can wait until later.\n\n|Objective One: - Rendezvous With Agent\n\nJonathan reports that he is now under suspicion and expects to be arrested in a matter of minutes. Find him before the patrols do.\n\n|Objective Two: - Gain Entry to Secret Hangar\n\nOur agent has been unable to get into the secret hangar before because that would have meant blowing his cover, but the time for such worries is past. Keep the guards off Jonathan as he hacks into the door to the hangar where we suspect an intact Maian ship is kept.\n\n|Objective Three: - Escape From Area 51\n\nThat is, get the Maian bodyguard to the ship first. Then you and Jonathan get aboard the craft with him, and you should be able to fly out past the air defenses you took care of earlier.\n\nEND\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Locate alien tech medpack\n", + /* 10*/ "Rendezvous with CI spy\n", + /* 11*/ "Revive Maian Bodyguard\n", + /* 12*/ "Locate secret hangar\n", + /* 13*/ "Escape from Area 51\n", + /* 14*/ "Joanna - this is Jonathan. You're in grave danger.\n", + /* 15*/ "They've flooded the area with nerve gas.\n", + /* 16*/ "Get our friend to the containment lab. \nThere's a hiding place there.\n", + /* 17*/ "I'll contact you when you get there - good luck!\n", + /* 18*/ "Good work, Jo. We need to meet up. They're \ngetting suspicious of me.\n", + /* 19*/ "Use the maintenance hatch I've opened \nin one of the containment labs. Hurry.\n", + /* 20*/ "Obtain alien medpack.\n", + /* 21*/ "Cassandra De Vries'\n", + /* 22*/ "Alien medpack\n", + /* 23*/ "", + /* 24*/ "Picked up an alien medpack.\n", + /* 25*/ "Joanna - over here.\n", + /* 26*/ "We need to get back to our friend.\n", + /* 27*/ "Right, we're near. Cover me, Jo...\n", + /* 28*/ "Okay - stand back.\n", + /* 29*/ "Jonathan has been killed.\n", + /* 30*/ "Elvis has been killed.\n", + /* 31*/ "The secret hangar has been located.\n", + /* 32*/ "Okay, Jo - let's go.\n", + /* 33*/ "Alien medpack activated.\n", + /* 34*/ "Alien medpack operation aborted.\n", + /* 35*/ "Alien medpack has been administered.\n", + /* 36*/ "Mission critical object destroyed.\n", + /* 37*/ "Outer hangar door is opening.\n", + /* 38*/ "Outer hangar door is closing.\n", + /* 39*/ "Inner hangar door is opening.\n", + /* 40*/ "Inner hangar door is closing.\n", + /* 41*/ "It's the only way out of here.\n", + /* 42*/ "You're the only one who can fly it, Elvis, so get in.\n", + /* 43*/ "But we can't leave you behind.\n", + /* 44*/ "There must be a way out of here.\n", + /* 45*/ "One of us will have to stay behind and open the \nhangar doors.\n", + /* 46*/ "I'll get out on that hoverbike. Cover me while I \nopen the doors.\n", + /* 47*/ "Jonathan, go with Elvis. I'll see to the consoles.\n", + /* 48*/ "It's dangerous, Jo...\n", + /* 49*/ "I can handle it... Trust me.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Damn it, Joanna... cover me!\n", + /* 52*/ "I'll cover the stairs - you take the ramp.\n", + /* 53*/ "The hangar doors are now open.\n", + /* 54*/ "Medical containment doors unlocked.\n", + /* 55*/ "The medpack's got to be somewhere around here.\n", + /* 56*/ "Time to hook up with Jonathan, before he gets \ninto any more trouble.\n", + /* 57*/ "That smell... oil... I smelt that in the other \nhangars.\n", + /* 58*/ "The jetbike should get me out before they lock \nthe base down.\n", + /* 59*/ "Oh, no! We have a problem. It's a single seater!\n", + /* 60*/ "Two can get in but no more.\n", + /* 61*/ "Plus, it's got no style, you know what I'm saying?\n", + /* 62*/ "I'm not having this. That specimen is government property and should not leave the base.\n", + /* 63*/ "Let's see how that overconfident thief deals with our gas defense system. She'll think twice before messing with me again!\n", + /* 64*/ "What's that noise? Can't be... Gas!\n", + /* 65*/ "Noooo, that wasn't meant to happen!\n", + /* 66*/ "Please stop! I'm not supposed to die. She... Arggghhh!\n", + /* 67*/ "You idiot! We'd better get out of here.\n", + /* 68*/ "Gasps, chokes, and wheezes.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "I'm alive. I thought I'd be chopped up like the others by now. You're from the Institute, aren't you? I recognize you from before. You helped me. Thank you.\n", + /* 71*/ "You... You speak our language?\n", + /* 72*/ "Watch her... she's sharp.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "What's wrong?\n", + /* 75*/ "I have a headache. And with a head this big, that's no joke.\n", + /* 76*/ "Can you walk? We must leave before they get organized and hunt us down.\n", + /* 77*/ "I think so. What's your name?\n", + /* 78*/ "I'm Agent Dark. Or Joanna, if you prefer.\n", + /* 79*/ "Well, Joanna, I'm Protector One. But you can call me... Elvis!\n", + /* 80*/ "Console is not active.\n", + /* 81*/ "What the hell do you think you're doing? \nThis is supposed to be a sealed room! \nDon't you know anything about autopsy \nprocedures?\n", + /* 82*/ "Director Easton will hear about this, \nyoung lady.\n", + /* 83*/ "You can't take that! It's government property! \nThis is intolerable! It's... it's... \nunprofessional!!\n", + /* 84*/ "I don't care much for procedures!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_f.c b/src/files/lang/pal-final/tra_str_f.c new file mode 100644 index 000000000..91bd5746d --- /dev/null +++ b/src/files/lang/pal-final/tra_str_f.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Localiser l'Auto-chirurgien\n\nTous les vaisseaux maians sont équipés d'une 'capsule auto-chirurgicale'. C'est le moyen le plus rapide de réanimer votre compagnon. Ces appareils sont réglés sur la physiologie maian. Vous trouverez ce dispositif dans l'épave ou dans les restes du vaisseau transférés aux labos.\n\n|Objectif 2: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 3: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 4: - Réanimer le garde du corps maian\n\nRéanimez le Maian avant de vous enfuir: une civière anti-grav pourrait se révéler assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 5: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 1*/ "SECTEUR 51 - FUITE\n", + /* 2*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Réanimer le garde du corps maian\n\nRéanimez le Maian avant de vous enfuir: une civière anti-grav pourrait se révéler assez encombrante en cas de crise. Une fois qu'il sera debout et opérationnel, il pourra piloter le vaisseau maian hors du Secteur 51.\n\n|Objectif 4: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nUn appareil convoyant les conseillers de l'institut a été abattu au-dessus du Nevada. Les débris et les corps trouvés sur le site du crash ont été transférés dans le Secteur 51. Un agent espion nous a informé de la présence possible d'un rescapé. Votre mission sera de sauver et de récupérer le survivant.\n\n|Carrington - \n\nJe sais que vous vous posez des questions, Joanna, mais l'heure n'est pas aux réponses. Je peux seulement vous dire que la créature que vous avez sauvé est un Maian, garde du corps de l'ambassadeur qui était dans le vaisseau abattu. Le reste des données vous sera transmis plus tard.\n\n|Objectif 1: - Contacter notre Agent\n\nJonathan nous a contacté. Il pense qu'il a été découvert. Sa neutralisation n'est qu'une affaire de minutes. Trouvez-le avant les patrouilles.\n\n|Objectif 2: - Entrer dans le hangar secret\n\nNotre agent n'a pas pu pénétrer dans le hangar auparavant, cela aurait grillé sa couverture, mais nous n'avons plus le temps pour ce genre de considération. Protégez Jonathan alors qu'il tentera d'ouvrir la porte du hangar derrière laquelle se trouverait un vaisseau maian.\n\n|Objectif 3: - Quitter le Secteur 51\n\nAmenez le garde du corps maian dans le vaisseau en premier. Ensuite, vous et Jonathan monterez à bord. Vous devriez pouvoir vous envoler et passer au travers des défenses que vous aurez désactivées auparavant.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localiser Medkit extraterrestre\n", + /* 10*/ "Rencontrer l'espion de l'IC\n", + /* 11*/ "Réanimer Elvis avec le Medkit\n", + /* 12*/ "Localiser le hangar secret\n", + /* 13*/ "Quitter le Secteur 51\n", + /* 14*/ "Joanna - Ici Jonathan. Vous êtes en grave danger.\n", + /* 15*/ "Ils ont inondé cette zone avec du gaz empoisonné.\n", + /* 16*/ "Allez dans le labo où se trouve notre ami. \nIl y a une cache.\n", + /* 17*/ "Je vous contacterai quand vous y serez! Bonne chance!\n", + /* 18*/ "Bon travail, Jo. Nous devons nous rejoindre. Ils \ndeviennent méfiants.\n", + /* 19*/ "Passez par le conduit ouvert \ndans un des labos. Dépêchez-vous.\n", + /* 20*/ "Obtenir Medkit extraterr.\n", + /* 21*/ "Cassandra De Vries: \n", + /* 22*/ "Medkit\n", + /* 23*/ "", + /* 24*/ "Medkit extraterr. obtenu.\n", + /* 25*/ "Joanna - par ici.\n", + /* 26*/ "Nous devons retrouver notre ami.\n", + /* 27*/ "Bien, nous y sommes presque. Couvrez-moi, Jo...\n", + /* 28*/ "Ok - Restez derrière.\n", + /* 29*/ "Jonathan a été tué.\n", + /* 30*/ "Elvis a été tué.\n", + /* 31*/ "Le hangar secret a été découvert.\n", + /* 32*/ "Ok, Jo - allons-y.\n", + /* 33*/ "Medkit extraterr. activé.\n", + /* 34*/ "Opération Medkit annulée.\n", + /* 35*/ "Medkit administré.\n", + /* 36*/ "Objet crucial détruit.\n", + /* 37*/ "Ouverture porte extérieure hangar.\n", + /* 38*/ "Fermeture porte extérieure hangar.\n", + /* 39*/ "Ouverture porte intérieure hangar.\n", + /* 40*/ "fermeture porte intérieure hangar.\n", + /* 41*/ "C'est la seule sortie possible.\n", + /* 42*/ "Tu es le seul à pouvoir piloter, Elvis. Alors au boulot.\n", + /* 43*/ "Mais nous ne pouvons pas te laisser derrière.\n", + /* 44*/ "Il doit y avoir une solution.\n", + /* 45*/ "L'un de nous devra rester en arrière pour \nouvrir le hangar.\n", + /* 46*/ "Je vais prendre cette hoverbike. Couvrez-moi \nj'ouvre les portes.\n", + /* 47*/ "Jonathan, allez avec Elvis. Je vais voir les consoles.\n", + /* 48*/ "C'est trop dangereux, Jo...\n", + /* 49*/ "Je devrais m'en sortir... Aie confiance.\n", + /* 50*/ "...Ok.\n", + /* 51*/ "Merde, Joanna... Couvrez-moi!\n", + /* 52*/ "Je vais bloquer les marches - Occupez-vous de la rampe.\n", + /* 53*/ "Les portes du hangar sont ouvertes.\n", + /* 54*/ "Les portes du bloc médical sont ouvertes.\n", + /* 55*/ "Le Medkit doit se trouver par-là.\n", + /* 56*/ "Il faut rejoindre Jonathan, avant qu'il ne \nsoit trop tard.\n", + /* 57*/ "Cette odeur... de l'huile... je l'ai sentie dans \nles autres hangars.\n", + /* 58*/ "Avec cette Jetbike je vais pouvoir m'enfuir \navant la fermeture des portes.\n", + /* 59*/ "Gros problème: c'est un monoplace!\n", + /* 60*/ "Deux peuvent y entrer, pas plus.\n", + /* 61*/ "Aucun style en plus, c'est déprimant.\n", + /* 62*/ "Ce spécimen est la propriété du gouvernement. Il ne doit pas quitter cette base.\n", + /* 63*/ "Voyons voir comment cette petite voleuse va s'en sortir avec les gaz. Elle y repensera à deux fois avant de venir semer le bordel ici!\n", + /* 64*/ "C'est quoi ce bruit? Mais, mais... du gaz!\n", + /* 65*/ "Ah non! C'est pas ça qui était prévu!\n", + /* 66*/ "Non, arrêter! Je veux pas mourir. Elle... Arggghhh!\n", + /* 67*/ "Pauvre idiot! Allons nous-en.\n", + /* 68*/ "Eternuements, toussotements, pleures.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Je suis vivant. Je pensais être mort comme les autres. Vous êtes de l'Institut? Je vous reconnais. Vous m'avez aidé. Merci beaucoup.\n", + /* 71*/ "Vous... Vous parlez notre langue?\n", + /* 72*/ "Impressionnante déduction.\n", + /* 73*/ "Nnnghhh... \n", + /* 74*/ "Qu'avez-vous?\n", + /* 75*/ "J'ai mal au crâne. Chez nous c'est assez douloureux, nous avons une grosse tête.\n", + /* 76*/ "Pouvez-vous marcher? Nous devons partir au plus vite.\n", + /* 77*/ "Je suis d'accord. Quel est votre nom?\n", + /* 78*/ "Agent Dark, Joanna pour les intimes.\n", + /* 79*/ "Très bien, Joanna, je suis Gardien Prime. Mais vous pouvez m'appeler... Elvis!\n", + /* 80*/ "La console est débranchée.\n", + /* 81*/ "Mais, qu'est-ce que vous faites? \nCette pièce est censée être scellée! \nVous ne connaissez pas les procédures \nd'autopsie?\n", + /* 82*/ "Le Directeur Easton sera mis au courant, \njeune fille.\n", + /* 83*/ "Vous ne pouvez pas prendre ça! Ca appartient au \nGouvernement! C'est intolérable! C'est... c'est... \ntotalement anti-professionnel !!\n", + /* 84*/ "Les procédures, c'est trop barbant pour moi!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_g.c b/src/files/lang/pal-final/tra_str_g.c new file mode 100644 index 000000000..bc24e0e0f --- /dev/null +++ b/src/files/lang/pal-final/tra_str_g.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Finden Sie die den Auto-Chirugen der Aliens!\n\nAlle Maianischen Schiffe sind mit einem Gerät ausgestattet, das man als automatischen Chirurgen bezeichnen könnte. Da dieses Gerät auf Maianische Physiologie ausgerichtet ist, stellt es den einfachsten und sichersten Weg dar, den Bodyguard wieder zu Bewusstsein zu bringen. Das Gerät befindet sich entweder unter den Trümmern des Schiffs, oder es wurde bereits ins Labor zur Analyse gebracht.\n\n|2. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|3. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|4. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|5. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 1*/ "AREA 51 - FLUCHT\n", + /* 2*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Wiederbeleben Sie den Maianischen Bodyguard!\n\nBevor Sie diese Zone verlassen, müssen Sie den Maianer erwecken. Bedenken Sie, dass ein Schwebebett schon unter normalen Umständen nicht einfach zu steuern ist. Sobald der Maianer wieder bei Bewusstsein ist, sollte er in der Lage sein, das Schiff zu steuern.\n\n|4. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nEin Flugzeug mit Beratern des Instituts an Bord wurde in Nevada abgeschossen. Die Flugzeugtrümmer und die Überreste der Besatzung wurden in die Area 51 gebracht. Einer unserer Spione hat uns übermittelt, dass es möglicherweise einen Überlebenden gibt. Die Mission lautet: Retten Sie den Überlebenden!\n\n|Carrington - \n\nIch weiß, Sie haben Fragen, Jo. Aber ich befürchte, dies ist nicht der Zeitpunkt, um sie zu beantworten. Soviel sei gesagt: Der kleine Kerl, den Sie gerade gerettet haben, ist ein Maianer. Er ist der Bodyguard des Botschafters, dessen Schiff abgeschossen wurde. Weitere Details und Informationen dulden noch einigen Aufschub.\n\n|1. Ziel: - Treffen Sie sich mit unserem Agenten!\n\nJonathan berichtet, dass seine Deckung durchschaut worden ist, und er jeden Moment verhaftet werden könnte. Finden Sie ihn, bevor es die Anderen tun!\n\n|2. Ziel: - Betreten Sie den geheimen Hangar!\n\nUnser Agent konnte bis jetzt den geheimen Hangar nicht betreten, weil sonst seine Deckung noch viel früher aufgeflogen wäre. Über diesen Umstand müssen wir uns jetzt keine Sorgen mehr machen. Halten Sie Jonathan den Rücken frei, während er versucht, den Türcode zu knacken. Wir vermuten, dass sich in diesem Hangar ein intaktes Maianisches Schiff befindet.\n\n|3. Ziel: - Flüchten Sie aus der Area 51!\n\nZuerst müssen Sie den Maianischen Bodyguard zum Schiff bringen. Anschließend gilt es, an Bord zu gelangen und die Basis zu verlassen. Die Luftabwehr sollte kein Problem mehr darstellen, da Sie ja schon von Ihnen außer Kraft gesetzt worden ist.\n\nENDE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Finden Sie das Medipack!\n", + /* 10*/ "Treffen Sie sich mit Jonathan!\n", + /* 11*/ "Wiederbeleben Sie den Maianer!\n", + /* 12*/ "Finden Sie den geheimen Hangar!\n", + /* 13*/ "Flüchten Sie aus der Area 51!\n", + /* 14*/ "Joanna - Hier spricht Jonathan. Du befindest dich in Gefahr.\n", + /* 15*/ "Die gesamte Zone wurde mit Nervengas kontaminiert.\n", + /* 16*/ "Bring unseren Freund ins Sicherheitslabor. \nDort kannst du ihn verstecken.\n", + /* 17*/ "Ich kontaktiere dich, wenn du dort bist. Viel Glück!\n", + /* 18*/ "Gute Arbeit, Jo. Wir müssen uns treffen. Ich \nglaube, sie haben mich erkannt.\n", + /* 19*/ "Geh durch den Wartungsschacht, den ich in einem \nder Sicherheitslabors geföffnet habe. Beeil dich!\n", + /* 20*/ "Erlangen Sie das extraterrestrische Medipack!\n", + /* 21*/ "Cassandra De Vries\n", + /* 22*/ "Medipack\n", + /* 23*/ "", + /* 24*/ "Medipack aufgenommen\n", + /* 25*/ "Joanna! Hier drüben.\n", + /* 26*/ "Wir müssen zu unserem Freund zurück.\n", + /* 27*/ "Wir sind schon ganz nahe. Gib mir Deckung, Jo...\n", + /* 28*/ "Okay - Bleib zurück!\n", + /* 29*/ "Jonathan wurde eliminiert.\n", + /* 30*/ "Elvis wurde eliminiert.\n", + /* 31*/ "Der geheime Hangar wurde gefunden.\n", + /* 32*/ "Okay, Jo - gehen wir.\n", + /* 33*/ "Medipack aktiviert\n", + /* 34*/ "Medipack-Atkivität unterbrochen\n", + /* 35*/ "Medipack wurde verabreicht.\n", + /* 36*/ "Wichtiges Objekt wurde zerstört.\n", + /* 37*/ "Äußeres Hangartor wird geöffnet.\n", + /* 38*/ "Äußeres Hangartor wird geschlossen.\n", + /* 39*/ "Inneres Hangartor wird geöffnet.\n", + /* 40*/ "Inneres Hangartor wird geschlossen.\n", + /* 41*/ "Das ist der einzige Weg hier raus.\n", + /* 42*/ "Du bist der einzige, der das Ding fliegen kann, Elvis, also los!\n", + /* 43*/ "Aber wir können dich nicht zurücklassen.\n", + /* 44*/ "Es muss doch einen Weg hier raus geben.\n", + /* 45*/ "Einer von uns muss hier bleiben, um die \nHangartore zu öffnen.\n", + /* 46*/ "Ich flüchte mit dem Hoverbike. Gebt mir Deckung, \nwährend ich die Tore öffne!\n", + /* 47*/ "Jonathan, geh mit Elvis. Ich kümmere mich um die Konsolen.\n", + /* 48*/ "Es ist gefährlich, Jo...\n", + /* 49*/ "Ich komme schon klar... Vertrau mir.\n", + /* 50*/ "...Okay.\n", + /* 51*/ "Verdammt, Joanna... Gib mir Deckung!\n", + /* 52*/ "Ich sichere die Treppe - kümmere du dich um die Rampe.\n", + /* 53*/ "Die Hangartore sind jetzt offen.\n", + /* 54*/ "Die Türen zum Sicherheitslabor wurden entriegelt.\n", + /* 55*/ "Das Medipack muss hier irgendwo sein.\n", + /* 56*/ "Ich muss mich mit Jonathan treffen, bevor\ner noch tiefer in Schwierigkeiten gerät.\n", + /* 57*/ "Dieser Geruch... Öl... Ich habe es schon in den \nanderen Hangars gerochen.\n", + /* 58*/ "Ich sollte auf dem Hoverbike entkommen, bevor\nalle Ausgänge geschlossen werden.\n", + /* 59*/ "Oh nein! Wir haben ein Problem. Hier ist nur für EINEN Platz!\n", + /* 60*/ "Zwei passen rein, aber das war´s dann schon.\n", + /* 61*/ "Und es ist nicht sehr stilvoll - wenn du weißt, wovon ich spreche.\n", + /* 62*/ "Ich lasse das nicht zu. Dieses Exemplar ist Regierungseigentum und darf die Basis nicht verlassen.\n", + /* 63*/ "Mal sehen, wie diese selbstgefällige Diebin mit Nervengas klarkommt. Sie wird es sich in Zukunft überlegen, sich mit mir anzulegen!\n", + /* 64*/ "Was ist das für ein Geräusch! Es ist... GAS!\n", + /* 65*/ "Neeiiin! Das war anders geplant!\n", + /* 66*/ "Aufhören! Ich will noch nicht... Sie... Arggghhh!\n", + /* 67*/ "Du Idiot! Wir müssen raus hier.\n", + /* 68*/ "Keuchen, röcheln und husten.\n", + /* 69*/ "***aahh...! aahaa...! aaaaahhh! aha. ahh.***\n", + /* 70*/ "Ich bin am Leben. Ich dachte, ich würde so wie die anderen auseinander genommen. Sie müssen vom Institut sein. Ich habe Sie schon mal gesehen. Danke, dass Sie mir geholfen haben.\n", + /* 71*/ "Sie... sie sprechen unsere Sprache?\n", + /* 72*/ "Vorsicht, mit ihr ist nicht zu scherzen.\n", + /* 73*/ "Earrggghh...eerggh...\n", + /* 74*/ "Was ist los?\n", + /* 75*/ "Ich habe Kopfschmerzen. Und mit einem Kopf von dieser Größe will das was heißen.\n", + /* 76*/ "Können Sie gehen? Wir müssen hier weg, bevor sie uns noch dichter auf den Fersen sind.\n", + /* 77*/ "Ich denke schon. Wie heißen Sie?\n", + /* 78*/ "Ich bin Agent Dark. Oder Joanna, falls Sie das bevorzugen.\n", + /* 79*/ "Gut, Joanna, ich bin der Protektor Eins. Aber nennen Sie... nenn mich einfach Elvis!\n", + /* 80*/ "Konsole ist nicht aktiv.\n", + /* 81*/ "Was zur Hölle machen Sie hier? \nDieser Raum ist nur für autorisiertes Personal! \nWissen Sie den gar nichts über die Vorschriften \nbei Autopsien?\n", + /* 82*/ "Direktor Easton wird darüber informiert werden, \njunge Dame.\n", + /* 83*/ "Sie dürfen das nicht! Das ist Regierungseigentum! \nDas ist nicht tolerabel! Das ist... das ist... \nunprofessionell!!!\n", + /* 84*/ "Ich habe für Vorschriften nicht viel übrig!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_i.c b/src/files/lang/pal-final/tra_str_i.c new file mode 100644 index 000000000..3c30a308a --- /dev/null +++ b/src/files/lang/pal-final/tra_str_i.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Trova dispositivo AutoChirurgo alieno\n\nTutti i mezzi Maian portano un dispositivo chiamato AutoChirurgo. Il suo uso è il modo più veloce e sicuro per svegliare un Maian, dal momento che è progettato per agire sulla fisiologia Maian. Dovrebbe trovarsi tra i resti del velivolo o altrimenti tra gli oggetti portati al laboratorio per l'analisi.\n\n|Obiettivo 2: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 3: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 4: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 5: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 1*/ "AREA 51 - FUGA\n", + /* 2*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Rivitalizza guardia del corpo Maian\n\nSveglia il Maian prima di cercare di uscire, poiché un idrovolante non è la cosa più semplice da manovrare, neanche in situazioni normali! Dopo essersi ripreso dovrebbe essere in grado di pilotare il velivolo Maian e portarvi fuori dall'Area 51.\n\n|Obiettivo 4: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 3*/ "|Situazione:\n\nIl velivolo con a bordo i membri dell'istituto è stato abbattuto in Nevada. I resti del mezzo e i corpi delle vittime sono stati portati nell'Area 51. Una spia presente alla base è riuscita a comunicare all'istituto la notizia di un possibile sopravvissuto. L'obiettivo di questa missione è salvare quel sopravvissuto.\n\n|Carrington:\n\nSo che hai delle domande, Jo, ma temo non sia ora il momento di perdersi in spiegazioni. Posso solo dirti che il piccoletto che hai appena salvato è un Maian ed è una delle guardie del corpo dell'ambasciatore che si trovava sul mezzo abbattuto. Gli altri dettagli possono aspettare!\n\n|Obiettivo 1: - Appuntamento con l'agente segreto\n\nJonathan ci ha comunicato che è nella lista nera e che il suo arresto è ormai questione di minuti. Trovalo prima delle guardie!\n\n|Obiettivo 2: - Raggiungi l'hangar segreto\n\nIl nostro agente non è riuscito ad infiltrarsi nell'hangar segreto prima, poiché questo avrebbe significato mandare a monte la sua copertura, ma ora non è più il caso di porsi questi problemi. Tieni le guardie lontano da Jonathan mentre si apre un varco per entrare nell'hangar, in cui sospettiamo sia nascosto un idrovolante Maian ancora intatto.\n\n|Obiettivo 3: - Fuga dall'Area 51\n\nCiò significa per prima cosa portare il Maian al velivolo; poi salire a bordo insieme a lui e a Jonathan; alzarsi in volo e superare le barriere di difesa aerea di cui ti sei occupata prima.\n\nFINE\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Trova l'AutoChirurgo alieno\n", + /* 10*/ "Appuntamento con l'agente segreto\n", + /* 11*/ "Rivitalizza guardia del corpo Maian\n", + /* 12*/ "Raggiungi l'hangar segreto\n", + /* 13*/ "Fuga dall'Area 51\n", + /* 14*/ "Joanna, qui è Jonathan. Sei in grave pericolo!\n", + /* 15*/ "Hanno inondato l'area di gas nervino.\n", + /* 16*/ "Porta il nostro amico al laboratorio \ndi contenimento. Lì c'è un nascondiglio.\n", + /* 17*/ "Mi metterò di nuovo in contatto con te \nquando sei sul posto. In bocca al lupo!\n", + /* 18*/ "Bel lavoro, Jo! Dobbiamo incontrarci. Stanno \niniziando a sospettare di me.\n", + /* 19*/ "Usa lo sportello di manutenzione che \nho aperto in uno dei laboratori. Veloce!\n", + /* 20*/ "Procurati AutoChirurgo\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "AutoChirurgo\n", + /* 23*/ "", + /* 24*/ "Preso AutoChirurgo\n", + /* 25*/ "Joanna! Da questa parte!\n", + /* 26*/ "Dobbiamo trovare il nostro amico!\n", + /* 27*/ "Bene, siamo in zona! Coprimi, Jo...\n", + /* 28*/ "Bene, ora sta indietro!\n", + /* 29*/ "Jonathan è stato ucciso!\n", + /* 30*/ "Elvis è stato ucciso!\n", + /* 31*/ "Localizzato hangar segreto.\n", + /* 32*/ "Perfetto, Jo! Andiamo!\n", + /* 33*/ "Attivato AutoChirurgo alieno.\n", + /* 34*/ "Interrotta operazione AutoChirurgo.\n", + /* 35*/ "Somministrato AutoChirurgo alieno.\n", + /* 36*/ "Distrutto strumento essenziale alla missione.\n", + /* 37*/ "Porta esterna hangar in apertura.\n", + /* 38*/ "Porta esterna hangar in chiusura.\n", + /* 39*/ "Porta interna hangar in apertura.\n", + /* 40*/ "Porta interna hangar in chiusura.\n", + /* 41*/ "È l'unico modo per uscire di qui!\n", + /* 42*/ "Sei l'unico in grado di pilotarlo, Elvis, e allora fallo!\n", + /* 43*/ "Non possiamo mica lasciarti qui!\n", + /* 44*/ "Ci dev'essere un altro modo per uscire di qui!\n", + /* 45*/ "Uno di noi deve rimanere indietro \nper aprire le porte dell'hangar.\n", + /* 46*/ "Ci andrò io con l'aeromoto! Coprimi \nmentre apro le porte!\n", + /* 47*/ "Jonathan, va con Elvis. Io mi occupo dei quadri comando.\n", + /* 48*/ "È pericoloso, Jo...\n", + /* 49*/ "Tutto sotto controllo! Fidati!\n", + /* 50*/ "Va bene!\n", + /* 51*/ "Dannazione, Joanna... coprimi!\n", + /* 52*/ "Io copro le scale, tu prendi la rampa!\n", + /* 53*/ "Le porte dell'hangar sono aperte.\n", + /* 54*/ "Aperte porte sala di contenimento.\n", + /* 55*/ "L'AutoChirurgo deve essere qui da qualche parte.\n", + /* 56*/ "Meglio che mi metta in contatto con Jonathan, prima che \nsi cacci in qualche altro guaio!\n", + /* 57*/ "Questo odore... petrolio... l'ho già sentito \nnegli altri hangar.\n", + /* 58*/ "L'aeromoto dovrebbe farcela a portarmi fuori \nprima che chiudano la base.\n", + /* 59*/ "Oh, no! Abbiamo un problema. È una monoposto!\n", + /* 60*/ "Ce ne stanno al massimo due e non di più!\n", + /* 61*/ "E poi... non ha stile! Non so se rendo...\n", + /* 62*/ "Non lo ammetto! Quell'esemplare è proprietà governativa e non può assolutamente uscire dalla base.\n", + /* 63*/ "Vediamo come se la cava questa sfacciata criminale con l'impianto di difesa a gas. Ci penserà due volte la prossima volta prima di fare la furba con me!\n", + /* 64*/ "Cos'è quel rumore? Non può... È gas!\n", + /* 65*/ "Accidenti! Questo non era previsto!\n", + /* 66*/ "Fermati, per favore! Non posso morire adesso! Lei... Noooo!\n", + /* 67*/ "Idiota... Dobbiamo uscire di qua! Subito!!!\n", + /* 68*/ "Gasp, soffoco! Soffoco!\n", + /* 69*/ "***aaah...! aaah! aha! aha!***\n", + /* 70*/ "Sono vivo! Credevo che mi avrebbero fatto a fettine come gli altri... Sei dell'istituto, vero? Ti riconosco, mi ricordo di te. Mi hai aiutato, sono in debito con te!\n", + /* 71*/ "Parli... Parli la nostra lingua?\n", + /* 72*/ "Però... è sveglia!!!", + /* 73*/ "Aaahhh... che male!\n", + /* 74*/ "Che succede?\n", + /* 75*/ "Ho mal di testa! E con un testone come il mio, non c'è niente da ridere!\n", + /* 76*/ "Riesci a camminare? Dobbiamo uscire di qui prima che riescano a farci fuori!\n", + /* 77*/ "Sì, penso di farcela. Come ti chiami?\n", + /* 78*/ "Sono l'Agente Dark... o Joanna, se preferisci!\n", + /* 79*/ "Bene, Joanna! Io sono il Difensore 1, ma puoi chiamarmi... Elvis!\n", + /* 80*/ "Quadro comandi inattivo\n", + /* 81*/ "Cosa diavolo pensi di fare? \nL'accesso a questa sala è vietato! \nNon sei a conoscenza della procedura \ndell'autopsia?\n", + /* 82*/ "Il direttor Easton lo verrà \na sapere, signorina!\n", + /* 83*/ "Non può prendere quello! È proprietà governativa! \nÈ intollerabile! È... è... \nè inammissibile!!!\n", + /* 84*/ "Non mi interessa un fico secco della procedura!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/tra_str_s.c b/src/files/lang/pal-final/tra_str_s.c new file mode 100644 index 000000000..9d77f5302 --- /dev/null +++ b/src/files/lang/pal-final/tra_str_s.c @@ -0,0 +1,92 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Localizar el Dispositivo Alienígena de AutoCirugía\n\nTodas las naves Maian llevan un dispositivo de AutoCirugía. Utilizarlo es el método más rápido y seguro de despertarle, ya que ha sido diseñado para la fisiología Maian. Debe encontrarse entre los restos de la nave, o si no, con los objetos que han sido llevados a analizar al laboratorio.\n\n|Objetivo Dos: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Tres: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos guardan una nave Maian intacta.\n\n|Objetivo Cuatro: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cinco: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 1*/ "ÁREA 51 - ESCAPE\n", + /* 2*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Revivir al Guardaespaldas Maian\n\nDespierta al Maian antes de intentar salir: normalmente, una camilla flotante no es la cosa más fácil de manejar. Cuando esté despejado y en pie, deberá ser capaz de hacer volar la nave Maian fuera del Área 51.\n\n|Objetivo Cuatro: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nUna nave que transportaba asesores del Instituto ha sido derribada en Nevada. Los restos del impacto y los cuerpos de los asesores han sido trasladados al Área 51. Un espía infiltrado en la base ha informado al Instituto acerca de un posible superviviente. La misión consiste en rescatar a este superviviente.\n\n|Carrington - \n\nYa sé que tienes preguntas, Joanna, y temo que éste no es el momento de contestarlas. Puedo decirte que el pequeño tipo que rescataste es un Maian, y que era el guardaespaldas del Embajador cuya nave fue derribada. El resto de detalles y antecedentes puede esperar.\n\n|Objetivo Uno: - Encontrar al Agente\n\nJonathan ha informado de que ahora está bajo sospecha y espera ser arrestado en cuestión de minutos. Encuéntrale antes que las patrullas.\n\n|Objetivo Dos: - Entrar en el Hangar Secreto\n\nNuestro agente ha sido incapaz de entrar en el hangar secreto antes, ya que podría haber sido descubierto, aunque ya da igual preocuparse por ello. Mantén alejados a los guardas de Jonathan mientras él abre la puerta del hangar donde sospechamos que guardan una nave Maian intacta.\n\n|Objetivo Tres: - Escapar del Área 51\n\nPrimero, conduce al guardaespaldas Maian hasta la nave. Entonces Jonathan y tú deberéis subir a la misma con él, y os llevará volando a través de las defensas aéreas de las que te encargaste antes.\n\nFIN\n", + /* 4*/ "\n", + /* 5*/ "\n", + /* 6*/ "\n", + /* 7*/ "\n", + /* 8*/ "\n", + /* 9*/ "Localizar paquete médico alienígena\n", + /* 10*/ "Encontrar al espía del IC\n", + /* 11*/ "Revive al Guardaespaldas Maian\n", + /* 12*/ "Localizar el hangar secreto\n", + /* 13*/ "Escapar del Área 51\n", + /* 14*/ "¿Joanna? Jonathan al habla. Estás en peligro de muerte.\n", + /* 15*/ "Han inundado el área con gas nervioso.\n", + /* 16*/ "Lleva a nuestro amigo al laboratorio de contención. \nAllí hay un lugar secreto.\n", + /* 17*/ "Contactaré contigo cuando estés allí. ¡Buena suerte!\n", + /* 18*/ "Buen trabajo, Joanna. Necesitamos vernos. Están \nsospechando de mí.\n", + /* 19*/ "Usa la escotilla de mantenimiento que he abierto \nen uno de los laboratorios de contención. Deprisa.\n", + /* 20*/ "Obtén el paquete médico alienígena.\n", + /* 21*/ "Cassandra De Vries:\n", + /* 22*/ "Paq. médico\n", + /* 23*/ "", + /* 24*/ "Paquete médico alienígena obtenido.\n", + /* 25*/ "Joanna. Aquí.\n", + /* 26*/ "Necesitamos volver con nuestro amigo.\n", + /* 27*/ "Bien, estamos cerca. Cúbreme, Joanna...\n", + /* 28*/ "Vale. Apártate.\n", + /* 29*/ "Jonathan ha muerto.\n", + /* 30*/ "Elvis ha muerto.\n", + /* 31*/ "El hangar secreto ha sido localizado.\n", + /* 32*/ "Bien, Joanna. Vamos.\n", + /* 33*/ "Paquete médico alienígena activado.\n", + /* 34*/ "Operación del paquete médico abortada.\n", + /* 35*/ "El paquete médico alienígena ha sido administrado.\n", + /* 36*/ "Objeto crítico de la misión destruido.\n", + /* 37*/ "Puerta exterior del hangar abierta.\n", + /* 38*/ "Puerta exterior del hangar cerrada.\n", + /* 39*/ "Puerta interior del hangar abierta.\n", + /* 40*/ "Puerta interior del hangar cerrada.\n", + /* 41*/ "Es el único camino para salir de aquí.\n", + /* 42*/ "Eres el único que puede pilotarlo, Elvis, así que entra.\n", + /* 43*/ "Pero no podemos dejarte atrás.\n", + /* 44*/ "Tiene que haber un camino para salir de aquí.\n", + /* 45*/ "Uno de nosotros debe quedarse atrás para abrir \nlas puertas del hangar.\n", + /* 46*/ "Saldré en esa aeromoto. Cubridme mientras \nabro las puertas.\n", + /* 47*/ "Jonathan, ve con Elvis. Yo me ocuparé de las consolas.\n", + /* 48*/ "Es peligroso, Joanna...\n", + /* 49*/ "Puedo encargarme... Créeme.\n", + /* 50*/ "...De acuerdo.\n", + /* 51*/ "Maldición, Joanna... ¡cúbreme!\n", + /* 52*/ "Cubriré las escaleras. Tú toma la rampa.\n", + /* 53*/ "Las puertas del hangar están abiertas.\n", + /* 54*/ "Puertas de contención médica abiertas.\n", + /* 55*/ "El paquete médico debería estar por aquí.\n", + /* 56*/ "Es hora de contactar con Jonathan, antes de que \nse meta en más problemas.\n", + /* 57*/ "Ese olor... aceite... He olido eso en los \notros hangares.\n", + /* 58*/ "La aeromoto me sacará de aquí antes de que \ncierren la base.\n", + /* 59*/ "¡Oh, no! Tenemos un problema. ¡Es monoplaza!\n", + /* 60*/ "Cabrían dos, pero ninguno más.\n", + /* 61*/ "Además, no tiene estilo. ¿Sabes lo que quiero decir?\n", + /* 62*/ "No os voy a dejar. Ese espécimen es propiedad del gobierno y no debe abandonar la base.\n", + /* 63*/ "Veamos qué tal se porta esa confiada ladrona con nuestro gas del sistema de defensa. ¡Se lo pensará dos veces antes de jorobarme otra vez!\n", + /* 64*/ "¿Qué es ese ruido? No puede ser... ¡Gas!\n", + /* 65*/ "¡Noooo, esto no debía ocurrir!\n", + /* 66*/ "¡Por favor, para! Se supone que no debo morir. Ella... ¡Arggghhh!\n", + /* 67*/ "¡Idiota! Será mejor que salgamos de aquí.\n", + /* 68*/ "Arrgghh... Cof, cof...\n", + /* 69*/ "***¡Aahh...! ¡Aahaa...! ¡Aaaaahhh! Aha. Ahh.***\n", + /* 70*/ "Estoy vivo. Pensaba que había caído como los otros. Eres del Instituto, ¿no es así? Te conozco de antes. Me ayudaste. Gracias.\n", + /* 71*/ "Tú... ¿Tú hablas nuestro idioma?\n", + /* 72*/ "Mírala... qué lista es...\n", + /* 73*/ "Earrggghh... eerggh...\n", + /* 74*/ "¿Qué pasa?\n", + /* 75*/ "Tengo dolor de cabeza. Y con una cabeza tan grande como ésta, no es cuestión de broma.\n", + /* 76*/ "¿Puedes andar? Debemos irnos antes de que organicen nuestra caza.\n", + /* 77*/ "Creo que sí. ¿Cómo te llamas?\n", + /* 78*/ "Soy la Agente Dark. O Joanna, si lo prefieres...\n", + /* 79*/ "Bien, Joanna, soy Protector Uno. Pero tú puedes llamarme... ¡Elvis!\n", + /* 80*/ "La consola no está activa.\n", + /* 81*/ "¿Qué demonios se supone que haces? \n¡Se supone que esto es una habitación sellada! \n¿No sabes nada acerca de los procedimientos \npara autopsias?\n", + /* 82*/ "El Director Easton se va a enterar de esto, \njovencita.\n", + /* 83*/ "¡No puedes coger eso! ¡Es propiedad del gobierno! \n¡Esto es intolerable! ¡No es... ¡No es... \n...profesional!!\n", + /* 84*/ "¡No es que me importen mucho los procedimientos!\n", + /* 85*/ NULL, + /* 86*/ NULL, + /* 87*/ NULL, +}; diff --git a/src/files/lang/pal-final/uffE.c b/src/files/lang/pal-final/uffE.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffE.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uffJ.c b/src/files/lang/pal-final/uffJ.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffJ.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uffP.c b/src/files/lang/pal-final/uffP.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uffP.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_f.c b/src/files/lang/pal-final/uff_str_f.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_f.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_g.c b/src/files/lang/pal-final/uff_str_g.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_g.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_i.c b/src/files/lang/pal-final/uff_str_i.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_i.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/uff_str_s.c b/src/files/lang/pal-final/uff_str_s.c new file mode 100644 index 000000000..fce3da490 --- /dev/null +++ b/src/files/lang/pal-final/uff_str_s.c @@ -0,0 +1,3 @@ +#include + +char *lang[] = { NULL }; diff --git a/src/files/lang/pal-final/waxE.c b/src/files/lang/pal-final/waxE.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-final/waxE.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/waxJ.c b/src/files/lang/pal-final/waxJ.c new file mode 100644 index 000000000..f130240d2 --- /dev/null +++ b/src/files/lang/pal-final/waxJ.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 1*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 2*/ "You are Mr Blonde. Stop mincing around and capture cassandra.\n", + /* 3*/ "Underground in Siberia, James? Some of us don't get further than the Northern Line.\n", + /* 4*/ "Locate and Escort Cassandra To Helipad\n", + /* 5*/ "Plant Nuclear Device In Laboratory Lift\n", + /* 6*/ "Assasinate Datadyne Head Of Security\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me\n", + /* 10*/ "How dare you disturb me\n", + /* 11*/ "You will regret this intrusion girl\n", + /* 12*/ "If I were you i'd leave....NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra Has Been Immobilized\n", + /* 15*/ "Cassandra Has Been Captured Successfully\n", + /* 16*/ "Security Chief Has Been Eliminated\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar Bomb\n", + /* 20*/ "Skedar Bomb\n", + /* 21*/ "Picked up Skedar Bomb\n", + /* 22*/ "Skedar Bomb Has Been Placed Successfully.\n", + /* 23*/ "Skedar Bomb Has Detonated.\n", + /* 24*/ "Lift Doors Locked - Bomb Cannot Be Placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/waxP.c b/src/files/lang/pal-final/waxP.c new file mode 100644 index 000000000..ae63062de --- /dev/null +++ b/src/files/lang/pal-final/waxP.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Eliminate dataDyne Captain\n\nRemove this individual to end any chance of reprisals directed against the Skedar by residual elements of the traitorous corporation. As humorous as the concept of a human wiping out the Skedar race is, we must not be blind to the power of vendetta.\n\n|Objective Three: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Plant an Explosive Device in the Lift\n\nThe inept scientists of the dataDyne Corporation should not be allowed to continue research with our technology. You will place a bomb in the elevator that will destroy all of their research data and any physical evidence remaining.\n\n|Objective Two: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 3*/ "|Background - \n\nThe incompetent Cassandra de Vries of the human corporation dataDyne has obstructed the Skedar cause for long enough. Enter her headquarters and capture her, so that she may be brought before righteous Skedar justice.\n\n|Objective One: - Locate and Escort De Vries to Helipad\n\nTo ensure that this vile human pays for her crimes against us, you are to force her to proceed to the rooftop, where she may be retrieved by a shuttle from the helipad. It would be unwise of you to allow her to come to premature harm.\n\nEND\n", + /* 4*/ "Locate and escort Cassandra to helipad\n", + /* 5*/ "Plant explosive device in lab lift\n", + /* 6*/ "Eliminate dataDyne Captain\n", + /* 7*/ "Get the hell out of my office...\n", + /* 8*/ "Go to the helipad if you want to live.\n", + /* 9*/ "You won't shoot me!\n", + /* 10*/ "How dare you disturb me!\n", + /* 11*/ "You will regret this intrusion, girl.\n", + /* 12*/ "If I were you, I'd leave... NOW!\n", + /* 13*/ "You won't shoot me!\n", + /* 14*/ "Cassandra has been immobilized.\n", + /* 15*/ "Cassandra has been captured successfully.\n", + /* 16*/ "Security chief has been eliminated.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar bomb\n", + /* 20*/ "Skedar bomb\n", + /* 21*/ "Picked up Skedar bomb.\n", + /* 22*/ "Skedar bomb has been placed successfully.\n", + /* 23*/ "Skedar bomb has detonated.\n", + /* 24*/ "Lift doors locked - bomb cannot be placed.\n", + /* 25*/ "Lift has been disabled.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_f.c b/src/files/lang/pal-final/wax_str_f.c new file mode 100644 index 000000000..7ea91de72 --- /dev/null +++ b/src/files/lang/pal-final/wax_str_f.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Eliminer le Capitaine de dataDyne\n\nTu devras effacer cette créature pour annuler toute possibilité de représailles contre les Skedars par des éléments résiduels de cette corporation infidèle. L'idée d'humains réussissant à menacer notre puissante race est plus que ridicule, mais nous ne devons pas ignorer la force de la vendetta.\n\n|Objectif 3: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette chienne humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 1*/ "TOUR LUCERNE\n", + /* 2*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Placer des explosifs dans l'ascenseur\n\nCes crétins de scientifiques de la dataDyne Corporation ne sont plus autorisés à poursuivre leurs recherches grâce à notre technologie. Tu placeras une bombe dans l'ascenseur qui détruira toutes leurs données et toutes les preuves physiques de notre coopération.\n\n|Objectif 2: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 3*/ "|Briefing - \n\nLa dirigeante de la corporation humaine dataDyne, Cassandra de Vries, par son incompétence, s'est révélée incapable de servir convenablement la cause des Skedars. Tu dois pénétrer dans son quartier général pour la capturer. Elle sera ensuite présentée devant le Grand Conseil skedar et elle répondra de ses fautes.\n\n|Objectif 1: - Trouver - escorter De Vries à Héliport\n\nPour nous assurer que cette pitoyable humaine paiera pour ses crimes, tu devras la forcer à te suivre jusqu'au toit où une de nos navettes viendra vous récupérer. Il serait compromettant pour toi que cette créature soit blessée avant l'heure de son jugement.\n\nFIN\n", + /* 4*/ "Trouver - escorter De Vries à Héliport\n", + /* 5*/ "Placer explosifs dans ascenseur Labo\n", + /* 6*/ "Assassiner chef sécurité dataDyne\n", + /* 7*/ "Sortez de mon bureau...\n", + /* 8*/ "Si tu veux vivre, suis-moi jusqu'à l'héliport.\n", + /* 9*/ "Ne me tuez pas!\n", + /* 10*/ "Comment osez-vous me déranger!\n", + /* 11*/ "Vous allez regretter cette intrusion.\n", + /* 12*/ "Partez! Immédiatement!\n", + /* 13*/ "Vous n'oserez pas tirer!\n", + /* 14*/ "Cassandra a été immobilisée.\n", + /* 15*/ "Cassandra a été capturée.\n", + /* 16*/ "Le chef de la Sécurité a été éliminé.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bombe skedar\n", + /* 20*/ "Bombe skedar\n", + /* 21*/ "Bombe skedar obtenue.\n", + /* 22*/ "La Bombe skedar a été placée correctement.\n", + /* 23*/ "La Bombe skedar a explosé.\n", + /* 24*/ "Porte d'ascenseur verrouillée - La bombe ne peut être placée.\n", + /* 25*/ "Ascenseur désactivé.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_g.c b/src/files/lang/pal-final/wax_str_g.c new file mode 100644 index 000000000..16fb3516c --- /dev/null +++ b/src/files/lang/pal-final/wax_str_g.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Eliminieren Sie den Sicherheitschef!\n\nEntfernen Sie dieses Individuum, um jegliche Repressalien durch verbleibende Elemente der abtrünnigen Firma gegen die Skedar von vorneherein auszuschließen. So lachhaft die Vorstellung, dass die Menschen die Skedar auslöschen könnten, auch sein mag, man darf die Macht einer Vendetta nicht unterschätzen.\n\n|3. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Platzieren Sie einen Sprengsatz im Aufzug!\n\nDen unfähigen Wissenschaftlern von dataDyne darf nicht erlaubt werden, die Untersuchungen unserer Technologien fortzusetzen. Platzieren Sie eine Bombe im Aufzug, um sämtliche Forschungsdaten und noch verbleibenden Beweise zu vernichten.\n\n|2. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 3*/ "|Hintergrund - \n\nDie inkompetente Cassandra de Vries, Vorsitzende der menschlichen Firma dataDyne, hat die Sache der Skedar lange genug behindert. Betreten Sie ihr Hauptquartier und nehmen Sie sie gefangen, damit sie vor ein ordentliches Skedar-Gericht gestellt werden kann.\n\n|1. Ziel: - Finden Sie De Vries und bringen Sie sie zum Helipad!\n\nUm sicherzugehen, dass diese Menschenfrau für Ihre Verbrechen gegen uns zur Verantwortung gezogen wird, müssen Sie sie dazu zwingen, mit Ihnen aufs Dach zu gehen, wo Sie beide von einem Shuttle abgeholt werden. Es wäre unklug, ihr vorzeitig Schaden zuzufügen.\n\nENDE\n", + /* 4*/ "Eskortieren Sie Cassandra zum Helipad!\n", + /* 5*/ "Platzieren Sie den Sprengsatz!\n", + /* 6*/ "Eliminieren Sie den Sicherheitschef!\n", + /* 7*/ "Raus aus meinem Büro!\n", + /* 8*/ "Wenn Sie am Leben bleiben wollen, folgen Sie mir zum Helipad!\n", + /* 9*/ "Sie werden nicht auf mich schießen!\n", + /* 10*/ "Wie können Sie es wagen, mich zu stören?\n", + /* 11*/ "Sie werden es bereuen, hier eingedrungen zu sein.\n", + /* 12*/ "Wenn ich Sie wäre, würde ich verschwinden... SOFORT!\n", + /* 13*/ "Sie werden nicht auf mich schießen!\n", + /* 14*/ "Cassandra wurde eliminiert.\n", + /* 15*/ "Cassandra wurde erfolgreich gefangengenommen.\n", + /* 16*/ "Sicherheitschef eliminiert\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Skedar-Bombe\n", + /* 20*/ "Skedar-Bombe\n", + /* 21*/ "Skedar-Bombe aufgenommen\n", + /* 22*/ "Die Skedar-Bombe wurde erfolgreich platziert.\n", + /* 23*/ "Die Skedar-Bombe ist detoniert.\n", + /* 24*/ "Die Aufzugstüren sind verriegelt - Bombe kann nicht platziert werden.\n", + /* 25*/ "Aufzug inaktiv\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_i.c b/src/files/lang/pal-final/wax_str_i.c new file mode 100644 index 000000000..4a37745b7 --- /dev/null +++ b/src/files/lang/pal-final/wax_str_i.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Elimina il presidente dataDyne\n\nElimina questo squallido individuo per prevenire ogni possibile tentativo di rappresaglia da parte di elementi residuali di questa azienda traditrice. Per quanto possa essere assurdo pensare che una sola persona possa annientare la razza umana, non dobbiamo sottovalutare la forza dell'odio e della vendetta.\n\n|Obiettivo 3: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 1*/ "LUCERNE TOWER\n", + /* 2*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Piazza ordigno esplosivo in ascensore\n\nImpedisci a questi inetti scienziati della dataDyne Corporation di continuare la ricerca con la nostra tecnologia: piazza una bomba nell'ascensore in modo da distruggere tutti i dati della loro ricerca e qualsiasi altra prova fisica rimasta.\n\n|Obiettivo 2: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 3*/ "|Situazione:\n\nQuell'incompetente di Cassandra de Vries della dataDyne Corporation ha ostacolato la causa Skedar fin troppo a lungo. Entra nel suo ufficio e catturala, in modo da poterla portare davanti alla corte di giustizia Skedar.\n\n|Obiettivo 1: - Scova e scorta De Vries all'eliporto\n\nPer essere sicuri che questa vigliacca paghi per i suoi crimini contro di noi, dovrai costringerla ad andare all'eliporto sul tetto, dove sarà prelevata da una navetta. La vogliamo viva: impediscile di fare sciocchezze!\n\nFINE\n", + /* 4*/ "Scova e scorta De Vries all'eliporto\n", + /* 5*/ "Piazza ordigno esplosivo in ascensore\n", + /* 6*/ "Elimina il presidente dataDyne\n", + /* 7*/ "Esci subito dal mio ufficio...\n", + /* 8*/ "Va all'eliporto se tieni alla pelle!\n", + /* 9*/ "Non vorrai mica spararmi...\n", + /* 10*/ "Come osi disturbarmi!\n", + /* 11*/ "Te ne pentirai amaramente, sfacciata!\n", + /* 12*/ "Se fossi in te girerei al largo!\n", + /* 13*/ "Non vorrai mica spararmi...\n", + /* 14*/ "Cassandra è immobilizzata!\n", + /* 15*/ "Cassandra è stata catturata!\n", + /* 16*/ "Il capo della sicurezza è stato eliminato.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Presa bomba Skedar\n", + /* 22*/ "La bomba Skedar è in posizione corretta.\n", + /* 23*/ "La bomba Skedar è esplosa.\n", + /* 24*/ "Porte ascensore bloccate: impossibile piazzare bomba.\n", + /* 25*/ "L'ascensore è stato disattivato.\n", + /* 26*/ NULL, + /* 27*/ NULL, +}; diff --git a/src/files/lang/pal-final/wax_str_s.c b/src/files/lang/pal-final/wax_str_s.c new file mode 100644 index 000000000..290b2e67c --- /dev/null +++ b/src/files/lang/pal-final/wax_str_s.c @@ -0,0 +1,32 @@ +#include + +char *lang[] = { + /* 0*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Eliminar al Capitán de dataDyne\n\nSuprime a este individuo para acabar con cualquier represalia dirigida contra los Skedar por elementos residuales de la traidora corporación. Aunque el concepto de un humano eliminando a la raza Skedar pueda resultar gracioso, no debemos cegarnos ante la fuerza de la venganza.\n\n|Objetivo Tres: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 1*/ "EDIFICIO LUCERNE\n", + /* 2*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Colocar un Dispositivo Explosivo en el Ascensor\n\nNo se permitirá que los ineptos científicos de la Corporación dataDyne continúen investigando con nuestra tecnología. Deberás colocar una bomba en el ascensor para destruir completamente sus investigaciones, además de las posibles evidencias físicas.\n\n|Objetivo Dos: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 3*/ "|Antecedentes - \n\nLa incompetente Cassandra De Vries de la corporación humana dataDyne ha obstruido la causa Skedar demasiado tiempo. Entra en su cuartel general y captúrala, para así poderla llevar ante la honesta justicia Skedar.\n\n|Objetivo Uno: - Localizar y Escoltar a De Vries al Helipuerto\n\nPara asegurar que esta humana tan vil paga por sus crímenes contra nosotros, debes obligarla a llegar al tejado, donde será recogida por una lanzadera en el helipuerto. Sería bastante insensato por tu parte permitir que ella sufra un daño prematuro.\n\nFIN\n", + /* 4*/ "Buscar/guiar a Cassandra al helipuerto\n", + /* 5*/ "Colocar explosivo en ascensor del lab.\n", + /* 6*/ "Eliminar al Capitán de dataDyne\n", + /* 7*/ "Fuera de mi oficina...\n", + /* 8*/ "Ve al helipuerto si quieres vivir.\n", + /* 9*/ "¡No me dispararás!\n", + /* 10*/ "¡Cómo te atreves a molestarme!\n", + /* 11*/ "Vas a lamentar esta intrusión, chica.\n", + /* 12*/ "Si yo fuera tú, me marcharía... ¡AHORA!\n", + /* 13*/ "¡No me dispararás!\n", + /* 14*/ "Cassandra ha sido inmovilizada.\n", + /* 15*/ "Cassandra ha sido capturada con éxito.\n", + /* 16*/ "El jefe de seguridad ha sido eliminado.\n", + /* 17*/ "\n", + /* 18*/ "\n", + /* 19*/ "Bomba Skedar\n", + /* 20*/ "Bomba Skedar\n", + /* 21*/ "Bomba Skedar recogida.\n", + /* 22*/ "La Bomba Skedar ha sido colocada con éxito.\n", + /* 23*/ "La Bomba Skedar ha sido detonada.\n", + /* 24*/ "Ascensor bloqueado. La bomba no puede ser colocada.\n", + /* 25*/ "El ascensor ha sido desactivado.\n", + /* 26*/ NULL, + /* 27*/ NULL, +};